Xinxin Gong

Orcid: 0000-0002-5155-9889

According to our database1, Xinxin Gong authored at least 16 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW.
Des. Codes Cryptogr., June, 2024

A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods.
IACR Cryptol. ePrint Arch., 2024

2023
Cross-platform product matching based on entity alignment of knowledge graph with raea model.
World Wide Web (WWW), July, 2023

Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher.
IACR Trans. Symmetric Cryptol., 2023

Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE.
IACR Cryptol. ePrint Arch., 2023

Key Filtering in Cube Attacks from the Implementation Aspect.
IACR Cryptol. ePrint Arch., 2023

2022
Cross-platform Product Matching Based on Knowledge Graph.
Proceedings of the Web and Big Data. APWeb-WAIM 2022 International Workshops, 2022

2021
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks.
IACR Trans. Symmetric Cryptol., 2021

Resistance of SNOW-V against Fast Correlation Attacks.
IACR Trans. Symmetric Cryptol., 2021

FAN: A Lightweight Authenticated Cryptographic Algorithm.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G.
Des. Codes Cryptogr., 2020

2017
Fast Correlation Attacks on Grain-like Small State Stream Ciphers.
IACR Trans. Symmetric Cryptol., 2017

New Algorithms for Solving LPN.
IACR Cryptol. ePrint Arch., 2017

2015
Another Tradeoff Attack on Sprout-Like Stream Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Computing Walsh coefficients from the algebraic normal form of a Boolean function.
Cryptogr. Commun., 2014

2013
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013


  Loading...