BibTeX records: Siwei Sun

download as .bib file

@article{DBLP:journals/ieicetd/WangWS24,
  author       = {Gao Wang and
                  Gaoli Wang and
                  Siwei Sun},
  title        = {Investigating and Enhancing the Neural Distinguisher for Differential
                  Cryptanalysis},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {107},
  number       = {8},
  pages        = {1016--1028},
  year         = {2024},
  url          = {https://doi.org/10.1587/transinf.2024edp7011},
  doi          = {10.1587/TRANSINF.2024EDP7011},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/WangWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NiuHSZW24,
  author       = {Zhongfeng Niu and
                  Kai Hu and
                  Siwei Sun and
                  Zhiyu Zhang and
                  Meiqin Wang},
  editor       = {Leonid Reyzin and
                  Douglas Stebila},
  title        = {Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear
                  Approximations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14923},
  pages        = {73--104},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-68385-5\_3},
  doi          = {10.1007/978-3-031-68385-5\_3},
  timestamp    = {Wed, 28 Aug 2024 21:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NiuHSZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QiaoSWWCWZ24,
  author       = {Kexin Qiao and
                  Siwei Sun and
                  Zhaoyang Wang and
                  Zehan Wu and
                  Junjie Cheng and
                  An Wang and
                  Liehuang Zhu},
  title        = {A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted
                  Chosen-Ciphertext Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/135},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/QiaoSWWCWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiuHSZW24,
  author       = {Zhongfeng Niu and
                  Kai Hu and
                  Siwei Sun and
                  Zhiyu Zhang and
                  Meiqin Wang},
  title        = {Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear
                  Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {857},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/857},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NiuHSZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QiaoYSHJ23,
  author       = {Wenxiao Qiao and
                  Hailun Yan and
                  Siwei Sun and
                  Lei Hu and
                  Jiwu Jing},
  title        = {New cryptanalysis of LowMC with algebraic techniques},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {2057--2075},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01178-1},
  doi          = {10.1007/S10623-022-01178-1},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QiaoYSHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WeiSHWP23,
  author       = {Zihao Wei and
                  Siwei Sun and
                  Lei Hu and
                  Man Wei and
                  Ren{\'{e}} Peralta},
  title        = {Searching the space of tower field implementations of the {\unicode{54589}}\({}_{\mbox{2\({}^{\mbox{8}}\)}}\)
                  inverter - with applications to AES, Camellia and {SM4}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {1--26},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.10052962},
  doi          = {10.1504/IJICS.2023.10052962},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/WeiSHWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LiuNSLH23,
  author       = {Yunwen Liu and
                  Zhongfeng Niu and
                  Siwei Sun and
                  Chao Li and
                  Lei Hu},
  title        = {Rotational Differential-Linear Cryptanalysis Revisited},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-022-09440-4},
  doi          = {10.1007/S00145-022-09440-4},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/LiuNSLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WangWS23,
  author       = {Dachao Wang and
                  Baocang Wang and
                  Siwei Sun},
  title        = {SAT-aided Automatic Search of Boomerang Distinguishers for {ARX} Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {152--191},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.152-191},
  doi          = {10.46586/TOSC.V2023.I1.152-191},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/WangWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangSWH23,
  author       = {Zhiyu Zhang and
                  Siwei Sun and
                  Caibing Wang and
                  Lei Hu},
  title        = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like
                  Hashing},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {224--252},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.224-252},
  doi          = {10.46586/TOSC.V2023.I2.224-252},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhangSWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShiSSHY23,
  author       = {Danping Shi and
                  Siwei Sun and
                  Ling Song and
                  Lei Hu and
                  Qianqian Yang},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Sel{\c{c}}uk
                  Meet-in-the-Middle Cryptanalysis of {SKINNY}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_3},
  doi          = {10.1007/978-3-031-30634-1\_3},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShiSSHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/YuLWSM23,
  author       = {Xiaorui Yu and
                  Fukang Liu and
                  Gaoli Wang and
                  Siwei Sun and
                  Willi Meier},
  editor       = {Claude Carlet and
                  Kalikinkar Mandal and
                  Vincent Rijmen},
  title        = {A Closer Look at the S-Box: Deeper Analysis of Round-Reduced {ASCON-HASH}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference,
                  Fredericton, Canada, August 14-18, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14201},
  pages        = {22--42},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-53368-6\_2},
  doi          = {10.1007/978-3-031-53368-6\_2},
  timestamp    = {Tue, 05 Mar 2024 11:21:46 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/YuLWSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWS23,
  author       = {Dachao Wang and
                  Baocang Wang and
                  Siwei Sun},
  title        = {SAT-aided Automatic Search of Boomerang Distinguishers for {ARX} Ciphers
                  (Long Paper)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/202},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiSSHY23,
  author       = {Danping Shi and
                  Siwei Sun and
                  Ling Song and
                  Lei Hu and
                  Qianqian Yang},
  title        = {Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk
                  Meet-in-the-Middle Cryptanalysis of {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/255},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiSSHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSWH23,
  author       = {Zhiyu Zhang and
                  Siwei Sun and
                  Caibing Wang and
                  Lei Hu},
  title        = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like
                  Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/772},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuLWSM23,
  author       = {Xiaorui Yu and
                  Fukang Liu and
                  Gaoli Wang and
                  Siwei Sun and
                  Willi Meier},
  title        = {A Closer Look at the S-box: Deeper Analysis of Round-Reduced {ASCON-HASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {865},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/865},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuLWSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiuSYW23,
