


Остановите войну!
for scientists:


default search action
Xiaoyang Dong
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j25]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Trans. Symmetric Cryptol. 2022(2): 63-91 (2022) - [c18]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. ASIACRYPT (1) 2022: 287-317 - [c17]Xiaoyang Dong
, Jian Guo
, Shun Li
, Phuong Pham
:
Triangulating Rebound Attack on AES-like Hashing. CRYPTO (1) 2022: 94-124 - [c16]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. EUROCRYPT (3) 2022: 3-33 - [i40]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Cryptol. ePrint Arch. 2022: 568 (2022) - [i39]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham:
Triangulating Rebound Attack on AES-like Hashing. IACR Cryptol. ePrint Arch. 2022: 731 (2022) - [i38]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. IACR Cryptol. ePrint Arch. 2022: 789 (2022) - [i37]Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing. IACR Cryptol. ePrint Arch. 2022: 1714 (2022) - 2021
- [j24]Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. Sci. China Inf. Sci. 64(3) (2021) - [j23]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. Comput. J. 64(4): 628-638 (2021) - [j22]Yan Jian, Xiaoyang Dong, Liang Jian:
Detection and Recognition of Abnormal Data Caused by Network Intrusion Using Deep Learning. Informatica (Slovenia) 45(3) (2021) - [j21]Rui Zong, Xiaoyang Dong, Huaifeng Chen, Yiyuan Luo, Si Wang, Zheng Li:
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128. IACR Trans. Symmetric Cryptol. 2021(1): 156-184 (2021) - [j20]Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You:
(Quantum) Collision Attacks on Reduced Simpira v2. IACR Trans. Symmetric Cryptol. 2021(2): 222-248 (2021) - [j19]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021) - [c15]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. ASIACRYPT (1) 2021: 241-271 - [c14]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. CRYPTO (3) 2021: 278-308 - [c13]Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong:
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. DATE 2021: 176-181 - [c12]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804 - [c11]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. ICISC 2021: 195-216 - [i36]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. IACR Cryptol. ePrint Arch. 2021: 427 (2021) - [i35]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. IACR Cryptol. ePrint Arch. 2021: 656 (2021) - [i34]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems. IACR Cryptol. ePrint Arch. 2021: 732 (2021) - [i33]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. IACR Cryptol. ePrint Arch. 2021: 856 (2021) - [i32]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. IACR Cryptol. ePrint Arch. 2021: 1119 (2021) - 2020
- [j18]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak. Comput. J. 63(8): 1231-1246 (2020) - [j17]Boxin Zhao, Xiaoyang Dong
, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020) - [j16]Xiaoyang Dong
, Bingyou Dong, Xiaoyun Wang:
Quantum attacks on some feistel block ciphers. Des. Codes Cryptogr. 88(6): 1179-1203 (2020) - [c10]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. ASIACRYPT (2) 2020: 727-757 - [i31]Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Cryptol. ePrint Arch. 2020: 102 (2020) - [i30]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128. IACR Cryptol. ePrint Arch. 2020: 103 (2020) - [i29]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020) - [i28]Anubhab Baksi, Jakub Breier, Xiaoyang Dong, Chen Yi:
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. IACR Cryptol. ePrint Arch. 2020: 571 (2020) - [i27]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. IACR Cryptol. ePrint Arch. 2020: 781 (2020) - [i26]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. IACR Cryptol. ePrint Arch. 2020: 1030 (2020)
2010 – 2019
- 2019
- [j15]Rui Zong
, Xiaoyang Dong:
MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC. IEEE Access 7: 153683-153693 (2019) - [j14]Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2): 22501:1-22501:12 (2019) - [j13]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci. China Inf. Sci. 62(3): 32102:1-32102:12 (2019) - [j12]Wenquan Bi, Xiaoyang Dong
, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptogr. 87(6): 1271-1296 (2019) - [j11]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019) - [j10]Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Trans. Symmetric Cryptol. 2019(3): 121-151 (2019) - [c9]Baoyu Zhu
, Xiaoyang Dong
, Hongbo Yu
:
MILP-Based Differential Attack on Round-Reduced GIFT. CT-RSA 2019: 372-390 - [c8]Huaifeng Chen, Rui Zong, Xiaoyang Dong:
Improved Differential Attacks on GIFT-64. ICICS 2019: 447-462 - [c7]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128. INDOCRYPT 2019: 139-159 - [c6]Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata:
