Tairong Shi

Orcid: 0000-0002-9332-2740

According to our database1, Tairong Shi authored at least 20 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers.
IEEE Trans. Inf. Theory, August, 2024

Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes.
IEEE Trans. Computers, February, 2024

Quantum Guess and Determine Attack on Stream Ciphers.
Comput. J., January, 2024

A Framework to Improve the Implementations of Linear Layers.
IACR Trans. Symmetric Cryptol., 2024

Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACs.
IEEE Trans. Inf. Forensics Secur., 2024

2023
New method for combining Matsui's bounding conditions with sequential encoding method.
Des. Codes Cryptogr., November, 2023

Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework.
Des. Codes Cryptogr., September, 2023

Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers.
IEEE Trans. Inf. Theory, February, 2023

New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Practical Attacks on Full-round FRIET.
IACR Trans. Symmetric Cryptol., 2022

The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method.
IACR Cryptol. ePrint Arch., 2022

2021
Breaking LWC candidates: sESTATE and Elephant in quantum setting.
Des. Codes Cryptogr., 2021

2020
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property.
IACR Trans. Symmetric Cryptol., 2020

2019
Complete analysis of Simon's quantum algorithm with additional collisions.
Quantum Inf. Process., 2019

Cryptanalysis of the Authentication in ACORN.
KSII Trans. Internet Inf. Syst., 2019

A Practical Method to Recover Exact Superpoly in Cube Attack.
IACR Cryptol. ePrint Arch., 2019

Real-time state recovery attack against MORUS in nonce-misuse setting.
Sci. China Inf. Sci., 2019

MILP-aided Method of Searching Division Property Using Three Subsets and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets.
IACR Cryptol. ePrint Arch., 2018


  Loading...