Xiaoyang Dong

From MaRDI portal
Person:1752547

Available identifiers

zbMath Open dong.xiaoyangMaRDI QIDQ1752547

List of research outcomes





PublicationDate of PublicationType
Generic MitM attack frameworks on sponge constructions2024-12-13Paper
Quantum attacks on hash constructions with low quantum random access memory2024-08-30Paper
Automated meet-in-the-middle attack goes to Feistel2024-08-30Paper
Quantum attacks: a view of data complexity on offline Simon's algorithm2024-07-19Paper
Improved differential attacks on GIFT-642024-04-19Paper
Meet-in-the-middle preimage attacks on sponge-based hashing2023-12-08Paper
Improved attacks against reduced-round Whirlwind2023-11-07Paper
Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}2023-08-25Paper
Triangulating rebound attack on AES-like hashing2023-06-12Paper
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials2023-05-12Paper
Preimage attacks on 4-round Keccak by solving multivariate quadratic systems2022-12-07Paper
Key guessing strategies for linear key-schedule algorithms in rectangle attacks2022-08-30Paper
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks2022-04-22Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing2021-12-08Paper
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT2020-05-21Paper
Quantum attacks on some Feistel block ciphers2020-05-21Paper
Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-1282020-05-12Paper
Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-2562020-05-12Paper
MILP-based differential attack on round-reduced GIFT2020-01-28Paper
MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes2019-05-24Paper
A key-recovery attack on 855-round Trivium2018-09-26Paper
Conditional cube attack on round-reduced River Keyak2018-05-24Paper
Improved conditional cube attacks on Keccak keyed modes with MILP method2018-04-06Paper
Mathematical models of nutrient recycling and toxin production in a gradostat2017-05-31Paper
Improved Attacks on Reduced-Round Camellia-128/192/2562016-03-02Paper
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia2015-09-18Paper

Research outcomes over time

This page was built for person: Xiaoyang Dong