The following pages link to Siwei Sun (Q744019):
Displaying 29 items.
- New constructions of APN polynomial functions in odd characteristic (Q744020) (← links)
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys (Q826250) (← links)
- Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\) (Q887058) (← links)
- Improved differential analysis of block cipher PRIDE (Q1631918) (← links)
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints (Q1710587) (← links)
- Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis (Q1799240) (← links)
- Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s (Q1800580) (← links)
- Related-key impossible differential analysis of full Khudra (Q1800675) (← links)
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} (Q2056713) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- Some efficient quantum circuit implementations of Camellia (Q2107075) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS (Q2304982) (← links)
- Constructing new differentially 4-uniform permutations from the inverse function (Q2434391) (← links)
- Rotational differential-linear cryptanalysis revisited (Q2677646) (← links)
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums (Q2692351) (← links)
- Quantum circuit implementations of AES with fewer qubits (Q2692402) (← links)
- New cryptanalysis of LowMC with algebraic techniques (Q2701509) (← links)
- Cube Cryptanalysis of Hitag2 Stream Cipher (Q2901350) (← links)
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers (Q2938843) (← links)
- Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks (Q3454141) (← links)
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck (Q4639483) (← links)
- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem (Q4913723) (← links)
- Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK (Q5095926) (← links)
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging (Q6536217) (← links)
- Convolutional neural network based side-channel attacks with customized filters (Q6536242) (← links)
- A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH (Q6620030) (← links)
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations (Q6652910) (← links)