Chenhui Jin
Orcid: 0000-0003-4941-7133
According to our database1,
Chenhui Jin
authored at least 72 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Fast computation of linear approximation of general word-oriented composite function.
Discret. Appl. Math., 2025
2024
J. Supercomput., December, 2024
Cryptogr. Commun., November, 2024
Improved Fast Correlation Attack Using Multiple Linear Approximations and Its Application on SOSEMANUK.
IEEE Trans. Inf. Theory, October, 2024
IEEE Trans. Inf. Theory, June, 2024
Differential-Invariant Subspace Cryptanalysis - A Real-Time Attack Against IoT-Friendly Word-Based Block Ciphers.
IEEE Internet Things J., May, 2024
IEEE Trans. Inf. Forensics Secur., 2024
2023
IEEE Trans. Inf. Theory, October, 2023
A MIQCP-Based Automatic Search Algorithm for Differential-Linear Trails of ARX Ciphers(Long Paper).
IACR Cryptol. ePrint Arch., 2023
2022
J. Inf. Secur. Appl., 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
J. Inf. Secur. Appl., 2021
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks.
J. Inf. Secur. Appl., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Sci. China Inf. Sci., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
IET Inf. Secur., 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
Secur. Commun. Networks, 2019
Quantum Inf. Process., 2019
Inf. Process. Lett., 2019
IET Inf. Secur., 2019
More accurate results on the provable security of AES against impossible differential cryptanalysis.
Des. Codes Cryptogr., 2019
Comput. J., 2019
Comput. J., 2019
2018
Secur. Commun. Networks, 2018
Des. Codes Cryptogr., 2018
A non-alternate 3D structure and its practical security evaluation against differential and linear cryptanalysis.
Sci. China Inf. Sci., 2018
IEEE Access, 2018
IEEE Access, 2018
2017
Int. J. Found. Comput. Sci., 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Multidimensional zero-correlation linear cryptanalysis of lightweight block cipher Piccolo-128.
Secur. Commun. Networks, 2016
Sci. China Inf. Sci., 2016
2015
IEEE Trans. Computers, 2015
Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting.
Pervasive Mob. Comput., 2015
J. Networks, 2015
Comput. J., 2015
Proceedings of the Information Security Practice and Experience, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Practical Security Evaluation against Differential and Linear Cryptanalyses for the Lai-Massey Scheme with an SPS F-function.
KSII Trans. Internet Inf. Syst., 2014
IACR Cryptol. ePrint Arch., 2014
2013
J. Univers. Comput. Sci., 2013
KSII Trans. Internet Inf. Syst., 2013
2012
Lower Bounds of Differential and Linear Active S-boxes for Generalized Feistel Network with SP Type F-function.
J. Networks, 2012
Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function.
Sci. China Inf. Sci., 2012
2009
Security evaluation against differential and linear cryptanalyses for Feistel ciphers.
Frontiers Comput. Sci. China, 2009
A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions.
Proceedings of the SECRYPT 2009, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007