Siwei Sun
Orcid: 0000-0002-3058-2377Affiliations:
- University of Chinese Academy of Sciences, School of Cryptology, Beijing, China
According to our database1,
Siwei Sun
authored at least 97 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
5
10
8
10
6
6
3
2
3
7
8
2
2
3
3
7
1
3
2
2
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis.
IET Inf. Secur., 2024
IEICE Trans. Inf. Syst., 2024
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2024
Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations.
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
SiamDTA: Dual-Template Siamese Network Visual Object Tracking Algorithm Based on Attention Mechanism.
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Des. Codes Cryptogr., May, 2023
IACR Trans. Symmetric Cryptol., 2023
IACR Trans. Symmetric Cryptol., 2023
Searching the space of tower field implementations of the 픽<sub>2<sup>8</sup></sub> inverter - with applications to AES, Camellia and SM4.
Int. J. Inf. Comput. Secur., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Trans. Symmetric Cryptol., 2022
Quantum Inf. Process., 2022
IACR Cryptol. ePrint Arch., 2022
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Sci. China Inf. Sci., 2022
2021
IACR Trans. Symmetric Cryptol., 2021
Motivators of Researchers' Knowledge Sharing and Community Promotion in Online Multi-Background Community.
Int. J. Knowl. Manag., 2021
Determine Factors of NFC Mobile Payment Continuous Adoption in Shopping Malls: Evidence From Indonesia.
Int. J. Bus. Intell. Res., 2021
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
IACR Cryptol. ePrint Arch., 2020
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Electron. Commer. Res. Appl., 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
Acceptance of Information and Communication Technologies in Education: An Investigation Into University Students' Intentions to Use Mobile Educational Apps.
Int. J. Enterp. Inf. Syst., 2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019
2018
Secur. Commun. Networks, 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Information Security - 21st International Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
Sci. China Inf. Sci., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Information Systems Security and Privacy, 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
CoRR, 2015
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015
2014
IET Commun., 2014
IET Commun., 2014
IACR Cryptol. ePrint Arch., 2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Finite Fields Their Appl., 2014
Appl. Algebra Eng. Commun. Comput., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
IACR Cryptol. ePrint Arch., 2013
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks.
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
On the Kipnis-Shamir Method Solving the MinRank Problem.
Proceedings of the Advances in Information and Computer Security, 2010