  author       = {Zhongfeng Niu and
                  Siwei Sun and
                  Hailun Yan and
                  Qi Wang},
  title        = {General Results of Linear Approximations over Finite Abelian Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {911},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/911},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NiuSYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengJHZWQZZST23,
  author       = {Dengguo Feng and
                  Lin Jiao and
                  Yonglin Hao and
                  Qunxiong Zheng and
                  Wenling Wu and
                  Wenfeng Qi and
                  Lei Zhang and
                  Liting Zhang and
                  Siwei Sun and
                  Tian Tian},
  title        = {{LOL:} {A} Highly Flexible Framework for Designing Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1235},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1235},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengJHZWQZZST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WeiSWGH22,
  author       = {Man Wei and
                  Siwei Sun and
                  Zihao Wei and
                  Zheng Gong and
                  Lei Hu},
  title        = {A small first-order {DPA} resistant {AES} implementation with no fresh
                  randomness},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {6},
  pages        = {1--3},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-019-1469-7},
  doi          = {10.1007/S11432-019-1469-7},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WeiSWGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZouWSLLW22,
  author       = {Jian Zou and
                  Zihao Wei and
                  Siwei Sun and
                  Yiyuan Luo and
                  Qian Liu and
                  Wenling Wu},
  title        = {Some efficient quantum circuit implementations of Camellia},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {4},
  pages        = {131},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03477-x},
  doi          = {10.1007/S11128-022-03477-X},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZouWSLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HuaDSZHW22,
  author       = {Jialiang Hua and
                  Xiaoyang Dong and
                  Siwei Sun and
                  Zhiyu Zhang and
                  Lei Hu and
                  Xiaoyun Wang},
  title        = {Improved {MITM} Cryptanalysis on Streebog},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {63--91},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.63-91},
  doi          = {10.46586/TOSC.V2022.I2.63-91},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HuaDSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/YangSSSH22,
  author       = {Qianqian Yang and
                  Ling Song and
                  Siwei Sun and
                  Danping Shi and
                  Lei Hu},
  title        = {New Properties of the Double Boomerang Connectivity Table},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {208--242},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.208-242},
  doi          = {10.46586/TOSC.V2022.I4.208-242},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/YangSSSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HuangS22,
  author       = {Zhenyu Huang and
                  Siwei Sun},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Synthesizing Quantum Circuits of {AES} with Lower T-depth and Less
                  Qubits},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {614--644},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_21},
  doi          = {10.1007/978-3-031-22969-5\_21},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HuangS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NiuSLL22,
  author       = {Zhongfeng Niu and
                  Siwei Sun and
                  Yunwen Liu and
                  Chao Li},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Rotational Differential-Linear Distinguishers of {ARX} Ciphers with
                  Arbitrary Output Linear Masks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_1},
  doi          = {10.1007/978-3-031-15802-5\_1},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NiuSLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DongQSW22,
  author       = {Xiaoyang Dong and
                  Lingyue Qin and
                  Siwei Sun and
                  Xiaoyun Wang},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle
                  Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_1},
  doi          = {10.1007/978-3-031-07082-2\_1},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DongQSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuaDSZHW22,
  author       = {Jialiang Hua and
                  Xiaoyang Dong and
                  Siwei Sun and
                  Zhiyu Zhang and
                  Lei Hu and
                  Xiaoyun Wang},
  title        = {Improved {MITM} Cryptanalysis on Streebog},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/568},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuaDSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangS22,
  author       = {Zhenyu Huang and
                  Siwei Sun},
  title        = {Synthesizing Quantum Circuits of {AES} with Lower T-depth and Less
                  Qubits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/620},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiuSL022,
  author       = {Zhongfeng Niu and
                  Siwei Sun and
                  Yunwen Liu and
                  Chao Li},
  title        = {Rotational Differential-Linear Distinguishers of {ARX} Ciphers with
                  Arbitrary Output Linear Masks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/765},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NiuSL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLGHJHZY22,
  author       = {Siwei Sun and
                  Tianyu Liu and
                  Zhi Guan and
                  Yifei He and
                  Jiwu Jing and
                  Lei Hu and
                  Zhenfeng Zhang and
                  Hailun Yan},
  title        = {{LMS-SM3} and {HSS-SM3:} Instantiating Hash-based Post-Quantum Signature
                  Schemes with {SM3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1491},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1491},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLGHJHZY22a,
  author       = {Siwei Sun and
                  Tianyu Liu and
                  Zhi Guan and
                  Yifei He and
                  Jiwu Jing and
                  Lei Hu and
                  Zhenfeng Zhang and
                  Hailun Yan},
  title        = {{XMSS-SM3} and {MT-XMSS-SM3:} Instantiating Extended Merkle Signature
                  Schemes with {SM3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1552},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1552},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangSSSH22,
  author       = {Qianqian Yang and
                  Ling Song and
                  Siwei Sun and
                  Danping Shi and
                  Lei Hu},
  title        = {New Properties of Double Boomerang Connectivity Table},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1579},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1579},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YangSSSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WeiSWH21,
  author       = {Man Wei and
                  Siwei Sun and
                  Zihao Wei and
                  Lei Hu},
