Siwei Sun

From MaRDI portal
Person:744019

Available identifiers

zbMath Open sun.siweiMaRDI QIDQ744019

List of research outcomes





PublicationDate of PublicationType
Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations2024-12-13Paper
A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH2024-10-16Paper
Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging2024-04-19Paper
Convolutional neural network based side-channel attacks with customized filters2024-04-19Paper
Synthesizing quantum circuits of AES with lower \(T\)-depth and less qubits2023-08-25Paper
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy2023-06-30Paper
Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks2023-06-12Paper
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials2023-05-12Paper
Massive superpoly recovery with nested monomial predictions2023-05-12Paper
New cryptanalysis of LowMC with algebraic techniques2023-04-28Paper
Quantum circuit implementations of AES with fewer qubits2023-03-21Paper
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums2023-03-21Paper
Rotational differential-linear cryptanalysis revisited2023-01-05Paper
Some efficient quantum circuit implementations of Camellia2022-11-29Paper
Key guessing strategies for linear key-schedule algorithms in rectangle attacks2022-08-30Paper
Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK2022-08-11Paper
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks2022-04-22Paper
Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys2021-12-20Paper
Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}2021-12-08Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing2021-12-08Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS2020-03-09Paper
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints2019-01-23Paper
Improved differential analysis of block cipher PRIDE2018-12-07Paper
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s2018-10-24Paper
Related-key impossible differential analysis of full Khudra2018-10-24Paper
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis2018-10-18Paper
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck2018-05-09Paper
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks2015-12-02Paper
Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\)2015-10-27Paper
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers2015-01-16Paper
New constructions of APN polynomial functions in odd characteristic2014-10-02Paper
Constructing new differentially 4-uniform permutations from the inverse function2014-02-05Paper
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem2013-04-08Paper
Cube Cryptanalysis of Hitag2 Stream Cipher2012-07-20Paper

Research outcomes over time

This page was built for person: Siwei Sun