default search action
Siwei Sun
Person information
- affiliation: University of Chinese Academy of Sciences, School of Cryptology, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Gao Wang, Gaoli Wang, Siwei Sun:
Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis. IEICE Trans. Inf. Syst. 107(8): 1016-1028 (2024) - [c45]Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang:
Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations. CRYPTO (4) 2024: 73-104 - [c44]Zhen Wan, Sugang Ma, Zixian Zhang, Siwei Sun:
SiamDTA: Dual-Template Siamese Network Visual Object Tracking Algorithm Based on Attention Mechanism. NaNA 2024: 418-423 - [i50]Kexin Qiao, Siwei Sun, Zhaoyang Wang, Zehan Wu, Junjie Cheng, An Wang, Liehuang Zhu:
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2024: 135 (2024) - [i49]Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang:
Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations. IACR Cryptol. ePrint Arch. 2024: 857 (2024) - 2023
- [j29]Wenxiao Qiao, Hailun Yan, Siwei Sun, Lei Hu, Jiwu Jing:
New cryptanalysis of LowMC with algebraic techniques. Des. Codes Cryptogr. 91(5): 2057-2075 (2023) - [j28]Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta:
Searching the space of tower field implementations of the 픽28 inverter - with applications to AES, Camellia and SM4. Int. J. Inf. Comput. Secur. 20(1/2): 1-26 (2023) - [j27]Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:
Rotational Differential-Linear Cryptanalysis Revisited. J. Cryptol. 36(1): 3 (2023) - [j26]Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers. IACR Trans. Symmetric Cryptol. 2023(1): 152-191 (2023) - [j25]Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu:
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR Trans. Symmetric Cryptol. 2023(2): 224-252 (2023) - [c43]Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang:
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY. EUROCRYPT (4) 2023: 67-97 - [c42]Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH. SAC 2023: 22-42 - [i48]Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper). IACR Cryptol. ePrint Arch. 2023: 202 (2023) - [i47]Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang:
Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY. IACR Cryptol. ePrint Arch. 2023: 255 (2023) - [i46]Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu:
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2023: 772 (2023) - [i45]Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH. IACR Cryptol. ePrint Arch. 2023: 865 (2023) - [i44]Zhongfeng Niu, Siwei Sun, Hailun Yan, Qi Wang:
General Results of Linear Approximations over Finite Abelian Groups. IACR Cryptol. ePrint Arch. 2023: 911 (2023) - [i43]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023) - 2022
- [j24]Man Wei, Siwei Sun, Zihao Wei, Zheng Gong, Lei Hu:
A small first-order DPA resistant AES implementation with no fresh randomness. Sci. China Inf. Sci. 65(6): 1-3 (2022) - [j23]Jian Zou, Zihao Wei, Siwei Sun, Yiyuan Luo, Qian Liu, Wenling Wu:
Some efficient quantum circuit implementations of Camellia. Quantum Inf. Process. 21(4): 131 (2022) - [j22]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Trans. Symmetric Cryptol. 2022(2): 63-91 (2022) - [j21]Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu:
New Properties of the Double Boomerang Connectivity Table. IACR Trans. Symmetric Cryptol. 2022(4): 208-242 (2022) - [c41]Zhenyu Huang, Siwei Sun:
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. ASIACRYPT (3) 2022: 614-644 - [c40]Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li:
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks. CRYPTO (1) 2022: 3-32 - [c39]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. EUROCRYPT (3) 2022: 3-33 - [i42]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Cryptol. ePrint Arch. 2022: 568 (2022) - [i41]Zhenyu Huang, Siwei Sun:
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. IACR Cryptol. ePrint Arch. 2022: 620 (2022) - [i40]Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li:
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks. IACR Cryptol. ePrint Arch. 2022: 765 (2022) - [i39]Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3. IACR Cryptol. ePrint Arch. 2022: 1491 (2022) - [i38]Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3. IACR Cryptol. ePrint Arch. 2022: 1552 (2022) - [i37]Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu:
New Properties of Double Boomerang Connectivity Table. IACR Cryptol. ePrint Arch. 2022: 1579 (2022) - 2021
- [j20]Man Wei, Siwei Sun, Zihao Wei, Lei Hu:
Unbalanced sharing: a threshold implementation of SM4. Sci. China Inf. Sci. 64(5) (2021) - [j19]Siwei Sun, Fangyu Zhang, Kaicheng Liao, Victor I. Chang:
Determine Factors of NFC Mobile Payment Continuous Adoption in Shopping Malls: Evidence From Indonesia. Int. J. Bus. Intell. Res. 12(2): 1-20 (2021) - [j18]Siwei Sun, Fangyu Zhang, Victor Chang:
Motivators of Researchers' Knowledge Sharing and Community Promotion in Online Multi-Background Community. Int. J. Knowl. Manag. 17(2): 23-49 (2021) - [j17]Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun:
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. IACR Trans. Symmetric Cryptol. 2021(1): 130-155 (2021) - [c38]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. ASIACRYPT (1) 2021: 241-271 - [c37]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. ASIACRYPT (1) 2021: 392-421 - [c36]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. CRYPTO (3) 2021: 278-308 - [c35]Chao Niu, Muzhou Li, Siwei Sun, Meiqin Wang:
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys. CT-RSA 2021: 126-147 - [c34]Yunwen Liu, Siwei Sun, Chao Li:
Rotational Cryptanalysis from a Differential-Linear Perspective - Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette. EUROCRYPT (1) 2021: 741-770 - [c33]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804 - [c32]Yingjie Zhang, Lijun Lyu, Kexin Qiao, Zhiyu Zhang, Siwei Sun, Lei Hu:
Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK. ISPEC 2021: 147-167 - [i36]Yunwen Liu, Siwei Sun, Chao Li:
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette. IACR Cryptol. ePrint Arch. 2021: 189 (2021) - [i35]Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun:
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. IACR Cryptol. ePrint Arch. 2021: 194 (2021) - [i34]Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:
A Note on the Bias of Rotational Differential-Linear Distinguishers. IACR Cryptol. ePrint Arch. 2021: 379 (2021) - [i33]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. IACR Cryptol. ePrint Arch. 2021: 427 (2021) - [i32]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. IACR Cryptol. ePrint Arch. 2021: 856 (2021) - [i31]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. IACR Cryptol. ePrint Arch. 2021: 1119 (2021) - [i30]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. IACR Cryptol. ePrint Arch. 2021: 1225 (2021) - 2020
- [j16]Fangyu Zhang, Siwei Sun, Chenlin Liu, Victor Chang:
Consumer innovativeness, product innovation and smart toys. Electron. Commer. Res. Appl. 41: 100974 (2020) - [j15]Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Trans. Symmetric Cryptol. 2020(3): 119-151 (2020) - [j14]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2020(3): 152-174 (2020) - [c31]Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. ASIACRYPT (1) 2020: 446-476 - [c30]Jian Zou, Zihao Wei, Siwei Sun, Ximeng Liu, Wenling Wu:
Quantum Circuit Implementations of AES with Fewer Qubits. ASIACRYPT (2) 2020: 697-726 - [c29]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. ASIACRYPT (2) 2020: 727-757 - [c28]Bowen Liu, Pawel Szalachowski, Siwei Sun:
Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. AsiaCCS 2020: 506-518 - [c27]Bowen Liu, Siwei Sun, Pawel Szalachowski:
SMACS: Smart Contract Access Control Service. DSN 2020: 221-232 - [i29]Bowen Liu, Pawel Szalachowski, Siwei Sun:
Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. CoRR abs/2003.06127 (2020) - [i28]Bowen Liu, Siwei Sun, Pawel Szalachowski:
SMACS: Smart Contract Access Control Service. CoRR abs/2003.07495 (2020) - [i27]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020) - [i26]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. IACR Cryptol. ePrint Arch. 2020: 1030 (2020) - [i25]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1045 (2020) - [i24]Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. IACR Cryptol. ePrint Arch. 2020: 1048 (2020) - [i23]Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Cryptol. ePrint Arch. 2020: 1177 (2020)
