The following pages link to Bin Zhang (Q350925):
Displayed 40 items.
- Improved multi-pass fast correlation attacks with applications (Q350926) (← links)
- (Q458739) (redirect page) (← links)
- Computing Walsh coefficients from the algebraic normal form of a Boolean function (Q458740) (← links)
- Fault attacks on stream cipher Scream (Q1631896) (← links)
- Combined cache timing attacks and template attacks on stream cipher MUGI (Q1631921) (← links)
- Fast near collision attack on the Grain v1 stream cipher (Q1648861) (← links)
- Design and analysis of small-state grain-like stream ciphers (Q1749794) (← links)
- Practical cryptanalysis of Bluetooth encryption with condition masking (Q1753167) (← links)
- Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 (Q1784084) (← links)
- Two generic methods of analyzing stream ciphers (Q1799260) (← links)
- Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G (Q2205894) (← links)
- Security analysis of a new stream cipher (Q2507475) (← links)
- Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V (Q2673990) (← links)
- Another Tradeoff Attack on Sprout-Like Stream Ciphers (Q2795990) (← links)
- Error-Tolerant Side-Channel Cube Attack Revisited (Q2798619) (← links)
- Faster Algorithms for Solving LPN (Q2820482) (← links)
- Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking (Q2845671) (← links)
- A New Model for Error-Tolerant Side-Channel Cube Attacks (Q2851427) (← links)
- Linear Cryptanalysis of FASER128/256 and TriviA-ck (Q2945386) (← links)
- Near Collision Attack on the Grain v1 Stream Cipher (Q2946894) (← links)
- Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks (Q3449180) (← links)
- Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$ (Q3454144) (← links)
- Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 (Q3457132) (← links)
- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G ⊕ (Q3575043) (← links)
- An Improved Fast Correlation Attack on Stream Ciphers (Q3644202) (← links)
- New Cryptanalysis of Irregularly Decimated Stream Ciphers (Q3651276) (← links)
- Applied Cryptography and Network Security (Q4680949) (← links)
- An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators (Q4922052) (← links)
- Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha (Q4922883) (← links)
- Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets (Q5170767) (← links)
- Cryptanalysis of Helix and Phelix Revisited (Q5300934) (← links)
- (Q5314426) (← links)
- Multi-pass Fast Correlation Attack on Stream Ciphers (Q5429163) (← links)
- New Guess-and-Determine Attack on the Self-Shrinking Generator (Q5459069) (← links)
- Information and Communications Security (Q5464807) (← links)
- A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter (Q5507373) (← links)
- Legendre Sequences and Modified Jacobi Sequences (Q5700974) (← links)
- Topics in Cryptology – CT-RSA 2005 (Q5710851) (← links)
- Progress in Cryptology - INDOCRYPT 2004 (Q5712211) (← links)
- Information Security and Cryptology - ICISC 2005 (Q5899295) (← links)