Hong Xu

Orcid: 0000-0001-5461-0697

Affiliations:
  • Information Engineering University, Zhengzhou, China


According to our database1, Hong Xu authored at least 24 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128.
Cryptogr. Commun., September, 2024

Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities.
J. Inf. Secur. Appl., February, 2024

Differential-Linear Cryptanalysis of Reduced Round ChaCha.
IACR Trans. Symmetric Cryptol., 2024

Linear cryptanalysis of SPECK and SPARX.
J. Inf. Secur. Appl., 2024

Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS.
IET Inf. Secur., 2024

2023
Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64.
J. Cryptogr. Eng., June, 2023

Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC.
IET Inf. Secur., May, 2023

Linear Cryptanalysis of Lightweight Block Cipher WARP.
Proceedings of the Provable and Practical Security, 2023

SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Improved Related-Key rectangle Attack on GIFT.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
On the Provable Security Against Truncated Impossible Differential Cryptanalysis for AES in the Master-Key Setting.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Improved integral attacks on 24-round LBlock and LBlock-s.
IET Inf. Secur., 2020

2018
Preliminary results on the minimal polynomial of modified de Bruijn sequences.
Finite Fields Their Appl., 2018

2014
On the Recursive Construction of MDS Matrices for Lightweight Cryptography.
Proceedings of the Information Security Practice and Experience, 2014

2012
Distribution of one-error linear complexity of binary sequences for arbitrary prime period.
J. Syst. Sci. Complex., 2012

Two classes of sequences derived from single cycle T-functions.
Finite Fields Their Appl., 2012

Asymptotic analysis on the normalized k-error linear complexity of binary sequences.
Des. Codes Cryptogr., 2012

Remarks on the generalized cyclotomic sequences of length $$2p^{m}$$.
Appl. Algebra Eng. Commun. Comput., 2012

2009
Autocorrelations of <i>l</i>-sequences with prime connection integer.
Cryptogr. Commun., 2009

2006
Further Results on the Distinctness of Decimations of l-Sequences.
IEEE Trans. Inf. Theory, 2006

Autocorrelations of Maximum Period FCSR Sequences.
SIAM J. Discret. Math., 2006

On the Distinctness of Decimations of Generalized <i>l</i>-Sequences.
Proceedings of the Sequences and Their Applications, 2006

2003
Partial period distribution of FCSR sequences.
IEEE Trans. Inf. Theory, 2003


  Loading...