2010 – 2019
- 2019
- [j13]Siwei Sun, Chang Xiong, Victor Chang:
Acceptance of Information and Communication Technologies in Education: An Investigation Into University Students' Intentions to Use Mobile Educational Apps. Int. J. Enterp. Inf. Syst. 15(1): 24-44 (2019) - [j12]Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu:
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits. IACR Trans. Symmetric Cryptol. 2019(1): 84-117 (2019) - [j11]Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu:
Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Trans. Symmetric Cryptol. 2019(4): 147-170 (2019) - [c26]Song Liang, Siwei Sun, Lichen Zhang, Yuan Yao:
Fabrication of UTC-PDs Integrated with THz Antenna. ComComAP 2019: 40-43 - [c25]Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS. CRYPTO (2) 2019: 180-209 - [c24]Chunpeng Ge, Siwei Sun, Pawel Szalachowski:
Permission less Block chains and Secure Logging. IEEE ICBC 2019: 56-60 - [c23]Qiu Chen, Danping Shi, Siwei Sun, Lei Hu:
Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. ICICS 2019: 233-247 - [c22]Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu:
Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. ICICS 2019: 799-813 - [c21]Jiahao Cai, Zihao Wei, Yingjie Zhang, Siwei Sun, Lei Hu:
Zero-sum Distinguishers for Round-reduced GIMLI Permutation. ICISSP 2019: 38-43 - [c20]Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun:
StrongChain: Transparent and Collaborative Proof-of-Work Consensus. USENIX Security Symposium 2019: 819-836 - [i22]Chunpeng Ge, Siwei Sun, Pawel Szalachowski:
Permissionless Blockchains and Secure Logging. CoRR abs/1903.03954 (2019) - [i21]Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun:
StrongChain: Transparent and Collaborative Proof-of-Work Consensus. CoRR abs/1905.09655 (2019) - [i20]Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu:
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit. IACR Cryptol. ePrint Arch. 2019: 107 (2019) - [i19]Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. IACR Cryptol. ePrint Arch. 2019: 172 (2019) - [i18]Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu:
Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Cryptol. ePrint Arch. 2019: 1310 (2019) - 2018
- [j10]Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun:
On the Complexity of Impossible Differential Cryptanalysis. Secur. Commun. Networks 2018: 7393401:1-7393401:11 (2018) - [j9]Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018) - [c19]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. ASIACRYPT (2) 2018: 3-34 - [c18]Yingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu:
Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy. ISC 2018: 101-115 - [i17]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. IACR Cryptol. ePrint Arch. 2018: 813 (2018) - 2017
- [j8]Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. Sci. China Inf. Sci. 60(3): 39101:1-39101:3 (2017) - [j7]Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Trans. Symmetric Cryptol. 2017(1): 281-306 (2017) - [i16]Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 162 (2017) - 2016
- [c17]Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. FSE 2016: 268-288 - [c16]Kexin Qiao, Lei Hu, Siwei Sun:
Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques. ICISSP (Revised Selected Papers) 2016: 64-85 - [c15]Kexin Qiao, Lei Hu, Siwei Sun:
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. ICISSP 2016: 74-84 - [c14]Danping Shi, Lei Hu, Siwei Sun, Ling Song:
Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. ICISSP 2016: 364-371 - [c13]Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Related-Key Impossible Differential Analysis of Full Khudra. IWSEC 2016: 135-146 - [c12]Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. NSS 2016: 398-411 - [i15]Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher. IACR Cryptol. ePrint Arch. 2016: 84 (2016) - [i14]Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu:
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or. IACR Cryptol. ePrint Arch. 2016: 338 (2016) - [i13]Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck. IACR Cryptol. ePrint Arch. 2016: 407 (2016) - 2015
