Xiaoyang Dong

From MaRDI portal
(Redirected from Person:1752547)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Generic MitM attack frameworks on sponge constructions2024-12-13Paper
Quantum attacks on hash constructions with low quantum random access memory2024-08-30Paper
Automated meet-in-the-middle attack goes to Feistel2024-08-30Paper
Quantum attacks: a view of data complexity on offline Simon's algorithm2024-07-19Paper
Improved differential attacks on GIFT-642024-04-19Paper
Meet-in-the-middle preimage attacks on sponge-based hashing
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Improved attacks against reduced-round Whirlwind
Designs, Codes and Cryptography
2023-11-07Paper
Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Triangulating rebound attack on AES-like hashing
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
Lecture Notes in Computer Science
2023-05-12Paper
Preimage attacks on 4-round Keccak by solving multivariate quadratic systems2022-12-07Paper
Key guessing strategies for linear key-schedule algorithms in rectangle attacks2022-08-30Paper
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks2022-04-22Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing2021-12-08Paper
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
Designs, Codes and Cryptography
2020-05-21Paper
Quantum attacks on some Feistel block ciphers
Designs, Codes and Cryptography
2020-05-21Paper
Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-1282020-05-12Paper
Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-2562020-05-12Paper
MILP-based differential attack on round-reduced GIFT2020-01-28Paper
MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes
Designs, Codes and Cryptography
2019-05-24Paper
A key-recovery attack on 855-round Trivium2018-09-26Paper
Conditional cube attack on round-reduced River Keyak
Designs, Codes and Cryptography
2018-05-24Paper
Improved conditional cube attacks on Keccak keyed modes with MILP method2018-04-06Paper
Mathematical models of nutrient recycling and toxin production in a gradostat
Computers & Mathematics with Applications
2017-05-31Paper
Improved attacks on reduced-round Camellia-128/192/256
Lecture Notes in Computer Science
2016-03-02Paper
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
Fast Software Encryption
2015-09-18Paper


Research outcomes over time


This page was built for person: Xiaoyang Dong