2025
Cooperative Integrated Sensing and Communication in 6G: From Operators Perspective.
,
,
,
,
,
,
,
,
,
,
,
,
IEEE Wirel. Commun., February, 2025
2024
Multistatic Integrated Sensing and Communication System Based on Macro-Micro Cooperation.
,
,
,
,
,
,
,
,
,
,
Sensors, April, 2024
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure.
IACR Cryptol. ePrint Arch., 2024
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT.
IACR Cryptol. ePrint Arch., 2024
Accelerating BGV Bootstrapping for Large p Using Null Polynomials Over ℤ<sub>p<sup>e</sup></sub>.
IACR Cryptol. ePrint Arch., 2024
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2024
Generic MitM Attack Frameworks on Sponge Constructions.
IACR Cryptol. ePrint Arch., 2024
Hard-Label Cryptanalytic Extraction of Neural Network Models.
IACR Cryptol. ePrint Arch., 2024
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Multipath-Exploited Bistatic Sensing with LoS Blockage in MIMO-OFDM Systems for 6G.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
Dashing and Star: Byzantine Fault Tolerance with Weak Certificates.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
Accelerating BGV Bootstrapping for Large p Using Null Polynomials over $\mathbb {Z}_{p^e}$.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Unbalanced Private Set Union with Reduced Computation and Communication.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures.
IACR Cryptol. ePrint Arch., 2023
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks.
IACR Cryptol. ePrint Arch., 2023
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited.
IACR Cryptol. ePrint Arch., 2023
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation.
IACR Cryptol. ePrint Arch., 2023
Exploiting the Symmetry of ℤ<sup>n</sup>: Randomization and the Automorphism Problem.
IACR Cryptol. ePrint Arch., 2023
Automated Meet-in-the-Middle Attack Goes to Feistel.
IACR Cryptol. ePrint Arch., 2023
FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts.
CoRR, 2023
Online Social Community Sub-Location Classification.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Impact of Errors in Environmental Correction on Gravity Field Recovery Using Interferometric Radar Altimeter Observations.
Remote. Sens., December, 2022
Improved MITM Cryptanalysis on Streebog.
IACR Trans. Symmetric Cryptol., 2022
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing.
IACR Cryptol. ePrint Arch., 2022
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256.
IACR Cryptol. ePrint Arch., 2022
Byzantine Fault Tolerance from Weak Certificates.
IACR Cryptol. ePrint Arch., 2022
Accelerated GNN Training with DGL and RAPIDS cuGraph in a Fraud Detection Workflow.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
2021
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny.
IACR Trans. Symmetric Cryptol., 2021
A dedicated hardware accelerator for real-time acceleration of YOLOv2.
J. Real Time Image Process., 2021
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems.
IACR Cryptol. ePrint Arch., 2021
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials.
IACR Cryptol. ePrint Arch., 2021
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.
IACR Cryptol. ePrint Arch., 2021
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021
Error estimation of practical convolution discrete Gaussian sampling with rejection sampling.
Sci. China Inf. Sci., 2021
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with <i>x</i>-only coordinate: with application to secp256k1.
IET Inf. Secur., 2020
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.
IACR Cryptol. ePrint Arch., 2020
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2020
Quantum attacks on some feistel block ciphers.
Des. Codes Cryptogr., 2020
2019
New Conditional Cube Attack on Keccak Keyed Modes.
IACR Trans. Symmetric Cryptol., 2019
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries.
IEEE Trans. Biomed. Eng., 2019
New Distinguisher on Reduced-Round Keccak Sponge Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash.
IACR Cryptol. ePrint Arch., 2019
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications.
IACR Cryptol. ePrint Arch., 2019
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes.
Des. Codes Cryptogr., 2019
GraphDefense: Towards Robust Graph Convolutional Networks.
CoRR, 2019
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256.
Sci. China Inf. Sci., 2019
A regulated digital currency.
Sci. China Inf. Sci., 2019
Quantum cryptanalysis on some generalized Feistel schemes.
Sci. China Inf. Sci., 2019
A Scalable OpenCL-Based FPGA Accelerator for YOLOv2.
Proceedings of the 27th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2019
2018
Analysis of Software Implemented Low Entropy Masking Schemes.
Secur. Commun. Networks, 2018
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques.
Secur. Commun. Networks, 2018
Improved integral attacks without full codebook.
IET Inf. Secur., 2018
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC.
IACR Cryptol. ePrint Arch., 2018
A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018.
