| Publication | Date of Publication | Type |
|---|
Heterogeneous and homogeneous extreme multistability in a dual-memristor FHN circuit considering magnetic and electric field effects Chinese Journal of Physics (Taipei) | 2026-04-02 | Paper |
Generic MitM attack frameworks on sponge constructions | 2024-12-13 | Paper |
Accelerating BGV bootstrapping for large \(p\) using null polynomials over \(\mathbb{Z}_{p^e} \) | 2024-11-12 | Paper |
Exploiting the symmetry of \(\mathbb{Z}^n\): randomization and the automorphism problem | 2024-09-13 | Paper |
Automated meet-in-the-middle attack goes to Feistel | 2024-08-30 | Paper |
Compact lattice gadget and its applications to hash-and-sign signatures Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Lattice-based cryptography: a survey Chinese Annals of Mathematics. Series B | 2024-01-04 | Paper |
Meet-in-the-middle preimage attacks on sponge-based hashing Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials Lecture Notes in Computer Science | 2023-05-12 | Paper |
Preimage attacks on 4-round Keccak by solving multivariate quadratic systems | 2022-12-07 | Paper |
On an attack on RSA with small CRT-exponents Science China Information Sciences | 2022-10-28 | Paper |
Differential-algebraic cryptanalysis of reduced-round of Serpent-256 Science China Information Sciences | 2022-10-28 | Paper |
Key guessing strategies for linear key-schedule algorithms in rectangle attacks | 2022-08-30 | Paper |
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks | 2022-04-22 | Paper |
Computational aspects of lattices and their cryptographic applications SCIENTIA SINICA Mathematica | 2022-03-21 | Paper |
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing | 2021-12-08 | Paper |
Quantum attacks on some Feistel block ciphers Designs, Codes and Cryptography | 2020-05-21 | Paper |
MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes Designs, Codes and Cryptography | 2019-05-24 | Paper |
A key-recovery attack on 855-round Trivium | 2018-09-26 | Paper |
Conditional cube attack on round-reduced River Keyak Designs, Codes and Cryptography | 2018-05-24 | Paper |
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques Fast Software Encryption | 2018-05-09 | Paper |
Improved conditional cube attacks on Keccak keyed modes with MILP method | 2018-04-06 | Paper |
Conditional cube attack on reduced-round Keccak sponge function Lecture Notes in Computer Science | 2017-06-13 | Paper |
Provably secure NTRU instances over prime cyclotomic rings Lecture Notes in Computer Science | 2017-06-13 | Paper |
Cryptanalysis of a homomorphic encryption scheme over integers Information Security and Cryptology | 2017-05-05 | Paper |
Linear hull attack on round-reduced Simeck with dynamic key-guessing techniques Information Security and Privacy | 2016-09-02 | Paper |
Improved impossible differential attack on reduced-round LBlock Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
Finding shortest lattice vectors in the presence of gaps Lecture Notes in Computer Science | 2016-03-02 | Paper |
Improved attacks on reduced-round Camellia-128/192/256 Lecture Notes in Computer Science | 2016-03-02 | Paper |
The boomerang attacks on the round-reduced Skein-512 Selected Areas in Cryptography | 2015-12-04 | Paper |
Improved cryptanalysis of the block cipher KASUMI Selected Areas in Cryptography | 2015-12-04 | Paper |
Mathematical foundations of public key cryptography | 2015-10-07 | Paper |
Partial-collision attack on the round-reduced compression function of Skein-256 Fast Software Encryption | 2015-09-18 | Paper |
Improved single-key attacks on 9-round AES-192/256 Fast Software Encryption | 2015-09-18 | Paper |
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia Fast Software Encryption | 2015-09-18 | Paper |
A note on BDD problems with \(\lambda_2\)-gap Information Processing Letters | 2015-06-25 | Paper |
Cryptanalysis of GOST R hash function Information Processing Letters | 2014-08-28 | Paper |
Fast correlation attack on stream cipher ABC v3 Science in China. Series F | 2014-07-21 | Paper |
Improved boomerang attacks on SM3 Information Security and Privacy | 2013-06-28 | Paper |
New observations on impossible differential cryptanalysis of reduced-round Camellia Fast Software Encryption | 2013-01-08 | Paper |
Public key encryption without random oracle made truly practical Computers and Electrical Engineering | 2012-10-19 | Paper |
On the equivalent keys in multivariate cryptosystems Tsinghua Science and Technology | 2012-10-05 | Paper |
Practical attack on the full MMB block cipher Selected Areas in Cryptography | 2012-06-08 | Paper |
Public key encryption for the forgetful Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
On the correlation of pseudorandom binary sequences using additive characters Publicationes Mathematicae Debrecen | 2011-12-20 | Paper |
Pseudo-cryptanalysis of Luffa Information Security and Cryptology | 2011-07-29 | Paper |
New impossible differential attacks of reduced-round Camellia-192 and Camellia-256 Information Security and Privacy | 2011-07-07 | Paper |
Cryptanalysis of the Compression Function of SIMD Information Security and Privacy | 2011-07-07 | Paper |
Certificateless encryption scheme secure in standard model Tsinghua Science and Technology | 2010-11-05 | Paper |
On the correlation of pseudorandom binary sequences with composite moduli | 2009-12-28 | Paper |
Large families of elliptic curve pseudorandom binary sequences Acta Arithmetica | 2009-12-08 | Paper |
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 Selected Areas in Cryptography | 2009-11-03 | Paper |
New Birthday Attacks on Some MACs Based on Block Ciphers Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
New Distinguishing Attack on MAC Using Secret-Prefix Method Fast Software Encryption | 2009-08-11 | Paper |
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 Information Security and Privacy | 2009-06-25 | Paper |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Cryptanalysis of the Full HAVAL with 4 and 5 Passes Fast Software Encryption | 2009-04-02 | Paper |
Cryptanalysis of the Hash Functions MD4 and RIPEMD Lecture Notes in Computer Science | 2008-05-06 | Paper |
How to Break MD5 and Other Hash Functions Lecture Notes in Computer Science | 2008-05-06 | Paper |
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 Lecture Notes in Computer Science | 2008-05-06 | Paper |
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL Lecture Notes in Computer Science | 2008-05-06 | Paper |
Finding Collisions in the Full SHA-1 Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Efficient Collision Search Attacks on SHA-0 Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
An attack on hash function HAVAL-128 Science in China. Series F | 2007-02-20 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
scientific article; zbMATH DE number 1440056 (Why is no real title available?) | 2001-10-03 | Paper |
scientific article; zbMATH DE number 123847 (Why is no real title available?) | 1993-02-18 | Paper |