Bin Zhang

From MaRDI portal
Person:350925

Available identifiers

zbMath Open zhang.bin.1MaRDI QIDQ350925

List of research outcomes





PublicationDate of PublicationType
Ridge estimation of covariance matrix from data in two classes.2024-08-07Paper
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V2022-09-22Paper
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G2020-10-21Paper
Fault attacks on stream cipher Scream2018-12-07Paper
Combined cache timing attacks and template attacks on stream cipher MUGI2018-12-07Paper
Two generic methods of analyzing stream ciphers2018-10-18Paper
Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v12018-09-26Paper
Fast near collision attack on the Grain v1 stream cipher2018-07-09Paper
Design and analysis of small-state grain-like stream ciphers2018-05-28Paper
Practical cryptanalysis of Bluetooth encryption with condition masking2018-05-28Paper
A guess-then-algebraic attack on LFSR-based stream ciphers with nonlinear filter2016-12-19Paper
Faster algorithms for solving LPN2016-09-09Paper
Error-tolerant side-channel cube attack revisited2016-04-13Paper
Another tradeoff attack on sprout-like stream ciphers2016-03-23Paper
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.02015-12-10Paper
Autocorrelation values of new generalized cyclotomic sequences of order six over \(\mathbb Z_{pq}\)2015-12-02Paper
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks2015-11-03Paper
Near collision attack on the Grain v1 stream cipher2015-09-18Paper
Linear cryptanalysis of FASER128/256 and TriviA-ck2015-09-10Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function2014-10-08Paper
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets2014-07-24Paper
A new model for error-tolerant side-channel cube attacks2013-10-10Paper
Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)2013-09-02Paper
Improved multi-pass fast correlation attacks with applications2013-07-03Paper
Cryptanalysis of helix and phelix revisited2013-06-28Paper
Improved key recovery attacks on reduced-round Salsa20 and ChaCha2013-06-04Paper
An improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators2013-05-28Paper
Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G\(^{ \oplus }\)2010-07-06Paper
New cryptanalysis of irregularly decimated stream ciphers2009-12-09Paper
An Improved Fast Correlation Attack on Stream Ciphers2009-11-03Paper
New Guess-and-Determine Attack on the Self-Shrinking Generator2008-04-24Paper
Multi-pass Fast Correlation Attack on Stream Ciphers2007-11-29Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Security analysis of a new stream cipher2006-10-11Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Legendre Sequences and Modified Jacobi Sequences2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q53144262005-09-05Paper
Information and Communications Security2005-08-19Paper
Applied Cryptography and Network Security2005-06-13Paper

Research outcomes over time

This page was built for person: Bin Zhang