Provable Security Evaluations of XOR-Versions of SNOW Family Stream Ciphers Against Fast Correlation Attacks.
IEEE Trans. Inf. Theory, June, 2025
Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW.
Des. Codes Cryptogr., June, 2024
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA.
IET Inf. Secur., 2024
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods.
IACR Cryptol. ePrint Arch., 2024
Cross-platform product matching based on entity alignment of knowledge graph with raea model.
,
,
,
,
,
,
,
,
,
,
World Wide Web (WWW), July, 2023
Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher.
IACR Trans. Symmetric Cryptol., 2023
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE.
IACR Cryptol. ePrint Arch., 2023
Key Filtering in Cube Attacks from the Implementation Aspect.
IACR Cryptol. ePrint Arch., 2023
Cross-platform Product Matching Based on Knowledge Graph.
Proceedings of the Web and Big Data. APWeb-WAIM 2022 International Workshops, 2022
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks.
IACR Trans. Symmetric Cryptol., 2021
Resistance of SNOW-V against Fast Correlation Attacks.
IACR Trans. Symmetric Cryptol., 2021
FAN: A Lightweight Authenticated Cryptographic Algorithm.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G.
Des. Codes Cryptogr., 2020
Fast Correlation Attacks on Grain-like Small State Stream Ciphers.
IACR Trans. Symmetric Cryptol., 2017
New Algorithms for Solving LPN.
IACR Cryptol. ePrint Arch., 2017
Another Tradeoff Attack on Sprout-Like Stream Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Computing Walsh coefficients from the algebraic normal form of a Boolean function.
Cryptogr. Commun., 2014
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013