IACR Cryptol. ePrint Arch., 2018
A Key-recovery Attack on 855-round Trivium.
IACR Cryptol. ePrint Arch., 2018
Conditional cube attack on round-reduced River Keyak.
Des. Codes Cryptogr., 2018
More or Less? Predict the Social Influence of Malicious URLs on Social Media.
CoRR, 2018
Attack Graph Convolutional Networks by Adding Fake Nodes.
CoRR, 2018
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs.
CoRR, 2018
Impossible differential attack on Simpira v2.
Sci. China Inf. Sci., 2018
Orthogonalized lattice enumeration for solving SVP.
Sci. China Inf. Sci., 2018
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques.
Sci. China Inf. Sci., 2018
Quantum key-recovery attack on Feistel structures.
Sci. China Inf. Sci., 2018
Improved automatic search of impossible differentials for camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> layers.
Sci. China Inf. Sci., 2018
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
A Scalable FPGA Accelerator for Convolutional Neural Networks.
Proceedings of the Advanced Computer Architecture - 12th Conference, 2018
2017
Conditional Cube Attack on Round-Reduced ASCON.
IACR Trans. Symmetric Cryptol., 2017
Cube-like Attack on Round-Reduced Initialization of Ketje Sr.
IACR Trans. Symmetric Cryptol., 2017
3-D-MIMO With Massive Antennas Paves the Way to 5G Enhanced Mobile Broadband: From System Design to Field Trials.
IEEE J. Sel. Areas Commun., 2017
A Key Backup Scheme Based on Bitcoin.
IACR Cryptol. ePrint Arch., 2017
Provably Secure NTRUEncrypt over More General Cyclotomic Rings.
IACR Cryptol. ePrint Arch., 2017
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.
IACR Cryptol. ePrint Arch., 2017
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently.
IACR Cryptol. ePrint Arch., 2017
Provably Secure NTRU Instances over Prime Cyclotomic Rings.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Attacking strategies and temporal analysis involving Facebook discussion groups.
Proceedings of the 13th International Conference on Network and Service Management, 2017
2016
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes.
IACR Trans. Symmetric Cryptol., 2016
Orthogonalized Lattice Enumeration for Solving SVP.
IACR Cryptol. ePrint Arch., 2016
Conditional Cube Attack on Reduced-Round Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2016
Cryptanalysis of Midori128 Using Impossible Differential Techniques.
Proceedings of the Information Security Practice and Experience, 2016
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256.
IET Inf. Secur., 2015
Improved Attacks on Reduced-Round Camellia-128/192/256.
IACR Cryptol. ePrint Arch., 2015
Impossible Differential Cryptanalysis of Reduced Round SIMON.
IACR Cryptol. ePrint Arch., 2015
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques.
IACR Cryptol. ePrint Arch., 2015
Improved Impossible Differential Attack on Reduced-Round LBlock.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Finding Shortest Lattice Vectors in the Presence of Gaps.
Proceedings of the Topics in Cryptology, 2015
2014
Cryptanalysis of GOST R hash function.
Inf. Process. Lett., 2014
A note on BDD problems with λ<sub>2</sub>-gap.
Inf. Process. Lett., 2014
Differential Analysis on Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014
Improved Differential Attacks on Reduced SIMON Versions.
IACR Cryptol. ePrint Arch., 2014
A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge.
IACR Cryptol. ePrint Arch., 2014
New transference theorems on lattices possessing n<sup>∈</sup>-unique shortest vectors.
Discret. Math., 2014
Dynamical analysis and perturbation solution of an SEIR epidemic model.
Appl. Math. Comput., 2014
Improved Single-Key Attacks on 9-Round AES-192/256.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
A study on monoamine neurotransmitters in ovariectomized female rats with different Chinese herbs treatment.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
Regional homogeneity change in female depressive patients after abdominal acupuncture treatment.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
2013
Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently.
IEEE Trans. Circuits Syst. II Express Briefs, 2013
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE.
IACR Cryptol. ePrint Arch., 2013
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256.
IACR Cryptol. ePrint Arch., 2013
Novel results for a class of singular perturbed slow-fast system.
Appl. Math. Comput., 2013
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Improved Boomerang Attacks on SM3.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
The Boomerang Attacks on the Round-Reduced Skein-512.
IACR Cryptol. ePrint Arch., 2012
New Transference Theorems on Lattices Possessing n<sup>ε</sup>-unique Shortest Vectors.
IACR Cryptol. ePrint Arch., 2012
Public key encryption without random oracle made truly practical.
