Danping Shi

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Scrutinizing the security of AES-based hashing and one-way functions2026-03-31Paper
Diving deep into the preimage security of AES-like hashing2024-11-12Paper
Utilizing FWT in linear cryptanalysis of block ciphers with various structures
Designs, Codes and Cryptography
2024-11-04Paper
Improved integral cryptanalysis of block ciphers BORON and Khudra2024-07-19Paper
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
Journal of Cryptology
2024-05-13Paper
Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging2024-04-19Paper
Convolutional neural network based side-channel attacks with customized filters2024-04-19Paper
Optimizing rectangle attacks: a unified and generic framework for key recovery
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing2021-12-08Paper
Security analysis of subterranean 2.0
Designs, Codes and Cryptography
2021-08-02Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS2020-03-09Paper
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints2019-01-23Paper
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions2019-01-23Paper
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
Lecture Notes in Computer Science
2015-09-18Paper


Research outcomes over time


This page was built for person: Danping Shi