Bingke Ma
According to our database1,
Bingke Ma
authored at least 10 papers
between 2013 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
IACR Cryptol. ePrint Arch., 2015
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version).
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions.
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version).
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013