Zejun Xiang

Orcid: 0000-0002-5149-5133

Affiliations:
  • Hubei University, Wuhan, China
  • State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China (former)


According to our database1, Zejun Xiang authored at least 27 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials.
IACR Trans. Symmetric Cryptol., 2024

Enhancing the MILP/MIQCP-based Automatic Search for Differential-Linear Distinguishers of Simon-Like Ciphers.
CoRR, 2024

MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128.
Proceedings of the Information Security - 27th International Conference, 2024

Feistel-Like Structures Revisited: Classification and Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

A Novel Method for Finding Differential-Linear Distinguishers: Application to sfMidori64, sfCRAFT, and sfSkinny64.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
Further insights on constructing quantum circuits for Camellia block cipher.
Quantum Inf. Process., December, 2023

Optimized quantum implementation of AES.
Quantum Inf. Process., September, 2023

Quantum circuit implementations of SM4 block cipher based on different gate sets.
Quantum Inf. Process., July, 2023

A Novel Automatic Technique Based on MILP to Search for Impossible Differentials.
IACR Cryptol. ePrint Arch., 2023

Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers.
IACR Cryptol. ePrint Arch., 2023

On the second-order zero differential spectra of some power functions over finite fields.
CoRR, 2023

2022
High-throughput block cipher implementations with SIMD.
J. Inf. Secur. Appl., 2022

On the bit-based division property of S-boxes.
Sci. China Inf. Sci., 2022

Cube attacks on round-reduced MORUS and Gimli.
Sci. China Inf. Sci., 2022

Conditional Cube Attacks on Full Members of KNOT-AEAD Family.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
On the Relationships between Different Methods for Degree Evaluation.
IACR Trans. Symmetric Cryptol., 2021

Quantum implementation and resource estimates for Rectangle and Knot.
Quantum Inf. Process., 2021

On the Relationships between Different Methods for Degree Evaluation (Full Version).
IACR Cryptol. ePrint Arch., 2021

A Framework to Optimize Implementations of Matrices.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

More Accurate Division Property Propagations Based on Optimized Implementations of Linear Layers.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Optimizing Implementations of Linear Layers.
IACR Trans. Symmetric Cryptol., 2020

2019
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach.
IACR Trans. Symmetric Cryptol., 2019

Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach.
IACR Cryptol. ePrint Arch., 2019

2018
Improved Integral Attacks on PRESENT-80.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2016
On the Division Property of SIMON48 and SIMON64.
IACR Cryptol. ePrint Arch., 2016

Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2016

2015
A New Cryptographic Analysis of 4-bit S-Boxes.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015


  Loading...