Danping Shi

From MaRDI portal
Person:1710586



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Scrutinizing the security of AES-based hashing and one-way functions2026-03-31Paper
Diving deep into the preimage security of AES-like hashing2024-11-12Paper
Utilizing FWT in linear cryptanalysis of block ciphers with various structures
Designs, Codes and Cryptography
2024-11-04Paper
Improved integral cryptanalysis of block ciphers BORON and Khudra2024-07-19Paper
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
Journal of Cryptology
2024-05-13Paper
Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging2024-04-19Paper
Convolutional neural network based side-channel attacks with customized filters2024-04-19Paper
Optimizing rectangle attacks: a unified and generic framework for key recovery
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing2021-12-08Paper
Security analysis of subterranean 2.0
Designs, Codes and Cryptography
2021-08-02Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS2020-03-09Paper
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints2019-01-23Paper
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions2019-01-23Paper
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
Lecture Notes in Computer Science
2015-09-18Paper


Research outcomes over time


This page was built for person: Danping Shi