  title        = {Unbalanced sharing: a threshold implementation of {SM4}},
  journal      = {Sci. China Inf. Sci.},
  volume       = {64},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11432-018-9794-6},
  doi          = {10.1007/S11432-018-9794-6},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WeiSWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbir/SunZLC21,
  author       = {Siwei Sun and
                  Fangyu Zhang and
                  Kaicheng Liao and
                  Victor I. Chang},
  title        = {Determine Factors of {NFC} Mobile Payment Continuous Adoption in Shopping
                  Malls: Evidence From Indonesia},
  journal      = {Int. J. Bus. Intell. Res.},
  volume       = {12},
  number       = {2},
  pages        = {1--20},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJBIR.20210701.oa1},
  doi          = {10.4018/IJBIR.20210701.OA1},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbir/SunZLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijkm/SunZC21,
  author       = {Siwei Sun and
                  Fangyu Zhang and
                  Victor Chang},
  title        = {Motivators of Researchers' Knowledge Sharing and Community Promotion
                  in Online Multi-Background Community},
  journal      = {Int. J. Knowl. Manag.},
  volume       = {17},
  number       = {2},
  pages        = {23--49},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJKM.2021040102},
  doi          = {10.4018/IJKM.2021040102},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijkm/SunZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/RohitHSS21,
  author       = {Raghvendra Rohit and
                  Kai Hu and
                  Sumanta Sarkar and
                  Siwei Sun},
  title        = {Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {130--155},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.130-155},
  doi          = {10.46586/TOSC.V2021.I1.130-155},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/RohitHSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DongZSWWH21,
  author       = {Xiaoyang Dong and
                  Zhiyu Zhang and
                  Siwei Sun and
                  Congming Wei and
                  Xiaoyun Wang and
                  Lei Hu},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing
                  by Exploiting Related-Key Differentials},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {241--271},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_9},
  doi          = {10.1007/978-3-030-92062-3\_9},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DongZSWWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HuSTWW21,
  author       = {Kai Hu and
                  Siwei Sun and
                  Yosuke Todo and
                  Meiqin Wang and
                  Qingju Wang},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Massive Superpoly Recovery with Nested Monomial Predictions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {392--421},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_14},
  doi          = {10.1007/978-3-030-92062-3\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HuSTWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DongHSLWH21,
  author       = {Xiaoyang Dong and
                  Jialiang Hua and
                  Siwei Sun and
                  Zheng Li and
                  Xiaoyun Wang and
                  Lei Hu},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and
                  Preimage Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {278--308},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_10},
  doi          = {10.1007/978-3-030-84252-9\_10},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DongHSLWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/NiuLSW21,
  author       = {Chao Niu and
                  Muzhou Li and
                  Siwei Sun and
                  Meiqin Wang},
  editor       = {Kenneth G. Paterson},
  title        = {Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts
                  and Tweakeys},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {126--147},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_6},
  doi          = {10.1007/978-3-030-75539-3\_6},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/NiuLSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LiuSL21,
  author       = {Yunwen Liu and
                  Siwei Sun and
                  Chao Li},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Rotational Cryptanalysis from a Differential-Linear Perspective -
                  Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {741--770},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_26},
  doi          = {10.1007/978-3-030-77870-5\_26},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LiuSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BaoD00SS021,
  author       = {Zhenzhen Bao and
                  Xiaoyang Dong and
                  Jian Guo and
                  Zheng Li and
                  Danping Shi and
                  Siwei Sun and
                  Xiaoyun Wang},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like
                  Hashing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {771--804},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_27},
  doi          = {10.1007/978-3-030-77870-5\_27},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BaoD00SS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangLQZSH21,
  author       = {Yingjie Zhang and
                  Lijun Lyu and
                  Kexin Qiao and
                  Zhiyu Zhang and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  Guilin Wang and
                  Jian Shen and
                  Mark Ryan and
                  Weizhi Meng and
                  Ding Wang},
  title        = {Automatic Key Recovery of Feistel Ciphers: Application to {SIMON}
                  and {SIMECK}},
  booktitle    = {Information Security Practice and Experience: 16th International Conference,
                  {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13107},
  pages        = {147--167},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93206-0\_10},
  doi          = {10.1007/978-3-030-93206-0\_10},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangLQZSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuSL21,
  author       = {Yunwen Liu and
                  Siwei Sun and
                  Chao Li},
  title        = {Rotational Cryptanalysis From a Differential-linear Perspective: Practical
                  Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/189},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RohitHSS21,
  author       = {Raghvendra Rohit and
                  Kai Hu and
                  Sumanta Sarkar and
                  Siwei Sun},
  title        = {Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/194},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RohitHSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuNSLH21,
  author       = {Yunwen Liu and
                  Zhongfeng Niu and
                  Siwei Sun and
                  Chao Li and
                  Lei Hu},
  title        = {A Note on the Bias of Rotational Differential-Linear Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/379},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuNSLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongHSLWH21,
  author       = {Xiaoyang Dong and
                  Jialiang Hua and
                  Siwei Sun and
                  Zheng Li and
                  Xiaoyun Wang and
                  Lei Hu},
  title        = {Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and
                  Collision Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/427},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongHSLWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongQSW21,