Comput. Electr. Eng., 2012
Improved Cryptanalysis of the Block Cipher KASUMI.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Cryptanalysis of a homomorphic encryption scheme from ISIT 2008.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256.
IACR Cryptol. ePrint Arch., 2011
Public Key Encryption for the Forgetful.
IACR Cryptol. ePrint Arch., 2011
The Fault Attack ECDLP Revisited.
IACR Cryptol. ePrint Arch., 2011
Attack Cryptosystems Based on HCDLP.
IACR Cryptol. ePrint Arch., 2011
Shortest Lattice Vectors in the Presence of Gaps.
IACR Cryptol. ePrint Arch., 2011
Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia.
IACR Cryptol. ePrint Arch., 2011
A Meet-in-the-Middle Attack on the Full KASUMI.
IACR Cryptol. ePrint Arch., 2011
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.
IACR Cryptol. ePrint Arch., 2011
Practical Attack on the Full MMB Block Cipher.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
2010
New Differential Cryptanalytic Results for Reduced-Round CAST-128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Cryptanalysis of the Compression Function of SIMD.
IACR Cryptol. ePrint Arch., 2010
Skew-Frobenius map on twisted Edwards curve.
IACR Cryptol. ePrint Arch., 2010
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem.
IACR Cryptol. ePrint Arch., 2010
Practical-time Attack on the Full MMB Block Cipher.
IACR Cryptol. ePrint Arch., 2010
Differential-algebraic cryptanalysis of reduced-round of Serpent-256.
Sci. China Inf. Sci., 2010
On an attack on RSA with small CRT-exponents.
Sci. China Inf. Sci., 2010
2009
On the Security of Stream Cipher CryptMT v3.
IACR Cryptol. ePrint Arch., 2009
Cryptanalysis of Stream Cipher Grain Family.
IACR Cryptol. ePrint Arch., 2009
Near-Collision Attack on the Compression Function of Dynamic SHA2.
IACR Cryptol. ePrint Arch., 2009
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES.
IACR Cryptol. ePrint Arch., 2009
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256.
IACR Cryptol. ePrint Arch., 2009
Pseudo-Cryptanalysis of Luffa.
IACR Cryptol. ePrint Arch., 2009
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL.
Proceedings of the Information Security Practice and Experience, 2009
New Distinguishing Attack on MAC Using Secret-Prefix Method.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.
Proceedings of the Advances in Cryptology, 2009
New Birthday Attacks on Some MACs Based on Block Ciphers.
Proceedings of the Advances in Cryptology, 2009
Distinguishing and Second-Preimage Attacks on CBC-Like MACs.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC.
IACR Cryptol. ePrint Arch., 2008
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs.
IACR Cryptol. ePrint Arch., 2008
Fast correlation attack on stream cipher ABC v3.
Sci. China Ser. F Inf. Sci., 2008
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
2007
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.
IACR Cryptol. ePrint Arch., 2007
Improved Impossible Differential Cryptanalysis of CLEFIA.
IACR Cryptol. ePrint Arch., 2007
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4.
Proceedings of the Information Security and Cryptology, 2007
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.
Proceedings of the Information Security and Cryptology, 2007
Some Mathematical Problems in Cryptanalysis.
Proceedings of the Computer Mathematics, 8th Asian Symposium, 2007
2006
Progress and Prospect of Some Fundamental Research on Information Security in China.
J. Comput. Sci. Technol., 2006
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers.
IACR Cryptol. ePrint Arch., 2006
Cryptanalysis of the Full HAVAL with 4 and 5 Passes.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
Colliding X.509 Certificates.
IACR Cryptol. ePrint Arch., 2005
An attack on hash function HAVAL-128.
Sci. China Ser. F Inf. Sci., 2005
An efficient proxy signature scheme in home network DRM.
Proceedings of the ICETE 2005, 2005
How to Break MD5 and Other Hash Functions.
Proceedings of the Advances in Cryptology, 2005
Cryptanalysis of the Hash Functions MD4 and RIPEMD.
Proceedings of the Advances in Cryptology, 2005
Finding Collisions in the Full SHA-1.
Proceedings of the Advances in Cryptology, 2005
Efficient Collision Search Attacks on SHA-0.
Proceedings of the Advances in Cryptology, 2005
The Second-Preimage Attack on MD4.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1.
IACR Cryptol. ePrint Arch., 2004
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD.
IACR Cryptol. ePrint Arch., 2004
2000
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Proceedings of the Public Key Cryptography, 2000