Bin Zhang

From MaRDI portal
Person:350925

Available identifiers

zbMath Open zhang.bin.1MaRDI QIDQ350925

List of research outcomes

PublicationDate of PublicationType
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V2022-09-22Paper
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G2020-10-21Paper
Fault attacks on stream cipher Scream2018-12-07Paper
Combined cache timing attacks and template attacks on stream cipher MUGI2018-12-07Paper
Two generic methods of analyzing stream ciphers2018-10-18Paper
Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v12018-09-26Paper
Fast near collision attack on the Grain v1 stream cipher2018-07-09Paper
Design and analysis of small-state grain-like stream ciphers2018-05-28Paper
Practical cryptanalysis of Bluetooth encryption with condition masking2018-05-28Paper
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter2016-12-19Paper
Faster Algorithms for Solving LPN2016-09-09Paper
Error-Tolerant Side-Channel Cube Attack Revisited2016-04-13Paper
Another Tradeoff Attack on Sprout-Like Stream Ciphers2016-03-23Paper
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.02015-12-10Paper
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$2015-12-02Paper
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks2015-11-03Paper
Near Collision Attack on the Grain v1 Stream Cipher2015-09-18Paper
Linear Cryptanalysis of FASER128/256 and TriviA-ck2015-09-10Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function2014-10-08Paper
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets2014-07-24Paper
A New Model for Error-Tolerant Side-Channel Cube Attacks2013-10-10Paper
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking2013-09-02Paper
Improved multi-pass fast correlation attacks with applications2013-07-03Paper
Cryptanalysis of Helix and Phelix Revisited2013-06-28Paper
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha2013-06-04Paper
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators2013-05-28Paper
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G ⊕2010-07-06Paper
New Cryptanalysis of Irregularly Decimated Stream Ciphers2009-12-09Paper
An Improved Fast Correlation Attack on Stream Ciphers2009-11-03Paper
New Guess-and-Determine Attack on the Self-Shrinking Generator2008-04-24Paper
Multi-pass Fast Correlation Attack on Stream Ciphers2007-11-29Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Security analysis of a new stream cipher2006-10-11Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Legendre Sequences and Modified Jacobi Sequences2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q53144262005-09-05Paper
Information and Communications Security2005-08-19Paper
Applied Cryptography and Network Security2005-06-13Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Bin Zhang