Chenhui Jin

From MaRDI portal
(Redirected from Person:362308)
Redirect page
Person:474780

Redirect to:



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved fast correlation attack using multiple linear approximations and its application on SOSEMANUK
IEEE Transactions on Information Theory
2025-01-23Paper
Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model
IEEE Transactions on Information Theory
2024-07-23Paper
A general correlation evaluation model on LFSR-based stream ciphers
IEEE Transactions on Information Theory
2024-07-19Paper
Fast correlation attacks on K2 stream cipher
IEEE Transactions on Information Theory
2024-07-18Paper
Complete analysis of Simon's quantum algorithm with additional collisions
Quantum Information Processing
2023-01-05Paper
A New General Method of Searching for Cubes in Cube Attacks
1515.94063
2022-12-21Paper
A correlation attack on full SNOW-V and SNOW-Vi2022-08-30Paper
Security analysis of Even-Mansour structure hash functions2022-06-08Paper
Construction of higher-level MDS matrices in nested SPNs
Information Sciences
2022-04-14Paper
Bounding the length of impossible differentials for SPN block ciphers
Designs, Codes and Cryptography
2021-10-19Paper
Multiset structural attack on generalized Feistel networks
Mathematical Problems in Engineering
2020-02-20Paper
Cryptanalysis of Loiss stream cipher -- revisited
Journal of Applied Mathematics
2019-11-19Paper
More accurate results on the provable security of AES against impossible differential cryptanalysis
Designs, Codes and Cryptography
2019-11-07Paper
Key recovery attacks on reduced-round Joltik-BC in the single-key setting
Information Processing Letters
2019-09-20Paper
Upper bound of the length of truncated impossible differentials for AES
Designs, Codes and Cryptography
2018-06-26Paper
Meet in the middle attack on type-1 Feistel construction2018-04-20Paper
On Compact Cauchy Matrices for Substitution-Permutation Networks
IEEE Transactions on Computers
2017-05-16Paper
Meet-in-the-middle attack on 11-round 3D block cipher
International Journal of Foundations of Computer Science
2017-04-26Paper
New upper bound on the maximum differential probability for SPS structure with P-box using \(n\)-MDS2016-08-10Paper
Meet-in-the-middle attacks on 10-round AES-256
Designs, Codes and Cryptography
2016-07-21Paper
Improved slender-set linear cryptanalysis
Fast Software Encryption
2015-09-18Paper
Differential cryptanalysis of PRESENT-like cipher
Designs, Codes and Cryptography
2015-09-01Paper
Information leakage of VGF2 structure
Mathematical Problems in Engineering
2014-11-24Paper
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function
Science China Information Sciences
2013-08-20Paper
scientific article; zbMATH DE number 6001315 (Why is no real title available?)2012-01-27Paper
Information–disturbance tradeoff in sending direction information via antiparallel quantum spin
Journal of Physics A: Mathematical and Theoretical
2010-06-22Paper
A universal coherent source for quantum key distribution
Chinese Science Bulletin
2010-04-24Paper
A related-key attack on iterated chaotic ciphers2009-10-21Paper
A related-key attack on iterated chaotic ciphers2009-10-21Paper
An Improved Collision Attack on MD5 Algorithm
Information Security and Cryptology
2009-02-10Paper
Quantum circuit implementation of the optimal information–disturbance tradeoff of maximally entangled states
Journal of Physics A: Mathematical and Theoretical
2008-02-04Paper
Multinomial relativity and regular trinomial of Kasami sequences2008-01-14Paper
scientific article; zbMATH DE number 5213086 (Why is no real title available?)2007-11-20Paper
The relation between autocorrelation and run-length of binary sequences2006-11-27Paper
Linear provable security for a class of unbalanced Feistel network
Applied Mathematics. Series B (English Edition)
2006-09-11Paper
scientific article; zbMATH DE number 2230716 (Why is no real title available?)2005-11-21Paper
scientific article; zbMATH DE number 2226955 (Why is no real title available?)2005-11-08Paper
scientific article; zbMATH DE number 2195362 (Why is no real title available?)2005-08-17Paper
scientific article; zbMATH DE number 2077628 (Why is no real title available?)2004-07-01Paper
scientific article; zbMATH DE number 1911491 (Why is no real title available?)2003-05-15Paper
scientific article; zbMATH DE number 1810251 (Why is no real title available?)2002-09-30Paper
scientific article; zbMATH DE number 1789737 (Why is no real title available?)2002-08-27Paper
scientific article; zbMATH DE number 1506759 (Why is no real title available?)2001-04-02Paper
scientific article; zbMATH DE number 1145261 (Why is no real title available?)1998-08-05Paper
scientific article; zbMATH DE number 883301 (Why is no real title available?)1996-06-02Paper


Research outcomes over time


This page was built for person: Chenhui Jin