  author       = {Xiaoyang Dong and
                  Lingyue Qin and
                  Siwei Sun and
                  Xiaoyun Wang},
  title        = {Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/856},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongQSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongZSW0H21,
  author       = {Xiaoyang Dong and
                  Zhiyu Zhang and
                  Siwei Sun and
                  Congming Wei and
                  Xiaoyun Wang and
                  Lei Hu},
  title        = {Automatic Classical and Quantum Rebound Attacks on AES-like Hashing
                  by Exploiting Related-key Differentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1119},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1119},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongZSW0H21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuSTWW21,
  author       = {Kai Hu and
                  Siwei Sun and
                  Yosuke Todo and
                  Meiqin Wang and
                  Qingju Wang},
  title        = {Massive Superpoly Recovery with Nested Monomial Predictions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1225},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1225},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuSTWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/ZhangSLC20,
  author       = {Fangyu Zhang and
                  Siwei Sun and
                  Chenlin Liu and
                  Victor Chang},
  title        = {Consumer innovativeness, product innovation and smart toys},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {41},
  pages        = {100974},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.elerap.2020.100974},
  doi          = {10.1016/J.ELERAP.2020.100974},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ecra/ZhangSLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoSSSSHW20,
  author       = {Hao Guo and
                  Siwei Sun and
                  Danping Shi and
                  Ling Sun and
                  Yao Sun and
                  Lei Hu and
                  Meiqin Wang},
  title        = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes
                  and Tweak Additions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {119--151},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.119-151},
  doi          = {10.13154/TOSC.V2020.I3.119-151},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoSSSSHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SahaSSSSZ20,
  author       = {Dhiman Saha and
                  Yu Sasaki and
                  Danping Shi and
                  Ferdinand Sibleyras and
                  Siwei Sun and
                  Yingjie Zhang},
  title        = {On the Security Margin of TinyJAMBU with Refined Differential and
                  Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {152--174},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.152-174},
  doi          = {10.13154/TOSC.V2020.I3.152-174},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SahaSSSSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HuSW020,
  author       = {Kai Hu and
                  Siwei Sun and
                  Meiqin Wang and
                  Qingju Wang},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {An Algebraic Formulation of the Division Property: Revisiting Degree
                  Evaluations, Cube Attacks, and Key-Independent Sums},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {446--476},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_15},
  doi          = {10.1007/978-3-030-64837-4\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HuSW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZouWSLW20,
  author       = {Jian Zou and
                  Zihao Wei and
                  Siwei Sun and
                  Ximeng Liu and
                  Wenling Wu},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Quantum Circuit Implementations of {AES} with Fewer Qubits},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {697--726},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_24},
  doi          = {10.1007/978-3-030-64834-3\_24},
  timestamp    = {Thu, 10 Dec 2020 10:09:50 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZouWSLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DongSSGWH20,
  author       = {Xiaoyang Dong and
                  Siwei Sun and
                  Danping Shi and
                  Fei Gao and
                  Xiaoyun Wang and
                  Lei Hu},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random
                  Access Memories},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {727--757},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_25},
  doi          = {10.1007/978-3-030-64834-3\_25},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DongSSGWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuSS20,
  author       = {Bowen Liu and
                  Pawel Szalachowski and
                  Siwei Sun},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Fail-safe Watchtowers and Short-lived Assertions for Payment Channels},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {506--518},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384716},
  doi          = {10.1145/3320269.3384716},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiuSS20,
  author       = {Bowen Liu and
                  Siwei Sun and
                  Pawel Szalachowski},
  title        = {{SMACS:} Smart Contract Access Control Service},
  booktitle    = {50th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2020, Valencia, Spain, June 29 - July 2, 2020},
  pages        = {221--232},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSN48063.2020.00039},
  doi          = {10.1109/DSN48063.2020.00039},
  timestamp    = {Wed, 05 Aug 2020 14:09:10 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/LiuSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-06127,
  author       = {Bowen Liu and
                  Pawel Szalachowski and
                  Siwei Sun},
  title        = {Fail-safe Watchtowers and Short-lived Assertions for Payment Channels},
  journal      = {CoRR},
  volume       = {abs/2003.06127},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.06127},
  eprinttype    = {arXiv},
  eprint       = {2003.06127},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-06127.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-07495,
  author       = {Bowen Liu and
                  Siwei Sun and
                  Pawel Szalachowski},
  title        = {{SMACS:} Smart Contract Access Control Service},
  journal      = {CoRR},
  volume       = {abs/2003.07495},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.07495},
  eprinttype    = {arXiv},
  eprint       = {2003.07495},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-07495.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoDGLSSW20,
  author       = {Zhenzhen Bao and
                  Xiaoyang Dong and
                  Jian Guo and
                  Zheng Li and
                  Danping Shi and
                  Siwei Sun and
                  Xiaoyun Wang},
  title        = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like
                  Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/467},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoDGLSSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongSSGWH20,
  author       = {Xiaoyang Dong and
                  Siwei Sun and
                  Danping Shi and
                  Fei Gao and
                  Xiaoyun Wang and
                  Lei Hu},
  title        = {Quantum Collision Attacks on AES-like Hashing with Low Quantum Random
