[1] Xiaoyun Wang*, Yiqun Lisa Yin, Hongbo Yu: Finding Collisions in the Full SHA-1. CRYPTO 2005: 17-36 (Best Paper Award).
[2] Xiaoyun Wang*, Hongbo Yu: How to Break MD5 and Other Hash Functions. EUROCRYPT 2005: 19-35 (Best Paper Award).
[3] Xiaoyun Wang*, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu: Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18 (Best Paper Award).
[4] Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang*: The Second-Preimage Attack on MD4. CANS 2005: 1-12 (Best Paper Award).
[5] Kaijie Jiang, Anyu Wang*, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang: Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. ASIACRYPT (4) 2023: 167-200 (Best Paper Award).
[6] Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang*: Dashing and Star: Byzantine Fault Tolerance with Weak Certiffcates. EuroSys 2024: 250-264.
[7] Shihe Ma, Tairong Huang, Anyu Wang*, Qixian Zhou, Xiaoyun Wang: Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 592-616.
[8] Shihe Ma, Tairong Huang, Anyu Wang*, Xiaoyun Wang: Accelerating BGV Bootstrapping for Large p Using Null Polynomials over $\mathbb {Z}_{p^e}$. EUROCRYPT (2) 2024: 403-432.
[9] Tianrui Wang, Anyu Wang*, Xiaoyun Wang: Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. CRYPTO (3) 2023: 70-100.
[10] Yang Yu, Huiwen Jia*, Xiaoyun Wang: Compact Lattice Gadget and Its Applications to Hash-and Sign Signatures. CRYPTO (5) 2023: 390-420.
[11] Qingyuan Yu, Xiaoyang Dong*, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang*: Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst 2023(4): 1-31.
[12] Qingliang Hou, Xiaoyang Dong*, Lingyue Qin*, Guoyan Zhang*, Xiaoyun Wang*: Automated Meet-in-the-Middle Attack Goes to Feistel. ASIACRYPT (3) 2023: 370-404.
[13] Lingyue Qin, Jialiang Hua, Xiaoyang Dong*, Hailun Yan, Xiaoyun Wang: Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing. EUROCRYPT (4) 2023: 158-188.
[14] Lingyue Qin, Xiaoyang Dong*, Anyu Wang*, Jialiang Hua*, Xiaoyun Wang*: Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. ASIACRYPT (1) 2022: 287-317.
[15] Xiaoyang Dong, Lingyue Qin*, Siwei Sun, Xiaoyun Wang: Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. EUROCRYPT (3) 2022: 3–33.
[16] Xiaoyang Dong, Zhiyu Zhang, Siwei Sun*, Congming Wei, Xiaoyun Wang, Lei Hu: Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. ASIACRYPT (1) 2021: 241-271.
[17] Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu: Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. CRYPTO (3) 2021: 278-308.
[18] Zhenzhen Bao*, Xiaoyang Dong*, Jian Guo*, Zheng Li*, Danping Shi*, Siwei Sun*, Xiaoyun Wang*: Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like. EUROCRYPT (1) 2021: 771-804.
[19] Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu: Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. ASIACRYPT (2) 2020: 727-757.
[20] Senyang Huang, Xiaoyun Wang*, Guangwu Xu, Meiqin Wang, Jingyuan Zhao: Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT (2) 2017: 259-288.
[21] Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang*: Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127.
[22] Xiaoyun Wang*, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan: Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. EUROCRYPT 2009: 121-133.
[23] Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang*: New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009: 209-230.
[24] Xiaoyun Wang*, Wei Wang, Keting Jia, Meiqin Wang: New Distinguishing Attack on MAC using Secret-Prefix Method, FSE 2009: 363-374.
[25] Xiaoyun Wang*, Hongbo Yu, Yiqun Lisa Yin: Efficient Collision Search Attacks on SHA-0. CRYPTO 2005: 1-16.