- [j6]Kexin Qiao, Lei Hu, Siwei Sun, Xiaoshuang Ma, Haibin Kan:
Improved MILP Modeling for Automatic Security Evaluation and Application to FOX. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 72-80 (2015) - [j5]Danping Shi, Lei Hu, Ling Song, Siwei Sun:
Differential fault attack on Zorro block cipher. Secur. Commun. Networks 8(16): 2826-2835 (2015) - [c11]Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:
Improved Differential Analysis of Block Cipher PRIDE. ISPEC 2015: 209-219 - [c10]Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan:
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. ISC 2015: 141-157 - [c9]Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song:
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s. IWSEC 2015: 97-111 - [i12]Zhengbang Zha, Lei Hu, Siwei Sun, Jinyong Shan:
Further results on differentially 4-uniform permutations over F22m. CoRR abs/1502.03874 (2015) - [i11]Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. IACR Cryptol. ePrint Arch. 2015: 122 (2015) - [i10]Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Related-key Impossible Differential Analysis of Full Khudra. IACR Cryptol. ePrint Arch. 2015: 840 (2015) - [i9]Kexin Qiao, Lei Hu, Siwei Sun:
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. IACR Cryptol. ePrint Arch. 2015: 902 (2015) - [i8]Danping Shi, Lei Hu, Siwei Sun, Ling Song:
Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN. IACR Cryptol. ePrint Arch. 2015: 964 (2015) - 2014
- [j4]Zhengbang Zha, Lei Hu, Siwei Sun, Yao Sun:
New constructions of APN polynomial functions in odd characteristic. Appl. Algebra Eng. Commun. Comput. 25(4): 249-263 (2014) - [j3]Zhengbang Zha, Lei Hu, Siwei Sun:
Constructing new differentially 4-uniform permutations from the inverse function. Finite Fields Their Appl. 25: 64-78 (2014) - [j2]Jun Xu, Lei Hu, Siwei Sun, Yonghong Xie:
Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET Commun. 8(12): 2142-2146 (2014) - [j1]Jun Xu, Lei Hu, Siwei Sun:
Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET Commun. 8(14): 2433-2437 (2014) - [c8]Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song:
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. ASIACRYPT (1) 2014: 158-178 - [c7]Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:
Error-Tolerant Algebraic Side-Channel Attacks Using BEE. ICICS 2014: 1-15 - [c6]Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan:
Tighter Security Bound of MIBS Block Cipher against Differential Attack. NSS 2014: 518-525 - [i7]Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:
Error-Tolerant Algebraic Side-Channel Attacks Using BEE. IACR Cryptol. ePrint Arch. 2014: 683 (2014) - [i6]Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song:
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications. IACR Cryptol. ePrint Arch. 2014: 747 (2014) - [i5]Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON. IACR Cryptol. ePrint Arch. 2014: 973 (2014) - [i4]Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:
Improved Differential Analysis of Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 978 (2014) - [i3]Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma:
Related-Key Differential Attack on Round Reduced RECTANGLE-80. IACR Cryptol. ePrint Arch. 2014: 986 (2014) - 2013
- [c5]Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks. Inscrypt 2013: 39-51 - [i2]Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 547 (2013) - [i1]Siwei Sun, Lei Hu, Peng Wang:
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others. IACR Cryptol. ePrint Arch. 2013: 676 (2013) - 2012
- [c4]Jun Xu, Lei Hu, Siwei Sun, Ping Wang:
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. CANS 2012: 32-42 - [c3]Jun Xu, Lei Hu, Siwei Sun:
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem. ICICS 2012: 45-57 - 2011
- [c2]Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng:
Cube Cryptanalysis of Hitag2 Stream Cipher. CANS 2011: 15-25 - 2010
- [c1]Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun:
On the Kipnis-Shamir Method Solving the MinRank Problem. IWSEC (Short Papers) 2010: 1-13
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint