default search action
Kai Zhang 0026
Person information
- affiliation: PLA SSF Information Engineering University, Zhengzhou, China
- affiliation (former): Zhengzhou Information Science and Technology Institute, China
Other persons with the same name
- Kai Zhang — disambiguation page
- Kai Zhang 0001 — Temple University, Department of Computer and Information Sciences, Philadelphia, PA, USA (and 4 more)
- Kai Zhang 0002 — Wuhan University of Science and Technology, College of Computer Science and Technology, Wuhan, China (and 1 more)
- Kai Zhang 0003 — University of North Carolina, Department of Statistics and Operations Research, Chapel Hill, NC, USA (and 2 more)
- Kai Zhang 0004 — Sichuan University, Chengdu, China (and 2 more)
- Kai Zhang 0005 — Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, Wuhan, China (and 1 more)
- Kai Zhang 0006 — Fudan University, Shanghai, China (and 1 more)
- Kai Zhang 0007 — Bytedance Inc., San Diego, CA, USA (and 4 more)
- Kai Zhang 0008 — ETH Zurich, Computer Vision Lab, Switzerland (and 3 more)
- Kai Zhang 0009 — National Digital Switching System Engineering and Technological Research Center of China, Henan, China
- Kai Zhang 0010 — Xidian University, School of Electronic Engineering, National Lab of Radar Signal Processing, Xi'an, China
- Kai Zhang 0011 — Central China Normal University, National Engineering Research Center for E-Learning, China
- Kai Zhang 0012 — Tsinghua University, Graduate School at Shenzhen, Shenzhen Key Laboratory of Advanced Sensor and Integrated System, China
- Kai Zhang 0013 — Shenzhen Polytechnic, Automotive and Transportation Engineering, China
- Kai Zhang 0014 — Southwest University, College of Agronomy and Biotechnology, Beibei, China
- Kai Zhang 0015 — University of Science and Technology of Beijing, School of Automation and Electrical Engineering, China (and 1 more)
- Kai Zhang 0016 — Shanghai University of Electric Power, Department of Information Security, China (and 1 more)
- Kai Zhang 0017 — Texas A&M University, Department of Electrical and Computer Engineering, TX, USA (and 1 more)
- Kai Zhang 0018 — Beijing University of Posts and Telecommunications, Beijing Key Laboratory of Network System Architecture and Convergence, China
- Kai Zhang 0019 — Shenzhen University, Shenzhen Audencia Business School, China
- Kai Zhang 0021 — University of California, San Diego, CA, USA
- Kai Zhang 0022 — Pennsylvania State University, Department of Kinesiology, University Park, PA, USA
- Kai Zhang 0023 — National University of Defense Technology, Changsha, China
- Kai Zhang 0024 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Kai Zhang 0025 — Worcester Polytechnic Institute, Department of Electrical and Computer Engineering, MA, USA
- Kai Zhang 0027 — TUMCREATE Ltd., Electrification Suite and Test Lab, Singapore
- Kai Zhang 0028 — Stanford University, Department of Mechanical Engineering, CA, USA
- Kai Zhang 0029 — China University of Petroleum, Department of Reservoir Engineering, Qingdao, China
- Kai Zhang 0030 — Beijing Institution of Technology, School of Automation, State Key Laboratory of Intelligent Control and Decision of Complex Systems, China
- Kai Zhang 0031 — Northwest Minzu University, School of Mathematics and Computer Science, Lanzhou, China
- Kai Zhang 0032 — South China University of Technology, Guangdong Cardiovascular Institute, Academy of Medical Sciences, Guangdong Provincial People's Hospital, Guangzhou, China
- Kai Zhang 0033 — Ohio State University, Columbus, OH, USA (and 1 more)
- Kai Zhang 0034 — Shanghai University, Shanghai Institute for Advanced Communication and Data Science, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, China
- Kai Zhang 0035 — Beijing University of Posts and Telecommunications, School of Cyberspace Security, Information Security Center, National Engineering Laboratory for Disaster Backup and Recovery, China
- Kai Zhang 0036 — Chang'an University, School of Automobile Engineering, Xi'an, China
- Kai Zhang 0037 — Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China
- Kai Zhang 0038 — University of Science and Technology of China, School of Computer Science and Technology, Hefei, Anhui, China
- Kai Zhang 0039 — Lehigh University, Bethlehem, PA, USA (and 2 more)
- Kai Zhang 0040 — Harbin Institute of Technology, Center for Control Theory and Guidance Technology, China (and 1 more)
- Kai Zhang 0041 — University of Texas Health Science Center, McWilliams School of Biomedical Informatics, Houston, TX, USA
- Kai Zhang 0042 — Shandong University of Science and Technology, College of Geodesy and Geomatics, Qingdao, China (and 1 more)
- Kai Zhang 0043 — Xi'an Jiaotong University, School of Mechanical Engineering, China
