| Publication | Date of Publication | Type |
|---|
Impossible differential cryptanalysis and a security evaluation framework for AND-RX ciphers IEEE Transactions on Information Theory | 2024-07-23 | Paper |
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers IEEE Transactions on Information Theory | 2024-03-18 | Paper |
Weak rotational property and its application Designs, Codes and Cryptography | 2023-10-12 | Paper |
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework Designs, Codes and Cryptography | 2023-09-07 | Paper |
Asymmetric encryption and signature method with DNA technology Science China Information Sciences | 2022-10-28 | Paper |
Improved integral attack on generalized Feistel cipher Information Security and Cryptology | 2022-10-14 | Paper |
Tweaking key-alternating Feistel block ciphers | 2021-02-23 | Paper |
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys Science China Information Sciences | 2019-11-18 | Paper |
Attacks on the HKM / HFX cryptosystem Fast Software Encryption | 2017-11-15 | Paper |
Transposition of AES key schedule Information Security and Cryptology | 2017-05-05 | Paper |
Generic attacks on the Lai-Massey scheme Designs, Codes and Cryptography | 2017-04-13 | Paper |
Distinguishing properties and applications of higher order derivatives of Boolean functions Information Sciences | 2016-07-08 | Paper |
A unified method for finding impossible differentials of block cipher structures Information Sciences | 2016-01-14 | Paper |
Capacity and data complexity in multidimensional linear attack Lecture Notes in Computer Science | 2015-12-10 | Paper |
What is the effective key length for a block cipher: an attack on every practical block cipher Science China Information Sciences | 2015-11-20 | Paper |
Attacks on a double length blockcipher-based hash proposal Cryptography and Communications | 2015-11-19 | Paper |
On the key schedule of lightweight block ciphers Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Optimal assignment schemes for general access structures based on linear programming Designs, Codes and Cryptography | 2015-03-12 | Paper |
Revisiting key schedule's diffusion in relation with round function's diffusion Designs, Codes and Cryptography | 2014-08-01 | Paper |
Pseudorandomness analysis of the (extended) Lai-Massey scheme Information Processing Letters | 2013-04-04 | Paper |
Preimage attack on reduced DHA-256 | 2012-10-26 | Paper |
Security analysis of cryptographic protocols based on fine-grained freshness | 2011-09-29 | Paper |
Certificateless key-insulated signature without random oracles Journal of Zhejiang University. Science A | 2011-02-02 | Paper |
On the security of multivariate hash functions Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
Formal analysis of authentication in 802.11i Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
Strong key-insulated signature in the standard model Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
Improved efficiency of Kiltz07-KEM Information Processing Letters | 2010-08-20 | Paper |
An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis Wuhan University Journal of Natural Sciences | 2010-02-12 | Paper |
The key-dependent attack on block ciphers Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Improved Integral Attacks on MISTY1 Selected Areas in Cryptography | 2009-12-09 | Paper |
A synthetic indifferentiability analysis of some block-cipher-based hash functions Designs, Codes and Cryptography | 2009-03-31 | Paper |
Cryptanalysis of the Hash Functions MD4 and RIPEMD Lecture Notes in Computer Science | 2008-05-06 | Paper |
Symmetric-key cryptosystem with DNA technology Science in China. Series F | 2007-10-12 | Paper |
New field of cryptography: DNA cryptography Chinese Science Bulletin | 2007-03-27 | Paper |
Attacks on fast double block length hash functions Journal of Cryptology | 2001-11-22 | Paper |
scientific article; zbMATH DE number 1498330 (Why is no real title available?) | 2000-08-30 | Paper |
scientific article; zbMATH DE number 1455092 (Why is no real title available?) | 2000-06-05 | Paper |
scientific article; zbMATH DE number 1149170 (Why is no real title available?) | 1998-05-06 | Paper |
scientific article; zbMATH DE number 1088934 (Why is no real title available?) | 1998-04-22 | Paper |
scientific article; zbMATH DE number 1024071 (Why is no real title available?) | 1997-09-17 | Paper |
scientific article; zbMATH DE number 1024020 (Why is no real title available?) | 1997-08-14 | Paper |
Higher Order Derivatives and Differential Cryptanalysis Communications and Cryptography | 1996-07-04 | Paper |
scientific article; zbMATH DE number 503327 (Why is no real title available?) | 1994-02-22 | Paper |
scientific article; zbMATH DE number 177050 (Why is no real title available?) | 1993-05-18 | Paper |
Markov Ciphers and Differential Cryptanalysis Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
Condition for the nonsingularity of a feedback shift-register over a general finite field (Corresp.) IEEE Transactions on Information Theory | 1987-01-01 | Paper |