Bin Zhang

From MaRDI portal
Person:350925

Available identifiers

zbMath Open zhang.bin.1MaRDI QIDQ350925

List of research outcomes





PublicationDate of PublicationType
Ridge estimation of covariance matrix from data in two classes.2024-08-07Paper
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V2022-09-22Paper
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G2020-10-21Paper
Fault attacks on stream cipher Scream2018-12-07Paper
Combined cache timing attacks and template attacks on stream cipher MUGI2018-12-07Paper
Two generic methods of analyzing stream ciphers2018-10-18Paper
Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v12018-09-26Paper
Fast near collision attack on the Grain v1 stream cipher2018-07-09Paper
Design and analysis of small-state grain-like stream ciphers2018-05-28Paper
Practical cryptanalysis of Bluetooth encryption with condition masking2018-05-28Paper
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter2016-12-19Paper
Faster Algorithms for Solving LPN2016-09-09Paper
Error-Tolerant Side-Channel Cube Attack Revisited2016-04-13Paper
Another Tradeoff Attack on Sprout-Like Stream Ciphers2016-03-23Paper
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.02015-12-10Paper
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$2015-12-02Paper
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks2015-11-03Paper
Near Collision Attack on the Grain v1 Stream Cipher2015-09-18Paper
Linear Cryptanalysis of FASER128/256 and TriviA-ck2015-09-10Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function2014-10-08Paper
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets2014-07-24Paper
A New Model for Error-Tolerant Side-Channel Cube Attacks2013-10-10Paper
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking2013-09-02Paper
Improved multi-pass fast correlation attacks with applications2013-07-03Paper
Cryptanalysis of Helix and Phelix Revisited2013-06-28Paper
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha2013-06-04Paper
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators2013-05-28Paper
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G ⊕2010-07-06Paper
New Cryptanalysis of Irregularly Decimated Stream Ciphers2009-12-09Paper
An Improved Fast Correlation Attack on Stream Ciphers2009-11-03Paper
New Guess-and-Determine Attack on the Self-Shrinking Generator2008-04-24Paper
Multi-pass Fast Correlation Attack on Stream Ciphers2007-11-29Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Security analysis of a new stream cipher2006-10-11Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Legendre Sequences and Modified Jacobi Sequences2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q53144262005-09-05Paper
Information and Communications Security2005-08-19Paper
Applied Cryptography and Network Security2005-06-13Paper

Research outcomes over time

This page was built for person: Bin Zhang