2024
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers.
Comput. J., February, 2024
Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials.
IACR Trans. Symmetric Cryptol., 2024
Feistel-Like Structures Revisited: Classification and Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
Further insights on constructing quantum circuits for Camellia block cipher.
Quantum Inf. Process., December, 2023
More constructions of <i>n</i>-cycle permutations.
Finite Fields Their Appl., June, 2023
New Wine Old Bottles: Feistel Structure Revised.
IEEE Trans. Inf. Theory, March, 2023
2022
Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC.
IET Inf. Secur., 2022
Improved rotational-XOR cryptanalysis of Simon-like block ciphers.
IET Inf. Secur., 2022
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK.
IACR Cryptol. ePrint Arch., 2022
More constructions of n-cycle permutations.
CoRR, 2022
2021
New Constructions of Complete Permutations.
IEEE Trans. Inf. Theory, 2021
Provable Security Evaluation of Block Ciphers Against Demirci-Selçuk's Meet-in-the-Middle Attack.
IEEE Trans. Inf. Theory, 2021
Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures.
Secur. Commun. Networks, 2021
Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
2020
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers.
IACR Cryptol. ePrint Arch., 2020
The phantom of differential characteristics.
Des. Codes Cryptogr., 2020
2019
New Results About the Boomerang Uniformity of Permutation Polynomials.
IEEE Trans. Inf. Theory, 2019
Improved Cryptanalysis on SipHash.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptol. ePrint Arch., 2018
2017
New observation on division property.
Sci. China Inf. Sci., 2017
Revised cryptanalysis for SMS4.
Sci. China Inf. Sci., 2017
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers.
Proceedings of the Information Security Practice and Experience, 2017
2016
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys.
IET Inf. Secur., 2016
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2016
New Insights on AES-like SPN Ciphers.
IACR Cryptol. ePrint Arch., 2016
Impossible Differentials of SPN Ciphers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Truncated differential cryptanalysis of PRINCE.
Secur. Commun. Networks, 2015
Differential fault analysis on LED using Super-Sbox.
IET Inf. Secur., 2015
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015
2013
Fault analysis study of the block cipher FOX64.
Multim. Tools Appl., 2013
Security evaluation of MISTY structure with SPN round function.
Comput. Math. Appl., 2013
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2012
On Algebraic Property of T-Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
A meet-in-the-middle attack on reduced-round ARIA.
J. Syst. Softw., 2011
Impossible differential cryptanalysis of 13-round CLEFIA-128.
J. Syst. Softw., 2011
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
J. Inf. Sci. Eng., 2011
Differential Fault Analysis on SMS4 using a single fault.
Inf. Process. Lett., 2011
Impossible differential cryptanalysis of SPN ciphers.
IET Inf. Secur., 2011
Balanced rotation symmetric boolean functions with maximum algebraic immunity.
IET Inf. Secur., 2011
Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0.
Proceedings of the 2011 World Congress on Internet Security, 2011
2010
Improved Fault Attack on FOX.
IACR Cryptol. ePrint Arch., 2010
A Meet-in-the-Middle Attack on ARIA.
IACR Cryptol. ePrint Arch., 2010
Some Observations on MISTY Structure with SPN Round Function.
IACR Cryptol. ePrint Arch., 2010
SQUARE attack on block ciphers with low algebraic degree.
Sci. China Inf. Sci., 2010
Impossible Differential Cryptanalysis on Feistel Ciphers with <i>SP</i> and <i>SPS</i> Round Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
New Integral Distinguisher for Rijndael-256.
IACR Cryptol. ePrint Arch., 2009
Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network.
IACR Cryptol. ePrint Arch., 2009
New Cryptanalysis of Block Ciphers with Low Algebraic Degree.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Integral Cryptanalysis of ARIA.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Saturation Attack on the Block Cipher HIGHT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
New Impossible Differential Cryptanalysis of ARIA.
IACR Cryptol. ePrint Arch., 2008
Construction of Resilient Functions with Multiple Cryptographic Criteria.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Enumeration of Homogeneous Rotation Symmetric Functions over Fp.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008