Ling Song

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond2024-11-12Paper
Improving the rectangle attack on GIFT-642024-10-16Paper
CCA security for contracting (quasi-)Feistel constructions with tight round complexity
Designs, Codes and Cryptography
2024-08-13Paper
Revisiting the boomerang attack from a perspective of 3-differential
IEEE Transactions on Information Theory
2024-07-23Paper
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
Journal of Cryptology
2024-05-13Paper
Improved differential cryptanalysis on SPECK using plaintext structures2024-01-11Paper
Optimizing rectangle attacks: a unified and generic framework for key recovery
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Key structures: improved related-key boomerang attack against the full AES-256
Information Security and Privacy
2023-07-26Paper
Towards closing the security gap of Tweak-aNd-Tweak (TNT)2023-03-21Paper
TNT: how to tweak a block cipher2022-03-23Paper
Security analysis of subterranean 2.0
Designs, Codes and Cryptography
2021-08-02Paper
On edge Mostar index of graphs2021-05-17Paper
Some properties of the leap eccentric connectivity index of graphs2021-05-17Paper
Leap eccentric connectivity index of some graph operations with subdivided edges2021-04-07Paper
Weighted k-prototypes clustering algorithm based on the hybrid dissimilarity coefficient
Mathematical Problems in Engineering
2020-08-25Paper
Practical collision attacks against round-reduced SHA-3
Journal of Cryptology
2020-03-03Paper
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes2019-02-20Paper
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions2019-01-23Paper
Improved differential analysis of block cipher PRIDE2018-12-07Paper
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s2018-10-24Paper
Related-key impossible differential analysis of full Khudra2018-10-24Paper
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis2018-10-18Paper
Boomerang Connectivity Table: a new cryptanalysis tool2018-07-09Paper
Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}2017-11-15Paper
New collision attacks on round-reduced Keccak
Lecture Notes in Computer Science
2017-06-23Paper
Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
Information Security and Privacy
2016-09-02Paper
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks
Information Security and Cryptology
2015-12-02Paper
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
Lecture Notes in Computer Science
2015-09-18Paper
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
Lecture Notes in Computer Science
2015-01-16Paper
Differential Fault Attack on the PRINCE Block Cipher
Lecture Notes in Computer Science
2013-10-10Paper
Novel intrusion detection algorithm based on semi-supervised clustering
Journal of Computer Applications
2009-11-22Paper
Weak convergence of the distribution of independent random variable series in Hilbert spaces2008-04-04Paper


Research outcomes over time


This page was built for person: Ling Song