| Publication | Date of Publication | Type |
|---|
| Vectorial fast correlation attacks | 2026-03-31 | Paper |
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes Designs, Codes and Cryptography | 2024-11-04 | Paper |
Yoyo attack on 4-round Lai-Massey scheme with secret round functions Designs, Codes and Cryptography | 2024-08-23 | Paper |
| Related-cipher attacks: applications to Ballet and ANT | 2024-01-11 | Paper |
LLLWBC: a new low-latency light-weight block cipher Information Security and Cryptology | 2023-08-21 | Paper |
Post-quantum security on the Lai-Massey scheme Designs, Codes and Cryptography | 2023-07-28 | Paper |
Improved differential attack on round-reduced LEA Information Security and Privacy | 2023-07-26 | Paper |
Generic construction of Boolean functions with a few Walsh transform values of any possible algebraic degree Advances in Mathematics of Communications | 2023-07-07 | Paper |
| Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count | 2023-04-13 | Paper |
| Quantum circuit implementations of AES with fewer qubits | 2023-03-21 | Paper |
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys Quantum Information Processing | 2022-12-05 | Paper |
New quantum circuit implementations of SM4 and SM3 Quantum Information Processing | 2022-12-05 | Paper |
Some efficient quantum circuit implementations of Camellia Quantum Information Processing | 2022-11-29 | Paper |
| Transparency order of \((n, m)\)-functions -- its further characterization and applications | 2022-07-13 | Paper |
| Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA | 2022-07-06 | Paper |
| On characterization of transparency order for \((n, m)\)-functions | 2022-07-01 | Paper |
| A new non-random property of 4.5-round PRINCE | 2022-03-24 | Paper |
Breaking LWC candidates: sESTATE and Elephant in quantum setting Designs, Codes and Cryptography | 2021-06-24 | Paper |
Lattice-based fault attacks against ECMQV Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions Information Sciences | 2020-07-02 | Paper |
Coordination of advertising free riding in hybrid channel supply chain Discrete Dynamics in Nature and Society | 2019-02-20 | Paper |
| Security of SM4 against (related-key) differential cryptanalysis | 2018-12-07 | Paper |
| Linear regression attack with F-test: a new SCARE technique for secret block ciphers | 2018-10-26 | Paper |
| Security of online AE schemes in RUP setting | 2018-10-26 | Paper |
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE Fast Software Encryption | 2018-05-09 | Paper |
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 Designs, Codes and Cryptography | 2018-04-10 | Paper |
Biclique attack of block cipher \texttt{SKINNY} Information Security and Cryptology | 2017-05-05 | Paper |
My traces learn what you did in the dark: recovering secret signals without key guesses Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
New criterion for diffusion property and applications to improved GFS and EGFN Designs, Codes and Cryptography | 2016-10-21 | Paper |
| Meet-in-the-middle attack on TWINE block cipher | 2016-08-10 | Paper |
Constructing lightweight optimal diffusion primitives with Feistel structure Lecture Notes in Computer Science | 2016-05-19 | Paper |
Integral attack against bit-oriented block ciphers Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
Two lattice-based differential fault attacks against ECDSA with \(w\)NAF algorithm Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes Lecture Notes in Computer Science | 2016-05-19 | Paper |
New observations on Piccolo block cipher Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Structural evaluation for generalized Feistel structures and applications to LBlock and TWINE Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions Selected Areas in Cryptography | 2015-12-04 | Paper |
LHash: a lightweight hash function Information Security and Cryptology | 2015-12-02 | Paper |
Cryptanalysis of the Round-Reduced GOST Hash Function Information Security and Cryptology | 2015-12-02 | Paper |
The DBlock family of block ciphers Science China Information Sciences | 2015-11-20 | Paper |
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes Frontiers of Computer Science | 2015-11-20 | Paper |
General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
First multidimensional cryptanalysis on reduced-round \(\mathrm{PRINCE}_{core}\) Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
Reflection Cryptanalysis of PRINCE-Like Ciphers Fast Software Encryption | 2015-09-18 | Paper |
Reflection cryptanalysis of PRINCE-like ciphers Journal of Cryptology | 2015-08-03 | Paper |
Computing Walsh coefficients from the algebraic normal form of a Boolean function Cryptography and Communications | 2014-10-08 | Paper |
Attacking and fixing the CS mode Information and Communications Security | 2014-09-29 | Paper |
Differential analysis of the extended generalized Feistel networks Information Processing Letters | 2014-08-28 | Paper |
Improved multidimensional zero-correlation linear cryptanalysis and applications to lblock and TWINE Information Security and Privacy | 2014-07-24 | Paper |