- Kai Zhang 0044 — Shaanxi Normal University, School of Mathematics and Statistics, China (and 1 more)
- Kai Zhang 0045 — Cornell University, Cornell Tech, Ithaca, IA, USA
- Kai Zhang 0046 — Northwestern Polytechnical University, School of Astronautics, Xi'an, China
- Kai Zhang 0047 — New Jersey Institute of Technology, Computer Vision Laboratory, Department of Computer Science, Newark, NJ, USA
- Kai Zhang 0048 — Chinese Academy of Sciences, CAS, Department of Key Laboratory of Computational Optical Imagine Technology, Aerospace Information Research Institute, China
- Kai Zhang 0049 — Hunan Normal University, Changsha, College of Information Science and Engineering, China (and 1 more)
- Kai Zhang 0050 — Dalian University of Technology, College of Computer Science and Technology, China
- Kai Zhang 0051 — Southwest Jiaotong University, School of Mechanical Engineering, Chengdu, China (and 1 more)
- Kai Zhang 0052 — University of Notre Dame, Department of Computer Science and Engineering, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes. IEEE Trans. Computers 73(2): 613-620 (2024) - [j17]Kai Zhang, Senpeng Wang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Tairong Shi:
Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers. IEEE Trans. Inf. Theory 70(8): 6025-6040 (2024) - 2023
- [j16]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu:
A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis. Sci. China Inf. Sci. 66(3) (2023) - [j15]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework. Des. Codes Cryptogr. 91(9): 2845-2878 (2023) - [j14]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Weak rotational property and its application. Des. Codes Cryptogr. 91(10): 3187-3214 (2023) - [j13]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
New method for combining Matsui's bounding conditions with sequential encoding method. Des. Codes Cryptogr. 91(11): 3603-3642 (2023) - [j12]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Selecting Rotation Constants on SIMON-Type Ciphers. J. Database Manag. 34(1): 1-23 (2023) - [j11]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers. IEEE Trans. Inf. Theory 69(2): 1282-1294 (2023) - [i5]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang:
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 316 (2023) - 2022
- [j10]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Research on the Security Level of μ2 against Impossible Differential cryptanalysis. KSII Trans. Internet Inf. Syst. 16(3): 972-985 (2022) - [j9]Kai Zhang, Xuejia Lai:
Another Perspective on Automatic Construction of Integral Distinguishers for ARX Ciphers. Symmetry 14(3): 461 (2022) - [i4]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi, Kai Zhang:
The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method. IACR Cryptol. ePrint Arch. 2022: 626 (2022) - 2020
- [j8]Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property. IACR Trans. Symmetric Cryptol. 2020(3): 288-304 (2020)
2010 – 2019
- 2019
- [c1]Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
MILP-aided Method of Searching Division Property Using Three Subsets and Applications. ASIACRYPT (3) 2019: 398-427 - [i3]SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
A Practical Method to Recover Exact Superpoly in Cube Attack. IACR Cryptol. ePrint Arch. 2019: 259 (2019) - 2018
- [j7]Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security evaluation on Simeck against zero-correlation linear cryptanalysis. IET Inf. Secur. 12(1): 87-93 (2018) - [i2]Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets. IACR Cryptol. ePrint Arch. 2018: 1186 (2018) - 2016
- [j6]Kai Zhang, Jie Guan, Bin Hu:
Impossible Differential Cryptanalysis on DVB-CSA. KSII Trans. Internet Inf. Syst. 10(4): 1944-1956 (2016) - [j5]Kai Zhang, Jie Guan, Bin Hu:
Zero Correlation Linear Cryptanalysis on LEA Family Ciphers. J. Commun. 11(7): 677-685 (2016) - [j4]Kai Zhang, Jie Guan, Bin Hu:
Some properties of impossible differential and zero correlation linear cryptanalysis on TEA family-type ciphers. Secur. Commun. Networks 9(18): 5746-5755 (2016) - 2015
- [j3]Kai Zhang, Jie Guan:
Distinguishing attack on common scrambling algorithm. Int. Arab J. Inf. Technol. 12(4): 410-414 (2015) - [j2]Kai Zhang, Jie Guan, Xuliang Fei:
Improved conditional differential cryptanalysis. Secur. Commun. Networks 8(9): 1801-1811 (2015) - [i1]Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 911 (2015) - 2012
- [j1]Kai Zhang, Lin Ding, Junzhi Li, Jie Guan:
Real Time Related Key Attack on Hummingbird-2. KSII Trans. Internet Inf. Syst. 6(8): 1946-1963 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint