Siwei Sun

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Vectorial fast correlation attacks2026-03-31Paper
Link between the differential cryptanalysis and linear approximations over finite abelian groups and its applications
Journal of Cryptology
2026-03-09Paper
Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations2024-12-13Paper
A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH2024-10-16Paper
Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging2024-04-19Paper
Convolutional neural network based side-channel attacks with customized filters2024-04-19Paper
Synthesizing quantum circuits of AES with lower \(T\)-depth and less qubits
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
Developments in Language Theory
2023-06-30Paper
Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
Lecture Notes in Computer Science
2023-05-12Paper
Massive superpoly recovery with nested monomial predictions
Lecture Notes in Computer Science
2023-05-12Paper
New cryptanalysis of LowMC with algebraic techniques
Designs, Codes and Cryptography
2023-04-28Paper
Quantum circuit implementations of AES with fewer qubits2023-03-21Paper
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums2023-03-21Paper
Rotational differential-linear cryptanalysis revisited
Journal of Cryptology
2023-01-05Paper
Some efficient quantum circuit implementations of Camellia
Quantum Information Processing
2022-11-29Paper
Key guessing strategies for linear key-schedule algorithms in rectangle attacks2022-08-30Paper
Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK
Information Security Practice and Experience
2022-08-11Paper
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks2022-04-22Paper
Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys2021-12-20Paper
Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}2021-12-08Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing2021-12-08Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS2020-03-09Paper
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints2019-01-23Paper
Improved differential analysis of block cipher PRIDE2018-12-07Paper
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s2018-10-24Paper
Related-key impossible differential analysis of full Khudra2018-10-24Paper
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis2018-10-18Paper
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
Fast Software Encryption
2018-05-09Paper
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks
Information Security and Cryptology
2015-12-02Paper
Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\)
Science China. Mathematics
2015-10-27Paper
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
Lecture Notes in Computer Science
2015-01-16Paper
New constructions of APN polynomial functions in odd characteristic
Applicable Algebra in Engineering, Communication and Computing
2014-10-02Paper
Constructing new differentially 4-uniform permutations from the inverse function
Finite Fields and their Applications
2014-02-05Paper
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem
Information and Communications Security
2013-04-08Paper
Cube cryptanalysis of Hitag2 stream cipher
Cryptology and Network Security
2012-07-20Paper


Research outcomes over time


This page was built for person: Siwei Sun