| Publication | Date of Publication | Type |
|---|
Improved preimage attacks on Ascon-XOF based on linearization technique Designs, Codes and Cryptography | 2026-01-28 | Paper |
The construction of quantum distinguishers for GFS based on Simon's algorithm International Journal of Quantum Information | 2025-11-17 | Paper |
Improved fast correlation attack using multiple linear approximations and its application on SOSEMANUK IEEE Transactions on Information Theory | 2025-01-23 | Paper |
New methods for bounding the length of impossible differentials of SPN block ciphers IEEE Transactions on Information Theory | 2025-01-23 | Paper |
Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model IEEE Transactions on Information Theory | 2024-07-23 | Paper |
Impossible differential cryptanalysis and a security evaluation framework for AND-RX ciphers IEEE Transactions on Information Theory | 2024-07-23 | Paper |
Fast correlation attacks on K2 stream cipher IEEE Transactions on Information Theory | 2024-07-18 | Paper |
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers IEEE Transactions on Information Theory | 2024-03-18 | Paper |
New method for combining Matsui's bounding conditions with sequential encoding method Designs, Codes and Cryptography | 2023-11-07 | Paper |
Weak rotational property and its application Designs, Codes and Cryptography | 2023-10-12 | Paper |
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework Designs, Codes and Cryptography | 2023-09-07 | Paper |
Complete analysis of Simon's quantum algorithm with additional collisions Quantum Information Processing | 2023-01-05 | Paper |
A New General Method of Searching for Cubes in Cube Attacks 1515.94063 | 2022-12-21 | Paper |
| On the structure property of PCR's adjacency graph with a prime order and its application of constructing M-sequences | 2021-12-08 | Paper |
Breaking LWC candidates: sESTATE and Elephant in quantum setting Designs, Codes and Cryptography | 2021-06-24 | Paper |
Cryptanalysis of Loiss stream cipher -- revisited Journal of Applied Mathematics | 2019-11-19 | Paper |
On equivalence relations of state diagram of cascade connection of an LFSR into an NFSR International Journal of Foundations of Computer Science | 2019-06-24 | Paper |
| Construction methods for a class of lightweight optimal S-boxes | 2019-06-21 | Paper |
| Linear properties of the round function of \textsc{SIMON} family of block ciphers | 2016-08-10 | Paper |
| Meet-in-the-middle cube attack on reduced version of KeeLoq | 2016-08-10 | Paper |
| Algebraic attacks on Trivium-like stream ciphers | 2015-06-29 | Paper |
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
The probability distribution and application of XOR difference between \( (X+K)\mod 2^n\) and \(X\oplus K\) Journal of Systems Science and Mathematical Sciences | 2012-10-05 | Paper |
| An improved Salsa20 stream cipher | 2012-01-27 | Paper |
| scientific article; zbMATH DE number 6001315 (Why is no real title available?) | 2012-01-27 | Paper |
Improved Collision Attack on Reduced Round Camellia Cryptology and Network Security | 2009-01-09 | Paper |