Xiutao Feng

Orcid: 0000-0003-4260-2571

According to our database1, Xiutao Feng authored at least 46 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cryptanalysis of BAKSHEESH Block Cipher.
IACR Cryptol. ePrint Arch., 2024

Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure.
IACR Cryptol. ePrint Arch., 2024

Guess and Determine Analysis Based on Set Split.
IACR Cryptol. ePrint Arch., 2024

On the construction of ultra-light MDS matrices.
CoRR, 2024

2023
The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited.
Des. Codes Cryptogr., May, 2023

A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers.
IACR Trans. Symmetric Cryptol., 2023

On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses.
IACR Cryptol. ePrint Arch., 2023

CNF Characterization of Sets over ℤ<sub>2<sup>n</sup></sub> and Its Applications in Cryptography.
IACR Cryptol. ePrint Arch., 2023

A classification of permutation binomials of the form x<sup>i</sup>+ax over {F<sub>2<sup>n</sup></sub> for dimensions up to 8.
CoRR, 2023

2022
Straightforward Guess and Determine Analysis Based on Genetic Algorithm.
J. Syst. Sci. Complex., 2022

Invertibility of multiple random functions and its application to symmetric ciphers.
IACR Cryptol. ePrint Arch., 2022

Applications of Quantum Annealing in Cryptography.
CoRR, 2022

2021
Grain-like structures with minimal and maximal period sequences.
Des. Codes Cryptogr., 2021

2020
Minimizing Deduction System and its Application.
CoRR, 2020

2019
On the Derivative Imbalance and Ambiguity of Functions.
IEEE Trans. Inf. Theory, 2019

Complete permutation polynomials with the form (xpm-x+δ)s+axpm+bx over Fpn.
Finite Fields Their Appl., 2019

Further results on complete permutation monomials over finite fields.
Finite Fields Their Appl., 2019

A recursive construction of permutation polynomials over F<sub>q<sup>2</sup></sub> with odd characteristic related to Rédei functions.
Des. Codes Cryptogr., 2019

Involutory differentially 4-uniform permutations from known constructions.
Des. Codes Cryptogr., 2019

2018
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme.
Int. J. Bifurc. Chaos, 2018

Fault Attack on ACORN v3.
Comput. J., 2018

2017
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies.
IACR Trans. Symmetric Cryptol., 2017

Fault Attack on the Authenticated Cipher ACORN v2.
Secur. Commun. Networks, 2017

A Recursive Construction of Permutation Polynomials over F<sub>q<sup>2</sup></sub> with Odd Characteristic from Rédei Functions.
CoRR, 2017

On the Ambiguity of Differentially Uniform Functions.
CoRR, 2017

2016
On algebraic immunity of trace inverse functions on finite fields of characteristic two.
J. Syst. Sci. Complex., 2016

Further Results of the Cryptographic Properties on the Butterfly Structure.
CoRR, 2016

2015
Improved Differential Fault Attack on the Block Cipher SPECK.
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015

2014
A practical forgery and state recovery attack on the authenticated cipher PANDA-s.
IACR Cryptol. ePrint Arch., 2014

A realtime key recovery attack on the authenticated cipher FASER128.
IACR Cryptol. ePrint Arch., 2014

A practical state recovery attack on the stream cipher Sablier v1.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis on the Authenticated Cipher Sablier.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
On Algebraic Immunity of Tr(x<sup>-1</sup>) over 𝔽<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2013

2012
A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
On Guess and Determine Analysis of Rabbit.
Int. J. Found. Comput. Sci., 2011

Linear Approximations of Addition Modulo 2<sup><i>n</i></sup>-1.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

The Initialization Stage Analysis of ZUC v1.5.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Linear Approximations of Addition Modulo 2<sup>n</sup>-1.
IACR Cryptol. ePrint Arch., 2010

Loiss: A Byte-Oriented Stream Cipher.
IACR Cryptol. ePrint Arch., 2010

A Byte-Based Guess and Determine Attack on SOSEMANUK.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2007
Classification and counting on multi-continued fractions and its application to multi-sequences.
Sci. China Ser. F Inf. Sci., 2007

2005
Multi-sequences with <i>d</i>-perfect property.
J. Complex., 2005

2004
Multi-sequences with d-perfect property.
IACR Cryptol. ePrint Arch., 2004

Expected Value of the Linear Complexity of Two-Dimensional Binary Sequences.
Proceedings of the Sequences and Their Applications, 2004

Multi-continued Fraction Algorithm and Generalized B-M Algorithm over F<sub>2</sub>.
Proceedings of the Sequences and Their Applications, 2004

Multisequences with d-perfect property.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004


  Loading...