Cited By
View all- Shi JLiu GLi CLi Y(2024)Automated-Based Rebound Attacks on ACE PermutationTopics in Cryptology – CT-RSA 202410.1007/978-3-031-58868-6_4(78-111)Online publication date: 6-May-2024
- Li YLiu FWang G(2024)New Records in Collision Attacks on SHA-2Advances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58716-0_6(158-186)Online publication date: 26-May-2024
- Li YChen XGuo WLi XLuo WHuang JZhen HYuan MYan JSingh ASun YAkoglu LGunopulos DYan XKumar ROzcan FYe J(2023)HardSATGEN: Understanding the Difficulty of Hard SAT Formula Generation and A Strong Structure-Hardness-Aware BaselineProceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3580305.3599837(4414-4425)Online publication date: 6-Aug-2023
- Show More Cited By