| Publication | Date of Publication | Type |
|---|
Improved fast correlation attack using multiple linear approximations and its application on SOSEMANUK IEEE Transactions on Information Theory | 2025-01-23 | Paper |
Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model IEEE Transactions on Information Theory | 2024-07-23 | Paper |
A general correlation evaluation model on LFSR-based stream ciphers IEEE Transactions on Information Theory | 2024-07-19 | Paper |
Fast correlation attacks on K2 stream cipher IEEE Transactions on Information Theory | 2024-07-18 | Paper |
Complete analysis of Simon's quantum algorithm with additional collisions Quantum Information Processing | 2023-01-05 | Paper |
A New General Method of Searching for Cubes in Cube Attacks 1515.94063 | 2022-12-21 | Paper |
| A correlation attack on full SNOW-V and SNOW-Vi | 2022-08-30 | Paper |
| Security analysis of Even-Mansour structure hash functions | 2022-06-08 | Paper |
Construction of higher-level MDS matrices in nested SPNs Information Sciences | 2022-04-14 | Paper |
Bounding the length of impossible differentials for SPN block ciphers Designs, Codes and Cryptography | 2021-10-19 | Paper |
Multiset structural attack on generalized Feistel networks Mathematical Problems in Engineering | 2020-02-20 | Paper |
Cryptanalysis of Loiss stream cipher -- revisited Journal of Applied Mathematics | 2019-11-19 | Paper |
More accurate results on the provable security of AES against impossible differential cryptanalysis Designs, Codes and Cryptography | 2019-11-07 | Paper |
Key recovery attacks on reduced-round Joltik-BC in the single-key setting Information Processing Letters | 2019-09-20 | Paper |
Upper bound of the length of truncated impossible differentials for AES Designs, Codes and Cryptography | 2018-06-26 | Paper |
| Meet in the middle attack on type-1 Feistel construction | 2018-04-20 | Paper |
On Compact Cauchy Matrices for Substitution-Permutation Networks IEEE Transactions on Computers | 2017-05-16 | Paper |
Meet-in-the-middle attack on 11-round 3D block cipher International Journal of Foundations of Computer Science | 2017-04-26 | Paper |
| New upper bound on the maximum differential probability for SPS structure with P-box using \(n\)-MDS | 2016-08-10 | Paper |
Meet-in-the-middle attacks on 10-round AES-256 Designs, Codes and Cryptography | 2016-07-21 | Paper |
Improved slender-set linear cryptanalysis Fast Software Encryption | 2015-09-18 | Paper |
Differential cryptanalysis of PRESENT-like cipher Designs, Codes and Cryptography | 2015-09-01 | Paper |
Information leakage of VGF2 structure Mathematical Problems in Engineering | 2014-11-24 | Paper |
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function Science China Information Sciences | 2013-08-20 | Paper |
| scientific article; zbMATH DE number 6001315 (Why is no real title available?) | 2012-01-27 | Paper |
Information–disturbance tradeoff in sending direction information via antiparallel quantum spin Journal of Physics A: Mathematical and Theoretical | 2010-06-22 | Paper |
A universal coherent source for quantum key distribution Chinese Science Bulletin | 2010-04-24 | Paper |
| A related-key attack on iterated chaotic ciphers | 2009-10-21 | Paper |
| A related-key attack on iterated chaotic ciphers | 2009-10-21 | Paper |
An Improved Collision Attack on MD5 Algorithm Information Security and Cryptology | 2009-02-10 | Paper |
Quantum circuit implementation of the optimal information–disturbance tradeoff of maximally entangled states Journal of Physics A: Mathematical and Theoretical | 2008-02-04 | Paper |
| Multinomial relativity and regular trinomial of Kasami sequences | 2008-01-14 | Paper |
| scientific article; zbMATH DE number 5213086 (Why is no real title available?) | 2007-11-20 | Paper |
| The relation between autocorrelation and run-length of binary sequences | 2006-11-27 | Paper |
Linear provable security for a class of unbalanced Feistel network Applied Mathematics. Series B (English Edition) | 2006-09-11 | Paper |
| scientific article; zbMATH DE number 2230716 (Why is no real title available?) | 2005-11-21 | Paper |
| scientific article; zbMATH DE number 2226955 (Why is no real title available?) | 2005-11-08 | Paper |
| scientific article; zbMATH DE number 2195362 (Why is no real title available?) | 2005-08-17 | Paper |
| scientific article; zbMATH DE number 2077628 (Why is no real title available?) | 2004-07-01 | Paper |
| scientific article; zbMATH DE number 1911491 (Why is no real title available?) | 2003-05-15 | Paper |
| scientific article; zbMATH DE number 1810251 (Why is no real title available?) | 2002-09-30 | Paper |
| scientific article; zbMATH DE number 1789737 (Why is no real title available?) | 2002-08-27 | Paper |
| scientific article; zbMATH DE number 1506759 (Why is no real title available?) | 2001-04-02 | Paper |
| scientific article; zbMATH DE number 1145261 (Why is no real title available?) | 1998-08-05 | Paper |
| scientific article; zbMATH DE number 883301 (Why is no real title available?) | 1996-06-02 | Paper |