                  Access Memories},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1030},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1030},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongSSGWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaSSSSZ20,
  author       = {Dhiman Saha and
                  Yu Sasaki and
                  Danping Shi and
                  Ferdinand Sibleyras and
                  Siwei Sun and
                  Yingjie Zhang},
  title        = {On the Security Margin of TinyJAMBU with Refined Differential and
                  Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1045},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1045},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaSSSSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuSWW20,
  author       = {Kai Hu and
                  Siwei Sun and
                  Meiqin Wang and
                  Qingju Wang},
  title        = {An Algebraic Formulation of the Division Property: Revisiting Degree
                  Evaluations, Cube Attacks, and Key-Independent Sums},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1048},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuSWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoSSSSHW20,
  author       = {Hao Guo and
                  Siwei Sun and
                  Danping Shi and
                  Ling Sun and
                  Yao Sun and
                  Lei Hu and
                  Meiqin Wang},
  title        = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes
                  and Tweak Additions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1177},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoSSSSHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijeis/SunXC19,
  author       = {Siwei Sun and
                  Chang Xiong and
                  Victor Chang},
  title        = {Acceptance of Information and Communication Technologies in Education:
                  An Investigation Into University Students' Intentions to Use Mobile
                  Educational Apps},
  journal      = {Int. J. Enterp. Inf. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {24--44},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJEIS.2019010102},
  doi          = {10.4018/IJEIS.2019010102},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijeis/SunXC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiSLWH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Chaoyun Li and
                  Zihao Wei and
                  Lei Hu},
  title        = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight
                  Circuits},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {84--117},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.84-117},
  doi          = {10.13154/TOSC.V2019.I1.84-117},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiSLWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiSSLH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Danping Shi and
                  Chaoyun Li and
                  Lei Hu},
  title        = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {147--170},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.147-170},
  doi          = {10.13154/TOSC.V2019.I4.147-170},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comcomap/LiangSZ019,
  author       = {Song Liang and
                  Siwei Sun and
                  Lichen Zhang and
                  Yuan Yao},
  title        = {Fabrication of UTC-PDs Integrated with THz Antenna},
  booktitle    = {Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen,
                  China, October 26-28, 2019},
  pages        = {40--43},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ComComAp46287.2019.9018833},
  doi          = {10.1109/COMCOMAP46287.2019.9018833},
  timestamp    = {Wed, 11 Mar 2020 10:16:08 +0100},
  biburl       = {https://dblp.org/rec/conf/comcomap/LiangSZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShiSSLH19,
  author       = {Danping Shi and
                  Siwei Sun and
                  Yu Sasaki and
                  Chaoyun Li and
                  Lei Hu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions
                  of Full {\textbackslash}mathsf {MORUS}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {180--209},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_7},
  doi          = {10.1007/978-3-030-26951-7\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ShiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/GeSS19,
  author       = {Chunpeng Ge and
                  Siwei Sun and
                  Pawel Szalachowski},
  title        = {Permission less Block chains and Secure Logging},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2019, Seoul, Korea (South), May 14-17, 2019},
  pages        = {56--60},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BLOC.2019.8751306},
  doi          = {10.1109/BLOC.2019.8751306},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/GeSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenSSH19,
  author       = {Qiu Chen and
                  Danping Shi and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {Automatic Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack on {SKINNY}
                  with Key-Bridging},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_14},
  doi          = {10.1007/978-3-030-41579-2\_14},
  timestamp    = {Mon, 02 Mar 2020 17:19:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ChenSSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WeiSSWH19,
  author       = {Man Wei and
                  Danping Shi and
                  Siwei Sun and
                  Peng Wang and
                  Lei Hu},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {Convolutional Neural Network Based Side-Channel Attacks with Customized
                  Filters},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {799--813},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_46},
  doi          = {10.1007/978-3-030-41579-2\_46},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WeiSSWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CaiWZSH19,
  author       = {Jiahao Cai and
                  Zihao Wei and
                  Yingjie Zhang and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {38--43},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007249000380043},
  doi          = {10.5220/0007249000380043},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CaiWZSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SzalachowskiRHS19,
  author       = {Pawel Szalachowski and
                  Dani{\"{e}}l Reijsbergen and
                  Ivan Homoliak and
                  Siwei Sun},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {StrongChain: Transparent and Collaborative Proof-of-Work Consensus},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {819--836},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/szalachowski},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SzalachowskiRHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-03954,
  author       = {Chunpeng Ge and
                  Siwei Sun and
                  Pawel Szalachowski},
  title        = {Permissionless Blockchains and Secure Logging},
  journal      = {CoRR},
  volume       = {abs/1903.03954},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.03954},
  eprinttype    = {arXiv},
  eprint       = {1903.03954},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-03954.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09655,
  author       = {Pawel Szalachowski and
                  Dani{\"{e}}l Reijsbergen and
                  Ivan Homoliak and
                  Siwei Sun},
  title        = {StrongChain: Transparent and Collaborative Proof-of-Work Consensus},
  journal      = {CoRR},
  volume       = {abs/1905.09655},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.09655},
  eprinttype    = {arXiv},
  eprint       = {1905.09655},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-09655.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSLWH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Chaoyun Li and
                  Zihao Wei and
                  Lei Hu},
  title        = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight
                  Circuit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSLWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiSSLH19,
  author       = {Danping Shi and
                  Siwei Sun and
                  Yu Sasaki and
                  Chaoyun Li and
                  Lei Hu},
  title        = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions
                  of Full {MORUS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSSLH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Danping Shi and
                  Chaoyun Li and
                  Lei Hu},
  title        = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1310},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangHSTS18,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Danping Shi and
                  Yosuke Todo and
                  Siwei Sun},
  title        = {On the Complexity of Impossible Differential Cryptanalysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7393401:1--7393401:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7393401},
  doi          = {10.1155/2018/7393401},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangHSTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezISSTWW18,
  author       = {Patrick Derbez and
                  Tetsu Iwata and
                  Ling Sun and
                  Siwei Sun and
                  Yosuke Todo and
                  Haoyang Wang and
                  Meiqin Wang},
  title        = {Cryptanalysis of {AES-PRF} and Its Dual},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {161--191},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.161-191},
  doi          = {10.13154/TOSC.V2018.I2.161-191},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezISSTWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShiSDTSH18,
  author       = {Danping Shi and
                  Siwei Sun and
                  Patrick Derbez and
                  Yosuke Todo and
                  Bing Sun and
                  Lei Hu},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Programming the Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack with
                  Constraints},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {3--34},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_1},
  doi          = {10.1007/978-3-030-03329-3\_1},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShiSDTSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhangSCH18,
  author       = {Yingjie Zhang and
                  Siwei Sun and
                  Jiahao Cai and
                  Lei Hu},
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Speeding up {MILP} Aided Differential Characteristic Search with Matsui's
                  Strategy},
  booktitle    = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8\_6},
  doi          = {10.1007/978-3-319-99136-8\_6},
  timestamp    = {Tue, 20 Aug 2024 07:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhangSCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiSDTSH18,
  author       = {Danping Shi and
                  Siwei Sun and
                  Patrick Derbez and
                  Yosuke Todo and
                  Bing Sun and
                  Lei Hu},
  title        = {Programming the Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack with
                  Constraints},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/813},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiSDTSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ShiHSSQM17,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song and
                  Kexin Qiao and
                  Xiaoshuang Ma},
  title        = {Improved linear (hull) cryptanalysis of round-reduced versions of
                  {SIMON}},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {3},
  pages        = {39101:1--39101:3},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-0007-1},
  doi          = {10.1007/S11432-015-0007-1},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ShiHSSQM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunGLYTQH17,
  author       = {Siwei Sun and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Qianqian Yang and
                  Yosuke Todo and
                  Kexin Qiao and
                  Lei Hu},
  title        = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {281--306},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.281-306},
  doi          = {10.13154/TOSC.V2017.I1.281-306},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SunGLYTQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunGLYTQH17,
  author       = {Siwei Sun and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Qianqian Yang and
                  Yosuke Todo and
                  Kexin Qiao and
                  Lei Hu},
  title        = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/162},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunGLYTQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FuWGSH16,
  author       = {Kai Fu and
                  Meiqin Wang and
                  Yinghua Guo and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Thomas Peyrin},
  title        = {MILP-Based Automatic Search Algorithms for Differential and Linear
                  Trails for Speck},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {268--288},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_14},
  doi          = {10.1007/978-3-662-52993-5\_14},
  timestamp    = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FuWGSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16a,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing
                  Techniques},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {64--85},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_5},
  doi          = {10.1007/978-3-319-54433-5\_5},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/QiaoHS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Differential Security Evaluation of Simeck with Dynamic Key-guessing
                  Techniques},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {74--84},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005684400740084},
  doi          = {10.5220/0005684400740084},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/QiaoHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShiHSS16,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {364--371},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005739103640371},
  doi          = {10.5220/0005739103640371},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ShiHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YangHSS16,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Related-Key Impossible Differential Analysis of Full Khudra},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_8},
  doi          = {10.1007/978-3-319-44524-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YangHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YangHSS16,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {Extension of Meet-in-the-Middle Technique for Truncated Differential
                  and Its Application to RoadRunneR},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {398--411},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_26},
  doi          = {10.1007/978-3-319-46298-1\_26},
  timestamp    = {Thu, 23 Jun 2022 19:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/YangHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangHSS16,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  title        = {Truncated Differential Analysis of Round-Reduced RoadRunneR Block