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro Applied Cryptography and Network Security | 2014-07-07 | Paper |
Security of the SMS4 block cipher against differential cryptanalysis Journal of Computer Science and Technology | 2014-02-06 | Paper |
Leaked-state-forgery attack against the authenticated encryption algorithm ALE Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
CBCR: CBC MAC with rotating transformations Science China Information Sciences | 2013-07-03 | Paper |
Improved key recovery attacks on reduced-round Salsa20 and ChaCha Lecture Notes in Computer Science | 2013-06-04 | Paper |
| Improved integral attacks on Rijndael | 2013-04-16 | Paper |
3kf9: enhancing 3GPP-MAC beyond the birthday bound Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
(Pseudo) preimage attack on round-reduced Grøstl hash function and others Fast Software Encryption | 2013-01-08 | Paper |
Cryptanalysis of reduced-round KLEIN block cipher Information Security and Cryptology | 2013-01-07 | Paper |
Preimage Attacks on Step-Reduced SM3 Hash Function Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers Applied Cryptography and Network Security | 2012-09-10 | Paper |
Biclique cryptanalysis of reduced-round Piccolo block cipher Information Security Practice and Experience | 2012-06-29 | Paper |
TrCBC: another look at CBC-MAC Information Processing Letters | 2012-05-04 | Paper |
Polye+CTR: a swiss-army-knife mode for block ciphers Provable Security | 2011-09-16 | Paper |
Hyper-Sbox view of AES-like permutations: a generalized distinguisher Information Security and Cryptology | 2011-07-29 | Paper |
LBlock: a lightweight block cipher Applied Cryptography and Network Security | 2011-06-28 | Paper |
BCBC: a more efficient MAC algorithm Information Security Practice and Experience | 2011-05-19 | Paper |
Near-collisions on the reduced-round compression functions of Skein and BLAKE Cryptology and Network Security | 2010-12-07 | Paper |
Proposition of two cipher structures Information Security and Cryptology | 2010-11-23 | Paper |
Some results on cryptanalysis of SMS4 block cipher International Journal of Applied Cryptography | 2010-09-22 | Paper |
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited Fast Software Encryption | 2010-07-13 | Paper |
Cryptanalysis of the LANE hash function Selected Areas in Cryptography | 2009-12-09 | Paper |
| The state-of-the-art of research on impossible differential cryptanalysis | 2009-11-11 | Paper |
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia Selected Areas in Cryptography | 2009-11-03 | Paper |
Security of Truncated MACs Information Security and Cryptology | 2009-04-29 | Paper |
| Related-key impossible differential attacks on reduced-round AES-256 | 2009-03-06 | Paper |
| scientific article; zbMATH DE number 5525643 (Why is no real title available?) | 2009-03-06 | Paper |
OPMAC: One-Key Poly1305 MAC Information Security and Cryptology | 2009-01-15 | Paper |
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/ IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Improved Impossible Differential Attacks on Large-Block Rijndael Lecture Notes in Computer Science | 2008-11-20 | Paper |
Cryptanalysis of Reduced-Round SMS4 Block Cipher Information Security and Privacy | 2008-07-08 | Paper |
On the Unprovable Security of 2-Key XCBC Information Security and Privacy | 2008-07-08 | Paper |
New Results on Impossible Differential Cryptanalysis of Reduced AES Lecture Notes in Computer Science | 2008-05-06 | Paper |
Related-Key Differential-Linear Attacks on Reduced AES-192 Lecture Notes in Computer Science | 2008-04-11 | Paper |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 Selected Areas in Cryptography | 2007-11-29 | Paper |
Constructing parallel long-message signcryption scheme from trapdoor permutation Science in China. Series F | 2007-08-31 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Linear cryptanalysis of NUSH block cipher Science in China. Series F | 2007-02-20 | Paper |
Collision attack on reduced-round Camellia Science in China. Series F | 2007-02-20 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Pseudorandomness of Camellia-like scheme Journal of Computer Science and Technology | 2006-10-12 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
| scientific article; zbMATH DE number 2222203 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2114007 (Why is no real title available?) | 2004-11-05 | Paper |
| scientific article; zbMATH DE number 1424184 (Why is no real title available?) | 2000-06-07 | Paper |
| scientific article; zbMATH DE number 1185627 (Why is no real title available?) | 1998-10-25 | Paper |
| scientific article; zbMATH DE number 1116620 (Why is no real title available?) | 1998-02-10 | Paper |
| scientific article; zbMATH DE number 1116638 (Why is no real title available?) | 1997-01-01 | Paper |
| scientific article; zbMATH DE number 853817 (Why is no real title available?) | 1996-07-01 | Paper |
| scientific article; zbMATH DE number 613187 (Why is no real title available?) | 1995-08-24 | Paper |