| Publication | Date of Publication | Type |
|---|
A quantum-secure partial parallel MAC QPCBC Designs, Codes and Cryptography | 2024-12-11 | Paper |
Classification of minimal immersions of conformally flat 3-tori and 4-tori into spheres by the first eigenfunctions Mathematische Annalen | 2024-10-28 | Paper |
Surface structured mesh generation system based on symmetry preserving parameterization International Journal of Wavelets, Multiresolution and Information Processing | 2024-08-22 | Paper |
Symmetric elastic wave cloak design for underground protective structures based on multi-center coordinate transformation Acta Mechanica | 2024-05-29 | Paper |
Convolutional neural network based side-channel attacks with customized filters | 2024-04-19 | Paper |
Quantum attacks on PRFs based on public random permutations Lecture Notes in Computer Science | 2023-08-14 | Paper |
Quantum attacks on Lai-Massey structure Post-Quantum Cryptography | 2023-07-07 | Paper |
A Note on the Security Framework of Two-key DbHtS MACs | 2022-12-09 | Paper |
Attacks on beyond-birthday-bound MACs in the quantum setting | 2022-03-22 | Paper |
Ubiquitous weak-key classes of BRW-polynomial function | 2018-07-17 | Paper |
Related-key almost universal hash functions: definitions, constructions and applications Fast Software Encryption | 2018-05-09 | Paper |
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks Information Security and Cryptology | 2015-12-02 | Paper |
Cryptanalysis of three authenticated encryption schemes for wireless sensor networks Information Security and Cryptology | 2015-12-02 | Paper |
Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes Information Security and Privacy | 2015-10-20 | Paper |
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers Lecture Notes in Computer Science | 2015-01-16 | Paper |
Attacking and fixing the CS mode Information and Communications Security | 2014-09-29 | Paper |
CBCR: CBC MAC with rotating transformations Science China Information Sciences | 2013-07-03 | Paper |
Collision Attacks on Variant of OCB Mode and Its Series Information Security and Cryptology | 2013-05-28 | Paper |
3kf9: enhancing 3GPP-MAC beyond the birthday bound Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
TrCBC: another look at CBC-MAC Information Processing Letters | 2012-05-04 | Paper |
Polye+CTR: a swiss-army-knife mode for block ciphers Provable Security | 2011-09-16 | Paper |
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited Fast Software Encryption | 2010-07-13 | Paper |
Security of Truncated MACs Information Security and Cryptology | 2009-04-29 | Paper |
On the Unprovable Security of 2-Key XCBC Information Security and Privacy | 2008-07-08 | Paper |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Cryptanalysis of the TAE mode and its improvement | 2006-05-19 | Paper |