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256. INDOCRYPT 2019: 433-455 - [i25]Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. IACR Cryptol. ePrint Arch. 2019: 170 (2019) - [i24]Boyu Ni, Xiaoyang Dong:
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256. IACR Cryptol. ePrint Arch. 2019: 318 (2019) - [i23]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2019: 392 (2019) - [i22]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. IACR Cryptol. ePrint Arch. 2019: 447 (2019) - [i21]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule. IACR Cryptol. ePrint Arch. 2019: 714 (2019) - [i20]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. IACR Cryptol. ePrint Arch. 2019: 1115 (2019) - 2018
- [j9]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible differential attack on Simpira v2. Sci. China Inf. Sci. 61(3): 032106:1-032106:13 (2018) - [j8]Xiaoyang Dong, Xiaoyun Wang:
Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10): 102501:1-102501:7 (2018) - [j7]Wenquan Bi, Zheng Li, Xiaoyang Dong
, Lu Li, Xiaoyun Wang:
Conditional cube attack on round-reduced River Keyak. Des. Codes Cryptogr. 86(6): 1295-1310 (2018) - [j6]Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li, Xiaoyang Dong, Yaoling Ding, Yonglin Hao:
Improved integral attacks without full codebook. IET Inf. Secur. 12(6): 513-520 (2018) - [j5]Zhihui Chu
, Huaifeng Chen
, Xiaoyun Wang
, Xiaoyang Dong
, Lu Li
:
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. Secur. Commun. Networks 2018: 5160237:1-5160237:11 (2018) - [c5]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184 - [c4]Xiaoyang Dong, Zhiyi Fang, Hongliang Dong, Zhanyang Zhang, Dazhi Feng:
Tree-Based Sentiment Dictionary for Affective Computing: A New Approach. HPCC/SmartCity/DSS 2018: 1704-1709 - [i19]Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2018: 75 (2018) - [i18]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC. IACR Cryptol. ePrint Arch. 2018: 142 (2018) - [i17]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-recovery Attack on 855-round Trivium. IACR Cryptol. ePrint Arch. 2018: 198 (2018) - [i16]Baoyu Zhu, Xiaoyang Dong, Hongbo Yu:
MILP-based Differential Attack on Round-reduced GIFT. IACR Cryptol. ePrint Arch. 2018: 390 (2018) - [i15]Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang:
Quantum Attacks on Some Feistel Block Ciphers. IACR Cryptol. ePrint Arch. 2018: 504 (2018) - [i14]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256. IACR Cryptol. ePrint Arch. 2018: 680 (2018) - [i13]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao:
A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018. IACR Cryptol. ePrint Arch. 2018: 999 (2018) - 2017
- [j4]Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1): 175-202 (2017) - [j3]Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1): 259-280 (2017) - [c3]Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127 - [i12]Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Cryptol. ePrint Arch. 2017: 159 (2017) - [i11]Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. IACR Cryptol. ePrint Arch. 2017: 160 (2017) - [i10]Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. IACR Cryptol. ePrint Arch. 2017: 804 (2017) - [i9]Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced River Keyak. IACR Cryptol. ePrint Arch. 2017: 1012 (2017) - [i8]Xiaoyang Dong, Xiaoyun Wang:
Quantum Key-recovery Attack on Feistel Structures. IACR Cryptol. ePrint Arch. 2017: 1199 (2017) - [i7]Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum Cryptanalysis on Some Generalized Feistel Schemes. IACR Cryptol. ePrint Arch. 2017: 1249 (2017) - 2016
- [j2]Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Trans. Symmetric Cryptol. 2016(1): 13-32 (2016) - [i6]Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Cryptol. ePrint Arch. 2016: 509 (2016) - [i5]Xiaoyang Dong, Yanzhao Shen:
Cryptanalysis of Reduced-Round Midori64 Block Cipher. IACR Cryptol. ePrint Arch. 2016: 676 (2016) - [i4]Rui Zong, Xiaoyang Dong:
Meet-in-the-Middle Attack on QARMA Block Cipher. IACR Cryptol. ePrint Arch. 2016: 1160 (2016) - [i3]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible Differential Attack on Simpira v2. IACR Cryptol. ePrint Arch. 2016: 1161 (2016) - 2015
- [c2]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. CT-RSA 2015: 59-83 - [c1]Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong:
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. FSE 2015: 48-70 - [i2]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. IACR Cryptol. ePrint Arch. 2015: 896 (2015) - 2014
- [j1]Xiaoyang Dong, Hristo V. Kojouharov
, James P. Grover
:
Mathematical models of nutrient recycling and toxin production in a gradostat. Comput. Math. Appl. 68(9): 972-985 (2014) - [i1]Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong:
Differential Analysis on Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 525 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-02-06 00:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint