default search action
BibTeX records: Siwei Sun
@article{DBLP:journals/ieicetd/WangWS24, author = {Gao Wang and Gaoli Wang and Siwei Sun}, title = {Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {107}, number = {8}, pages = {1016--1028}, year = {2024}, url = {https://doi.org/10.1587/transinf.2024edp7011}, doi = {10.1587/TRANSINF.2024EDP7011}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/WangWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NiuHSZW24, author = {Zhongfeng Niu and Kai Hu and Siwei Sun and Zhiyu Zhang and Meiqin Wang}, editor = {Leonid Reyzin and Douglas Stebila}, title = {Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14923}, pages = {73--104}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68385-5\_3}, doi = {10.1007/978-3-031-68385-5\_3}, timestamp = {Wed, 28 Aug 2024 21:54:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NiuHSZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QiaoSWWCWZ24, author = {Kexin Qiao and Siwei Sun and Zhaoyang Wang and Zehan Wu and Junjie Cheng and An Wang and Liehuang Zhu}, title = {A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2024}, url = {https://eprint.iacr.org/2024/135}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/QiaoSWWCWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiuHSZW24, author = {Zhongfeng Niu and Kai Hu and Siwei Sun and Zhiyu Zhang and Meiqin Wang}, title = {Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {857}, year = {2024}, url = {https://eprint.iacr.org/2024/857}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NiuHSZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QiaoYSHJ23, author = {Wenxiao Qiao and Hailun Yan and Siwei Sun and Lei Hu and Jiwu Jing}, title = {New cryptanalysis of LowMC with algebraic techniques}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {2057--2075}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01178-1}, doi = {10.1007/S10623-022-01178-1}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QiaoYSHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WeiSHWP23, author = {Zihao Wei and Siwei Sun and Lei Hu and Man Wei and Ren{\'{e}} Peralta}, title = {Searching the space of tower field implementations of the {\unicode{54589}}\({}_{\mbox{2\({}^{\mbox{8}}\)}}\) inverter - with applications to AES, Camellia and {SM4}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {1--26}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.10052962}, doi = {10.1504/IJICS.2023.10052962}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/WeiSHWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LiuNSLH23, author = {Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu}, title = {Rotational Differential-Linear Cryptanalysis Revisited}, journal = {J. Cryptol.}, volume = {36}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.1007/s00145-022-09440-4}, doi = {10.1007/S00145-022-09440-4}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/LiuNSLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WangWS23, author = {Dachao Wang and Baocang Wang and Siwei Sun}, title = {SAT-aided Automatic Search of Boomerang Distinguishers for {ARX} Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {152--191}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.152-191}, doi = {10.46586/TOSC.V2023.I1.152-191}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/WangWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangSWH23, author = {Zhiyu Zhang and Siwei Sun and Caibing Wang and Lei Hu}, title = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {224--252}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.224-252}, doi = {10.46586/TOSC.V2023.I2.224-252}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZhangSWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShiSSHY23, author = {Danping Shi and Siwei Sun and Ling Song and Lei Hu and Qianqian Yang}, editor = {Carmit Hazay and Martijn Stam}, title = {Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Sel{\c{c}}uk Meet-in-the-Middle Cryptanalysis of {SKINNY}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {67--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_3}, doi = {10.1007/978-3-031-30634-1\_3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShiSSHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/YuLWSM23, author = {Xiaorui Yu and Fukang Liu and Gaoli Wang and Siwei Sun and Willi Meier}, editor = {Claude Carlet and Kalikinkar Mandal and Vincent Rijmen}, title = {A Closer Look at the S-Box: Deeper Analysis of Round-Reduced {ASCON-HASH}}, booktitle = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14201}, pages = {22--42}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53368-6\_2}, doi = {10.1007/978-3-031-53368-6\_2}, timestamp = {Tue, 05 Mar 2024 11:21:46 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/YuLWSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWS23, author = {Dachao Wang and Baocang Wang and Siwei Sun}, title = {SAT-aided Automatic Search of Boomerang Distinguishers for {ARX} Ciphers (Long Paper)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2023}, url = {https://eprint.iacr.org/2023/202}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiSSHY23, author = {Danping Shi and Siwei Sun and Ling Song and Lei Hu and Qianqian Yang}, title = {Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2023}, url = {https://eprint.iacr.org/2023/255}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ShiSSHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSWH23, author = {Zhiyu Zhang and Siwei Sun and Caibing Wang and Lei Hu}, title = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2023}, url = {https://eprint.iacr.org/2023/772}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuLWSM23, author = {Xiaorui Yu and Fukang Liu and Gaoli Wang and Siwei Sun and Willi Meier}, title = {A Closer Look at the S-box: Deeper Analysis of Round-Reduced {ASCON-HASH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {865}, year = {2023}, url = {https://eprint.iacr.org/2023/865}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuLWSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiuSYW23, author = {Zhongfeng Niu and Siwei Sun and Hailun Yan and Qi Wang}, title = {General Results of Linear Approximations over Finite Abelian Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {911}, year = {2023}, url = {https://eprint.iacr.org/2023/911}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NiuSYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengJHZWQZZST23, author = {Dengguo Feng and Lin Jiao and Yonglin Hao and Qunxiong Zheng and Wenling Wu and Wenfeng Qi and Lei Zhang and Liting Zhang and Siwei Sun and Tian Tian}, title = {{LOL:} {A} Highly Flexible Framework for Designing Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1235}, year = {2023}, url = {https://eprint.iacr.org/2023/1235}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengJHZWQZZST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WeiSWGH22, author = {Man Wei and Siwei Sun and Zihao Wei and Zheng Gong and Lei Hu}, title = {A small first-order {DPA} resistant {AES} implementation with no fresh randomness}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {6}, pages = {1--3}, year = {2022}, url = {https://doi.org/10.1007/s11432-019-1469-7}, doi = {10.1007/S11432-019-1469-7}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WeiSWGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZouWSLLW22, author = {Jian Zou and Zihao Wei and Siwei Sun and Yiyuan Luo and Qian Liu and Wenling Wu}, title = {Some efficient quantum circuit implementations of Camellia}, journal = {Quantum Inf. Process.}, volume = {21}, number = {4}, pages = {131}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03477-x}, doi = {10.1007/S11128-022-03477-X}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZouWSLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuaDSZHW22, author = {Jialiang Hua and Xiaoyang Dong and Siwei Sun and Zhiyu Zhang and Lei Hu and Xiaoyun Wang}, title = {Improved {MITM} Cryptanalysis on Streebog}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {63--91}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.63-91}, doi = {10.46586/TOSC.V2022.I2.63-91}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HuaDSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YangSSSH22, author = {Qianqian Yang and Ling Song and Siwei Sun and Danping Shi and Lei Hu}, title = {New Properties of the Double Boomerang Connectivity Table}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {208--242}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.208-242}, doi = {10.46586/TOSC.V2022.I4.208-242}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/YangSSSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HuangS22, author = {Zhenyu Huang and Siwei Sun}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Synthesizing Quantum Circuits of {AES} with Lower T-depth and Less Qubits}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {614--644}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_21}, doi = {10.1007/978-3-031-22969-5\_21}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HuangS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NiuSLL22, author = {Zhongfeng Niu and Siwei Sun and Yunwen Liu and Chao Li}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Rotational Differential-Linear Distinguishers of {ARX} Ciphers with Arbitrary Output Linear Masks}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {3--32}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_1}, doi = {10.1007/978-3-031-15802-5\_1}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NiuSLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DongQSW22, author = {Xiaoyang Dong and Lingyue Qin and Siwei Sun and Xiaoyun Wang}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {3--33}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_1}, doi = {10.1007/978-3-031-07082-2\_1}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DongQSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuaDSZHW22, author = {Jialiang Hua and Xiaoyang Dong and Siwei Sun and Zhiyu Zhang and Lei Hu and Xiaoyun Wang}, title = {Improved {MITM} Cryptanalysis on Streebog}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2022}, url = {https://eprint.iacr.org/2022/568}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuaDSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangS22, author = {Zhenyu Huang and Siwei Sun}, title = {Synthesizing Quantum Circuits of {AES} with Lower T-depth and Less Qubits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2022}, url = {https://eprint.iacr.org/2022/620}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiuSL022, author = {Zhongfeng Niu and Siwei Sun and Yunwen Liu and Chao Li}, title = {Rotational Differential-Linear Distinguishers of {ARX} Ciphers with Arbitrary Output Linear Masks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2022}, url = {https://eprint.iacr.org/2022/765}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NiuSL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLGHJHZY22, author = {Siwei Sun and Tianyu Liu and Zhi Guan and Yifei He and Jiwu Jing and Lei Hu and Zhenfeng Zhang and Hailun Yan}, title = {{LMS-SM3} and {HSS-SM3:} Instantiating Hash-based Post-Quantum Signature Schemes with {SM3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1491}, year = {2022}, url = {https://eprint.iacr.org/2022/1491}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLGHJHZY22a, author = {Siwei Sun and Tianyu Liu and Zhi Guan and Yifei He and Jiwu Jing and Lei Hu and Zhenfeng Zhang and Hailun Yan}, title = {{XMSS-SM3} and {MT-XMSS-SM3:} Instantiating Extended Merkle Signature Schemes with {SM3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1552}, year = {2022}, url = {https://eprint.iacr.org/2022/1552}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangSSSH22, author = {Qianqian Yang and Ling Song and Siwei Sun and Danping Shi and Lei Hu}, title = {New Properties of Double Boomerang Connectivity Table}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1579}, year = {2022}, url = {https://eprint.iacr.org/2022/1579}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YangSSSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WeiSWH21, author = {Man Wei and Siwei Sun and Zihao Wei and Lei Hu}, title = {Unbalanced sharing: a threshold implementation of {SM4}}, journal = {Sci. China Inf. Sci.}, volume = {64}, number = {5}, year = {2021}, url = {https://doi.org/10.1007/s11432-018-9794-6}, doi = {10.1007/S11432-018-9794-6}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WeiSWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbir/SunZLC21, author = {Siwei Sun and Fangyu Zhang and Kaicheng Liao and Victor I. Chang}, title = {Determine Factors of {NFC} Mobile Payment Continuous Adoption in Shopping Malls: Evidence From Indonesia}, journal = {Int. J. Bus. Intell. Res.}, volume = {12}, number = {2}, pages = {1--20}, year = {2021}, url = {https://doi.org/10.4018/IJBIR.20210701.oa1}, doi = {10.4018/IJBIR.20210701.OA1}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbir/SunZLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijkm/SunZC21, author = {Siwei Sun and Fangyu Zhang and Victor Chang}, title = {Motivators of Researchers' Knowledge Sharing and Community Promotion in Online Multi-Background Community}, journal = {Int. J. Knowl. Manag.}, volume = {17}, number = {2}, pages = {23--49}, year = {2021}, url = {https://doi.org/10.4018/IJKM.2021040102}, doi = {10.4018/IJKM.2021040102}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijkm/SunZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/RohitHSS21, author = {Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun}, title = {Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {130--155}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.130-155}, doi = {10.46586/TOSC.V2021.I1.130-155}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/RohitHSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DongZSWWH21, author = {Xiaoyang Dong and Zhiyu Zhang and Siwei Sun and Congming Wei and Xiaoyun Wang and Lei Hu}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {241--271}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_9}, doi = {10.1007/978-3-030-92062-3\_9}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DongZSWWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HuSTWW21, author = {Kai Hu and Siwei Sun and Yosuke Todo and Meiqin Wang and Qingju Wang}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Massive Superpoly Recovery with Nested Monomial Predictions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {392--421}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_14}, doi = {10.1007/978-3-030-92062-3\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HuSTWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DongHSLWH21, author = {Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu}, editor = {Tal Malkin and Chris Peikert}, title = {Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {278--308}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_10}, doi = {10.1007/978-3-030-84252-9\_10}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DongHSLWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/NiuLSW21, author = {Chao Niu and Muzhou Li and Siwei Sun and Meiqin Wang}, editor = {Kenneth G. Paterson}, title = {Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {126--147}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_6}, doi = {10.1007/978-3-030-75539-3\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/NiuLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuSL21, author = {Yunwen Liu and Siwei Sun and Chao Li}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Rotational Cryptanalysis from a Differential-Linear Perspective - Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {741--770}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_26}, doi = {10.1007/978-3-030-77870-5\_26}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaoD00SS021, author = {Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {771--804}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_27}, doi = {10.1007/978-3-030-77870-5\_27}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaoD00SS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangLQZSH21, author = {Yingjie Zhang and Lijun Lyu and Kexin Qiao and Zhiyu Zhang and Siwei Sun and Lei Hu}, editor = {Robert H. Deng and Feng Bao and Guilin Wang and Jian Shen and Mark Ryan and Weizhi Meng and Ding Wang}, title = {Automatic Key Recovery of Feistel Ciphers: Application to {SIMON} and {SIMECK}}, booktitle = {Information Security Practice and Experience: 16th International Conference, {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13107}, pages = {147--167}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93206-0\_10}, doi = {10.1007/978-3-030-93206-0\_10}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ZhangLQZSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuSL21, author = {Yunwen Liu and Siwei Sun and Chao Li}, title = {Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2021}, url = {https://eprint.iacr.org/2021/189}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RohitHSS21, author = {Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun}, title = {Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2021}, url = {https://eprint.iacr.org/2021/194}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RohitHSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuNSLH21, author = {Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu}, title = {A Note on the Bias of Rotational Differential-Linear Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2021}, url = {https://eprint.iacr.org/2021/379}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuNSLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongHSLWH21, author = {Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu}, title = {Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2021}, url = {https://eprint.iacr.org/2021/427}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongHSLWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongQSW21, author = {Xiaoyang Dong and Lingyue Qin and Siwei Sun and Xiaoyun Wang}, title = {Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2021}, url = {https://eprint.iacr.org/2021/856}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongQSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongZSW0H21, author = {Xiaoyang Dong and Zhiyu Zhang and Siwei Sun and Congming Wei and Xiaoyun Wang and Lei Hu}, title = {Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1119}, year = {2021}, url = {https://eprint.iacr.org/2021/1119}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongZSW0H21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuSTWW21, author = {Kai Hu and Siwei Sun and Yosuke Todo and Meiqin Wang and Qingju Wang}, title = {Massive Superpoly Recovery with Nested Monomial Predictions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1225}, year = {2021}, url = {https://eprint.iacr.org/2021/1225}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuSTWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/ZhangSLC20, author = {Fangyu Zhang and Siwei Sun and Chenlin Liu and Victor Chang}, title = {Consumer innovativeness, product innovation and smart toys}, journal = {Electron. Commer. Res. Appl.}, volume = {41}, pages = {100974}, year = {2020}, url = {https://doi.org/10.1016/j.elerap.2020.100974}, doi = {10.1016/J.ELERAP.2020.100974}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ecra/ZhangSLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoSSSSHW20, author = {Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang}, title = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes and Tweak Additions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {119--151}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.119-151}, doi = {10.13154/TOSC.V2020.I3.119-151}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoSSSSHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SahaSSSSZ20, author = {Dhiman Saha and Yu Sasaki and Danping Shi and Ferdinand Sibleyras and Siwei Sun and Yingjie Zhang}, title = {On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {152--174}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.152-174}, doi = {10.13154/TOSC.V2020.I3.152-174}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SahaSSSSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HuSW020, author = {Kai Hu and Siwei Sun and Meiqin Wang and Qingju Wang}, editor = {Shiho Moriai and Huaxiong Wang}, title = {An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {446--476}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_15}, doi = {10.1007/978-3-030-64837-4\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HuSW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZouWSLW20, author = {Jian Zou and Zihao Wei and Siwei Sun and Ximeng Liu and Wenling Wu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Quantum Circuit Implementations of {AES} with Fewer Qubits}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {697--726}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_24}, doi = {10.1007/978-3-030-64834-3\_24}, timestamp = {Thu, 10 Dec 2020 10:09:50 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZouWSLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DongSSGWH20, author = {Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {727--757}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_25}, doi = {10.1007/978-3-030-64834-3\_25}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DongSSGWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuSS20, author = {Bowen Liu and Pawel Szalachowski and Siwei Sun}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Fail-safe Watchtowers and Short-lived Assertions for Payment Channels}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {506--518}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384716}, doi = {10.1145/3320269.3384716}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiuSS20, author = {Bowen Liu and Siwei Sun and Pawel Szalachowski}, title = {{SMACS:} Smart Contract Access Control Service}, booktitle = {50th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2020, Valencia, Spain, June 29 - July 2, 2020}, pages = {221--232}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSN48063.2020.00039}, doi = {10.1109/DSN48063.2020.00039}, timestamp = {Wed, 05 Aug 2020 14:09:10 +0200}, biburl = {https://dblp.org/rec/conf/dsn/LiuSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06127, author = {Bowen Liu and Pawel Szalachowski and Siwei Sun}, title = {Fail-safe Watchtowers and Short-lived Assertions for Payment Channels}, journal = {CoRR}, volume = {abs/2003.06127}, year = {2020}, url = {https://arxiv.org/abs/2003.06127}, eprinttype = {arXiv}, eprint = {2003.06127}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06127.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-07495, author = {Bowen Liu and Siwei Sun and Pawel Szalachowski}, title = {{SMACS:} Smart Contract Access Control Service}, journal = {CoRR}, volume = {abs/2003.07495}, year = {2020}, url = {https://arxiv.org/abs/2003.07495}, eprinttype = {arXiv}, eprint = {2003.07495}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-07495.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoDGLSSW20, author = {Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang}, title = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2020}, url = {https://eprint.iacr.org/2020/467}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoDGLSSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongSSGWH20, author = {Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu}, title = {Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2020}, url = {https://eprint.iacr.org/2020/1030}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongSSGWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaSSSSZ20, author = {Dhiman Saha and Yu Sasaki and Danping Shi and Ferdinand Sibleyras and Siwei Sun and Yingjie Zhang}, title = {On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1045}, year = {2020}, url = {https://eprint.iacr.org/2020/1045}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaSSSSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuSWW20, author = {Kai Hu and Siwei Sun and Meiqin Wang and Qingju Wang}, title = {An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2020}, url = {https://eprint.iacr.org/2020/1048}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuSWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoSSSSHW20, author = {Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang}, title = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes and Tweak Additions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2020}, url = {https://eprint.iacr.org/2020/1177}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoSSSSHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijeis/SunXC19, author = {Siwei Sun and Chang Xiong and Victor Chang}, title = {Acceptance of Information and Communication Technologies in Education: An Investigation Into University Students' Intentions to Use Mobile Educational Apps}, journal = {Int. J. Enterp. Inf. Syst.}, volume = {15}, number = {1}, pages = {24--44}, year = {2019}, url = {https://doi.org/10.4018/IJEIS.2019010102}, doi = {10.4018/IJEIS.2019010102}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijeis/SunXC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiSLWH19, author = {Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu}, title = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight Circuits}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {84--117}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.84-117}, doi = {10.13154/TOSC.V2019.I1.84-117}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiSLWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiSSLH19, author = {Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu}, title = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {147--170}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.147-170}, doi = {10.13154/TOSC.V2019.I4.147-170}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comcomap/LiangSZ019, author = {Song Liang and Siwei Sun and Lichen Zhang and Yuan Yao}, title = {Fabrication of UTC-PDs Integrated with THz Antenna}, booktitle = {Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, China, October 26-28, 2019}, pages = {40--43}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ComComAp46287.2019.9018833}, doi = {10.1109/COMCOMAP46287.2019.9018833}, timestamp = {Wed, 11 Mar 2020 10:16:08 +0100}, biburl = {https://dblp.org/rec/conf/comcomap/LiangSZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShiSSLH19, author = {Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full {\textbackslash}mathsf {MORUS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {180--209}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_7}, doi = {10.1007/978-3-030-26951-7\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ShiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/GeSS19, author = {Chunpeng Ge and Siwei Sun and Pawel Szalachowski}, title = {Permission less Block chains and Secure Logging}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2019, Seoul, Korea (South), May 14-17, 2019}, pages = {56--60}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BLOC.2019.8751306}, doi = {10.1109/BLOC.2019.8751306}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/GeSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenSSH19, author = {Qiu Chen and Danping Shi and Siwei Sun and Lei Hu}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {Automatic Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack on {SKINNY} with Key-Bridging}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {233--247}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_14}, doi = {10.1007/978-3-030-41579-2\_14}, timestamp = {Mon, 02 Mar 2020 17:19:02 +0100}, biburl = {https://dblp.org/rec/conf/icics/ChenSSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WeiSSWH19, author = {Man Wei and Danping Shi and Siwei Sun and Peng Wang and Lei Hu}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {Convolutional Neural Network Based Side-Channel Attacks with Customized Filters}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {799--813}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_46}, doi = {10.1007/978-3-030-41579-2\_46}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WeiSSWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CaiWZSH19, author = {Jiahao Cai and Zihao Wei and Yingjie Zhang and Siwei Sun and Lei Hu}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {38--43}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007249000380043}, doi = {10.5220/0007249000380043}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CaiWZSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SzalachowskiRHS19, author = {Pawel Szalachowski and Dani{\"{e}}l Reijsbergen and Ivan Homoliak and Siwei Sun}, editor = {Nadia Heninger and Patrick Traynor}, title = {StrongChain: Transparent and Collaborative Proof-of-Work Consensus}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {819--836}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/szalachowski}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/SzalachowskiRHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-03954, author = {Chunpeng Ge and Siwei Sun and Pawel Szalachowski}, title = {Permissionless Blockchains and Secure Logging}, journal = {CoRR}, volume = {abs/1903.03954}, year = {2019}, url = {http://arxiv.org/abs/1903.03954}, eprinttype = {arXiv}, eprint = {1903.03954}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-03954.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09655, author = {Pawel Szalachowski and Dani{\"{e}}l Reijsbergen and Ivan Homoliak and Siwei Sun}, title = {StrongChain: Transparent and Collaborative Proof-of-Work Consensus}, journal = {CoRR}, volume = {abs/1905.09655}, year = {2019}, url = {http://arxiv.org/abs/1905.09655}, eprinttype = {arXiv}, eprint = {1905.09655}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSLWH19, author = {Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu}, title = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight Circuit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2019}, url = {https://eprint.iacr.org/2019/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiSLWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiSSLH19, author = {Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu}, title = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full {MORUS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2019}, url = {https://eprint.iacr.org/2019/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSSLH19, author = {Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu}, title = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1310}, year = {2019}, url = {https://eprint.iacr.org/2019/1310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangHSTS18, author = {Qianqian Yang and Lei Hu and Danping Shi and Yosuke Todo and Siwei Sun}, title = {On the Complexity of Impossible Differential Cryptanalysis}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7393401:1--7393401:11}, year = {2018}, url = {https://doi.org/10.1155/2018/7393401}, doi = {10.1155/2018/7393401}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangHSTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezISSTWW18, author = {Patrick Derbez and Tetsu Iwata and Ling Sun and Siwei Sun and Yosuke Todo and Haoyang Wang and Meiqin Wang}, title = {Cryptanalysis of {AES-PRF} and Its Dual}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {161--191}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.161-191}, doi = {10.13154/TOSC.V2018.I2.161-191}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DerbezISSTWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShiSDTSH18, author = {Danping Shi and Siwei Sun and Patrick Derbez and Yosuke Todo and Bing Sun and Lei Hu}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Programming the Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack with Constraints}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {3--34}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_1}, doi = {10.1007/978-3-030-03329-3\_1}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShiSDTSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhangSCH18, author = {Yingjie Zhang and Siwei Sun and Jiahao Cai and Lei Hu}, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Speeding up {MILP} Aided Differential Characteristic Search with Matsui's Strategy}, booktitle = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, pages = {101--115}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8\_6}, doi = {10.1007/978-3-319-99136-8\_6}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhangSCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiSDTSH18, author = {Danping Shi and Siwei Sun and Patrick Derbez and Yosuke Todo and Bing Sun and Lei Hu}, title = {Programming the Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack with Constraints}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2018}, url = {https://eprint.iacr.org/2018/813}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiSDTSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ShiHSSQM17, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma}, title = {Improved linear (hull) cryptanalysis of round-reduced versions of {SIMON}}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {3}, pages = {39101:1--39101:3}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-0007-1}, doi = {10.1007/S11432-015-0007-1}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ShiHSSQM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunGLYTQH17, author = {Siwei Sun and David G{\'{e}}rault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu}, title = {Analysis of AES, SKINNY, and Others with Constraint Programming}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {281--306}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.281-306}, doi = {10.13154/TOSC.V2017.I1.281-306}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunGLYTQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunGLYTQH17, author = {Siwei Sun and David G{\'{e}}rault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu}, title = {Analysis of AES, SKINNY, and Others with Constraint Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2017}, url = {http://eprint.iacr.org/2017/162}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunGLYTQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FuWGSH16, author = {Kai Fu and Meiqin Wang and Yinghua Guo and Siwei Sun and Lei Hu}, editor = {Thomas Peyrin}, title = {MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {268--288}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_14}, doi = {10.1007/978-3-662-52993-5\_14}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/FuWGSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QiaoHS16a, author = {Kexin Qiao and Lei Hu and Siwei Sun}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing Techniques}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {64--85}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_5}, doi = {10.1007/978-3-319-54433-5\_5}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/QiaoHS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QiaoHS16, author = {Kexin Qiao and Lei Hu and Siwei Sun}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {74--84}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005684400740084}, doi = {10.5220/0005684400740084}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/QiaoHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShiHSS16, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {364--371}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005739103640371}, doi = {10.5220/0005739103640371}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ShiHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YangHSS16, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Related-Key Impossible Differential Analysis of Full Khudra}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {135--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_8}, doi = {10.1007/978-3-319-44524-3\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YangHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/YangHSS16, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {398--411}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_26}, doi = {10.1007/978-3-319-46298-1\_26}, timestamp = {Thu, 23 Jun 2022 19:57:36 +0200}, biburl = {https://dblp.org/rec/conf/nss/YangHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangHSS16, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, title = {Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2016}, url = {http://eprint.iacr.org/2016/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHWWSMYF16, author = {Siwei Sun and Lei Hu and Peng Wang and Meiqin Wang and Danping Shi and Xiaoshuang Ma and Qianqian Yang and Kai Fu}, title = {Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2016}, url = {http://eprint.iacr.org/2016/338}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHWWSMYF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuWGSH16, author = {Kai Fu and Meiqin Wang and Yinghua Guo and Siwei Sun and Lei Hu}, title = {MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2016}, url = {http://eprint.iacr.org/2016/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuWGSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/QiaoHSMK15, author = {Kexin Qiao and Lei Hu and Siwei Sun and Xiaoshuang Ma and Haibin Kan}, title = {Improved {MILP} Modeling for Automatic Security Evaluation and Application to {FOX}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {72--80}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.72}, doi = {10.1587/TRANSFUN.E98.A.72}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/QiaoHSMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShiHSS15, author = {Danping Shi and Lei Hu and Ling Song and Siwei Sun}, title = {Differential fault attack on Zorro block cipher}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2826--2835}, year = {2015}, url = {https://doi.org/10.1002/sec.1207}, doi = {10.1002/SEC.1207}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShiHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YangHSQSSM15, author = {Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Improved Differential Analysis of Block Cipher {PRIDE}}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {209--219}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_15}, doi = {10.1007/978-3-319-17533-1\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YangHSQSSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SunHWYQMSS15, author = {Siwei Sun and Lei Hu and Meiqin Wang and Qianqian Yang and Kexin Qiao and Xiaoshuang Ma and Ling Song and Jinyong Shan}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {141--157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_8}, doi = {10.1007/978-3-319-23318-5\_8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/SunHWYQMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SunHQMSS15, author = {Siwei Sun and Lei Hu and Kexin Qiao and Xiaoshuang Ma and Jinyong Shan and Ling Song}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers {DESL} and LBlock-s}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {97--111}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_7}, doi = {10.1007/978-3-319-22425-1\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SunHQMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhaHSS15, author = {Zhengbang Zha and Lei Hu and Siwei Sun and Jinyong Shan}, title = {Further results on differentially 4-uniform permutations over F\({}_{\mbox{2\({}^{\mbox{2m}}\)}}\)}, journal = {CoRR}, volume = {abs/1502.03874}, year = {2015}, url = {http://arxiv.org/abs/1502.03874}, eprinttype = {arXiv}, eprint = {1502.03874}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhaHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHWWQMSSF15, author = {Siwei Sun and Lei Hu and Meiqin Wang and Peng Wang and Kexin Qiao and Xiaoshuang Ma and Danping Shi and Ling Song and Kai Fu}, title = {Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of {SIMON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2015}, url = {http://eprint.iacr.org/2015/122}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHWWQMSSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangHSS15, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, title = {Related-key Impossible Differential Analysis of Full Khudra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2015}, url = {http://eprint.iacr.org/2015/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QiaoHS15, author = {Kexin Qiao and Lei Hu and Siwei Sun}, title = {Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2015}, url = {http://eprint.iacr.org/2015/902}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QiaoHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiHSS15, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song}, title = {Linear (hull) Cryptanalysis of Round-reduced Versions of {KATAN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {964}, year = {2015}, url = {http://eprint.iacr.org/2015/964}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/ZhaHSS14, author = {Zhengbang Zha and Lei Hu and Siwei Sun and Yao Sun}, title = {New constructions of {APN} polynomial functions in odd characteristic}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {25}, number = {4}, pages = {249--263}, year = {2014}, url = {https://doi.org/10.1007/s00200-014-0227-2}, doi = {10.1007/S00200-014-0227-2}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/ZhaHSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaHS14, author = {Zhengbang Zha and Lei Hu and Siwei Sun}, title = {Constructing new differentially 4-uniform permutations from the inverse function}, journal = {Finite Fields Their Appl.}, volume = {25}, pages = {64--78}, year = {2014}, url = {https://doi.org/10.1016/j.ffa.2013.08.003}, doi = {10.1016/J.FFA.2013.08.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhaHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/XuHSX14, author = {Jun Xu and Lei Hu and Siwei Sun and Yonghong Xie}, title = {Cryptanalysis of countermeasures against multiple transmission attacks on {NTRU}}, journal = {{IET} Commun.}, volume = {8}, number = {12}, pages = {2142--2146}, year = {2014}, url = {https://doi.org/10.1049/iet-com.2013.1092}, doi = {10.1049/IET-COM.2013.1092}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/XuHSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/XuHS14, author = {Jun Xu and Lei Hu and Siwei Sun}, title = {Cryptanalysis of two cryptosystems based on multiple intractability assumptions}, journal = {{IET} Commun.}, volume = {8}, number = {14}, pages = {2433--2437}, year = {2014}, url = {https://doi.org/10.1049/iet-com.2013.1101}, doi = {10.1049/IET-COM.2013.1101}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/XuHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SunHWQMS14, author = {Siwei Sun and Lei Hu and Peng Wang and Kexin Qiao and Xiaoshuang Ma and Ling Song}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, {DES(L)} and Other Bit-Oriented Block Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {158--178}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_9}, doi = {10.1007/978-3-662-45611-8\_9}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SunHWQMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SongHSZSH14, author = {Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao}, editor = {Lucas Chi Kwong Hui and S. H. Qing and Elaine Shi and Siu{-}Ming Yiu}, title = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}}, booktitle = {Information and Communications Security - 16th International Conference, {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8958}, pages = {1--15}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21966-0\_1}, doi = {10.1007/978-3-319-21966-0\_1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SongHSZSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MaHSQS14, author = {Xiaoshuang Ma and Lei Hu and Siwei Sun and Kexin Qiao and Jinyong Shan}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Tighter Security Bound of {MIBS} Block Cipher against Differential Attack}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {518--525}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_41}, doi = {10.1007/978-3-319-11698-3\_41}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MaHSQS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongHSZSH14a, author = {Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao}, title = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {683}, year = {2014}, url = {http://eprint.iacr.org/2014/683}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongHSZSH14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHWWQMSS14, author = {Siwei Sun and Lei Hu and Meiqin Wang and Peng Wang and Kexin Qiao and Xiaoshuang Ma and Danping Shi and Ling Song}, title = {Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2014}, url = {http://eprint.iacr.org/2014/747}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHWWQMSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiHSSQM14, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma}, title = {Improved Linear (hull) Cryptanalysis of Round-reduced Versions of {SIMON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2014}, url = {http://eprint.iacr.org/2014/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiHSSQM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangHSQSSM14, author = {Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma}, title = {Improved Differential Analysis of Block Cipher {PRIDE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {978}, year = {2014}, url = {http://eprint.iacr.org/2014/978}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangHSQSSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShanHSSM14, author = {Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma}, title = {Related-Key Differential Attack on Round Reduced {RECTANGLE-80}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2014}, url = {http://eprint.iacr.org/2014/986}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShanHSSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SunHSXW13, author = {Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {39--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_3}, doi = {10.1007/978-3-319-12087-4\_3}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/SunHSXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHSXW13, author = {Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang}, title = {Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2013}, url = {http://eprint.iacr.org/2013/547}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHSXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHW13, author = {Siwei Sun and Lei Hu and Peng Wang}, title = {Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2013}, url = {http://eprint.iacr.org/2013/676}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/XuHSW12, author = {Jun Xu and Lei Hu and Siwei Sun and Ping Wang}, editor = {Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Mark Manulis}, title = {Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem}, booktitle = {Cryptology and Network Security, 11th International Conference, {CANS} 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings}, volume = {7712}, pages = {32--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35404-5\_4}, doi = {10.1007/978-3-642-35404-5\_4}, timestamp = {Sun, 02 Jun 2019 21:12:31 +0200}, biburl = {https://dblp.org/rec/conf/cans/XuHSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XuHS12, author = {Jun Xu and Lei Hu and Siwei Sun}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {45--57}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_5}, doi = {10.1007/978-3-642-34129-8\_5}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/XuHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SunHXZ11, author = {Siwei Sun and Lei Hu and Yonghong Xie and Xiangyong Zeng}, editor = {Dongdai Lin and Gene Tsudik and Xiaoyun Wang}, title = {Cube Cryptanalysis of Hitag2 Stream Cipher}, booktitle = {Cryptology and Network Security - 10th International Conference, {CANS} 2011, Sanya, China, December 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7092}, pages = {15--25}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25513-7\_3}, doi = {10.1007/978-3-642-25513-7\_3}, timestamp = {Mon, 25 Nov 2019 15:32:12 +0100}, biburl = {https://dblp.org/rec/conf/cans/SunHXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JiangHDS10, author = {Xin Jiang and Lei Hu and Jintai Ding and Siwei Sun}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {On the Kipnis-Shamir Method Solving the MinRank Problem}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {1--13}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 15:14:43 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JiangHDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.