Dongxia Bai

According to our database1, Dongxia Bai authored at least 13 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Power Grid Inspection Image Denoising for Mixed Poisson-Gaussian Noise.
Proceedings of the 5th IEEE International Conference on Information Systems and Computer Aided Education, 2022

2020
A Novel Portrait Technology-Based Modeling and Alarm Tagging Method for SDH Device in Smart Grid.
Proceedings of the ICITEE2020: The 3rd International Conference on Information Technologies and Electrical Engineering, 2020

2018
Improved cryptanalysis of step-reduced SM3.
Sci. China Inf. Sci., 2018

Temperature and Power Aware Server Placement Optimization for Enterprise Data Center.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

2016
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack.
Sci. China Inf. Sci., 2016

2015
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256.
IET Inf. Secur., 2015

2014
Boomerang Attack on Step-Reduced SHA-512.
IACR Cryptol. ePrint Arch., 2014

A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
A Meet-in-the-middle Attack on Round-Reduced mCrypton.
IACR Cryptol. ePrint Arch., 2013

Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256.
IACR Cryptol. ePrint Arch., 2013

Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA.
Proceedings of the Information Security, 16th International Conference, 2013

Improved Boomerang Attacks on SM3.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2011
New Impossible Differential Attacks on Camellia.
IACR Cryptol. ePrint Arch., 2011


  Loading...