Yonglin Hao
Orcid: 0000-0003-4069-2438
According to our database1,
Yonglin Hao
authored at least 33 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW.
Des. Codes Cryptogr., June, 2024
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods.
IACR Cryptol. ePrint Arch., 2024
2023
IET Inf. Secur., July, 2023
Des. Codes Cryptogr., May, 2023
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
2021
J. Cryptol., 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019
2018
IEEE Trans. Computers, 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
2016
Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers.
IET Inf. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack.
Sci. China Inf. Sci., 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013