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHWWSMYF16,
  author       = {Siwei Sun and
                  Lei Hu and
                  Peng Wang and
                  Meiqin Wang and
                  Danping Shi and
                  Xiaoshuang Ma and
                  Qianqian Yang and
                  Kai Fu},
  title        = {Mixed Integer Programming Models for Finite Automaton and Its Application
                  to Additive Differential Patterns of Exclusive-Or},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/338},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHWWSMYF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWGSH16,
  author       = {Kai Fu and
                  Meiqin Wang and
                  Yinghua Guo and
                  Siwei Sun and
                  Lei Hu},
  title        = {MILP-Based Automatic Search Algorithms for Diff erential and Linear
                  Trails for Speck},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuWGSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/QiaoHSMK15,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun and
                  Xiaoshuang Ma and
                  Haibin Kan},
  title        = {Improved {MILP} Modeling for Automatic Security Evaluation and Application
                  to {FOX}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {72--80},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.72},
  doi          = {10.1587/TRANSFUN.E98.A.72},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/QiaoHSMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShiHSS15,
  author       = {Danping Shi and
                  Lei Hu and
                  Ling Song and
                  Siwei Sun},
  title        = {Differential fault attack on Zorro block cipher},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2826--2835},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1207},
  doi          = {10.1002/SEC.1207},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShiHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YangHSQSSM15,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Kexin Qiao and
                  Ling Song and
                  Jinyong Shan and
                  Xiaoshuang Ma},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Improved Differential Analysis of Block Cipher {PRIDE}},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {209--219},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_15},
  doi          = {10.1007/978-3-319-17533-1\_15},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YangHSQSSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SunHWYQMSS15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Meiqin Wang and
                  Qianqian Yang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Ling Song and
                  Jinyong Shan},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Extending the Applicability of the Mixed-Integer Programming Technique
                  in Automatic Differential Cryptanalysis},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_8},
  doi          = {10.1007/978-3-319-23318-5\_8},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/SunHWYQMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SunHQMSS15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Jinyong Shan and
                  Ling Song},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improvement on the Method for Automatic Differential Analysis and
                  Its Application to Two Lightweight Block Ciphers {DESL} and LBlock-s},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_7},
  doi          = {10.1007/978-3-319-22425-1\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SunHQMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhaHSS15,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Siwei Sun and
                  Jinyong Shan},
  title        = {Further results on differentially 4-uniform permutations over F\({}_{\mbox{2\({}^{\mbox{2m}}\)}}\)},
  journal      = {CoRR},
  volume       = {abs/1502.03874},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.03874},
  eprinttype    = {arXiv},
  eprint       = {1502.03874},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhaHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHWWQMSSF15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Meiqin Wang and
                  Peng Wang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Danping Shi and
                  Ling Song and
                  Kai Fu},
  title        = {Constructing Mixed-integer Programming Models whose Feasible Region
                  is Exactly the Set of All Valid Differential Characteristics of {SIMON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/122},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHWWQMSSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangHSS15,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  title        = {Related-key Impossible Differential Analysis of Full Khudra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QiaoHS15,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  title        = {Differential Security Evaluation of Simeck with Dynamic Key-guessing
                  Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/902},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QiaoHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiHSS15,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  title        = {Linear (hull) Cryptanalysis of Round-reduced Versions of {KATAN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {964},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/964},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/ZhaHSS14,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Siwei Sun and
                  Yao Sun},
  title        = {New constructions of {APN} polynomial functions in odd characteristic},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {25},
  number       = {4},
  pages        = {249--263},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00200-014-0227-2},
  doi          = {10.1007/S00200-014-0227-2},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/ZhaHSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaHS14,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Siwei Sun},
  title        = {Constructing new differentially 4-uniform permutations from the inverse
                  function},
  journal      = {Finite Fields Their Appl.},
  volume       = {25},
  pages        = {64--78},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ffa.2013.08.003},
  doi          = {10.1016/J.FFA.2013.08.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/XuHSX14,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun and
                  Yonghong Xie},
  title        = {Cryptanalysis of countermeasures against multiple transmission attacks
                  on {NTRU}},
  journal      = {{IET} Commun.},
  volume       = {8},
  number       = {12},
  pages        = {2142--2146},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-com.2013.1092},
  doi          = {10.1049/IET-COM.2013.1092},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/XuHSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/XuHS14,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun},
  title        = {Cryptanalysis of two cryptosystems based on multiple intractability
                  assumptions},
  journal      = {{IET} Commun.},
  volume       = {8},
  number       = {14},
  pages        = {2433--2437},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-com.2013.1101},
  doi          = {10.1049/IET-COM.2013.1101},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/XuHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SunHWQMS14,
  author       = {Siwei Sun and
                  Lei Hu and
                  Peng Wang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Ling Song},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Automatic Security Evaluation and (Related-key) Differential Characteristic
                  Search: Application to SIMON, PRESENT, LBlock, {DES(L)} and Other
                  Bit-Oriented Block Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {158--178},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_9},
  doi          = {10.1007/978-3-662-45611-8\_9},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SunHWQMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SongHSZSH14,
  author       = {Ling Song and
                  Lei Hu and
                  Siwei Sun and
                  Zhang Zhang and
                  Danping Shi and
                  Ronglin Hao},
  editor       = {Lucas Chi Kwong Hui and
                  S. H. Qing and
                  Elaine Shi and
                  Siu{-}Ming Yiu},
  title        = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}},
  booktitle    = {Information and Communications Security - 16th International Conference,
                  {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8958},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21966-0\_1},
  doi          = {10.1007/978-3-319-21966-0\_1},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SongHSZSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MaHSQS14,
  author       = {Xiaoshuang Ma and
                  Lei Hu and
                  Siwei Sun and
                  Kexin Qiao and
                  Jinyong Shan},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {Tighter Security Bound of {MIBS} Block Cipher against Differential
                  Attack},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {518--525},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_41},
  doi          = {10.1007/978-3-319-11698-3\_41},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MaHSQS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongHSZSH14a,
  author       = {Ling Song and
                  Lei Hu and
                  Siwei Sun and
                  Zhang Zhang and
                  Danping Shi and
                  Ronglin Hao},
  title        = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {683},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/683},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongHSZSH14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHWWQMSS14,
  author       = {Siwei Sun and
                  Lei Hu and
                  Meiqin Wang and
                  Peng Wang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Danping Shi and
                  Ling Song},
  title        = {Automatic Enumeration of (Related-key) Differential and Linear Characteristics
                  with Predefined Properties and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/747},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHWWQMSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiHSSQM14,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song and
                  Kexin Qiao and
                  Xiaoshuang Ma},
  title        = {Improved Linear (hull) Cryptanalysis of Round-reduced Versions of
                  {SIMON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {973},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/973},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiHSSQM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangHSQSSM14,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Kexin Qiao and
                  Ling Song and
                  Jinyong Shan and
                  Xiaoshuang Ma},
  title        = {Improved Differential Analysis of Block Cipher {PRIDE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {978},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/978},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangHSQSSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShanHSSM14,
  author       = {Jinyong Shan and
                  Lei Hu and
                  Ling Song and
                  Siwei Sun and
                  Xiaoshuang Ma},
  title        = {Related-Key Differential Attack on Round Reduced {RECTANGLE-80}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/986},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShanHSSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/SunHSXW13,
  author       = {Siwei Sun and
                  Lei Hu and
                  Ling Song and
                  Yonghong Xie and
                  Peng Wang},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Automatic Security Evaluation of Block Ciphers with S-bP Structures
                  Against Related-Key Differential Attacks},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_3},
  doi          = {10.1007/978-3-319-12087-4\_3},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/SunHSXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHSXW13,
  author       = {Siwei Sun and
                  Lei Hu and
                  Ling Song and
                  Yonghong Xie and
                  Peng Wang},
  title        = {Automatic Security Evaluation of Block Ciphers with S-bP Structures
                  against Related-key Differential Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/547},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHSXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHW13,
  author       = {Siwei Sun and
                  Lei Hu and
                  Peng Wang},
  title        = {Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key
                  Model: Application to PRESENT-80, LBlock and Others},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/676},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/XuHSW12,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun and
                  Ping Wang},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {32--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_4},
  doi          = {10.1007/978-3-642-35404-5\_4},
  timestamp    = {Sun, 02 Jun 2019 21:12:31 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/XuHSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XuHS12,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial
                  Key Cryptosystem},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {45--57},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_5},
  doi          = {10.1007/978-3-642-34129-8\_5},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/XuHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SunHXZ11,
  author       = {Siwei Sun and
                  Lei Hu and
                  Yonghong Xie and
                  Xiangyong Zeng},
  editor       = {Dongdai Lin and
                  Gene Tsudik and
                  Xiaoyun Wang},
  title        = {Cube Cryptanalysis of Hitag2 Stream Cipher},
  booktitle    = {Cryptology and Network Security - 10th International Conference, {CANS}
                  2011, Sanya, China, December 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7092},
  pages        = {15--25},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25513-7\_3},
  doi          = {10.1007/978-3-642-25513-7\_3},
  timestamp    = {Mon, 25 Nov 2019 15:32:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/SunHXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JiangHDS10,
  author       = {Xin Jiang and
                  Lei Hu and
                  Jintai Ding and
                  Siwei Sun},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {On the Kipnis-Shamir Method Solving the MinRank Problem},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {1--13},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 15:14:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JiangHDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}