default search action
Xiaoyang Dong 0001
Person information
- affiliation: Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China
Other persons with the same name
- Xiaoyang Dong 0002 — University of Texas at Arlington, Arlington, TX, USA
- Xiaoyang Dong 0003 — Henan Logistics Vocational College, Zhengzhou, Henan, China
- Xiaoyang Dong 0004 — Jilin University, Changchun City, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Qingyuan Yu, Lingyue Qin, Xiaoyang Dong, Keting Jia:
Improved Related-Key Rectangle Attacks On GIFT. Comput. J. 67(4): 1443-1456 (2024) - [j28]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang:
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR Trans. Symmetric Cryptol. 2024(1): 158-187 (2024) - [c22]Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:
Generic MitM Attack Frameworks on Sponge Constructions. CRYPTO (4) 2024: 3-37 - [i48]Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. CoRR abs/2409.11646 (2024) - [i47]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang:
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2024: 352 (2024) - [i46]Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:
Generic MitM Attack Frameworks on Sponge Constructions. IACR Cryptol. ePrint Arch. 2024: 604 (2024) - [i45]Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. IACR Cryptol. ePrint Arch. 2024: 1403 (2024) - 2023
- [j27]Jialiang Hua, Tai Liu, Yulong Cui, Lingyue Qin, Xiaoyang Dong, Huiyong Cui:
Low-Data Cryptanalysis On SKINNY Block Cipher. Comput. J. 66(4): 970-986 (2023) - [j26]Congming Wei, Xiaoyang Dong, Willi Meier, Lingyue Qin, Ximing Fu:
Differential-Aided Preimage Attacks On Round-Reduced Keccak. Comput. J. 66(12): 3069-3091 (2023) - [j25]Congming Wei, Bingyou Dong, Jialiang Hua, Xiaoyang Dong, Guoyan Zhang:
Improved attacks against reduced-round Whirlwind. Des. Codes Cryptogr. 91(11): 3581-3602 (2023) - [j24]Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang:
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023) - [c21]Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang:
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. ASIACRYPT (3) 2023: 3-33 - [c20]Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. ASIACRYPT (3) 2023: 370-404 - [c19]Bo Yu, Tairong Shi, Xiaoyang Dong, Xuan Shen, Yiyuan Luo, Bing Sun:
Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm. Inscrypt (2) 2023: 329-342 - [c18]Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing. EUROCRYPT (4) 2023: 158-188 - [i44]Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang:
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited. IACR Cryptol. ePrint Arch. 2023: 518 (2023) - [i43]Xiaoyang Dong, Shun Li, Phuong Pham:
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More. IACR Cryptol. ePrint Arch. 2023: 1095 (2023) - [i42]Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang:
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. IACR Cryptol. ePrint Arch. 2023: 1286 (2023) - [i41]Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. IACR Cryptol. ePrint Arch. 2023: 1359 (2023) - 2022
- [j23]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Trans. Symmetric Cryptol. 2022(2): 63-91 (2022) - [c17]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. ASIACRYPT (1) 2022: 287-317 - [c16]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham:
Triangulating Rebound Attack on AES-like Hashing. CRYPTO (1) 2022: 94-124 - [c15]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. EUROCRYPT (3) 2022: 3-33 - [i40]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Cryptol. ePrint Arch. 2022: 568 (2022) - [i39]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham:
Triangulating Rebound Attack on AES-like Hashing. IACR Cryptol. ePrint Arch. 2022: 731 (2022) - [i38]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. IACR Cryptol. ePrint Arch. 2022: 789 (2022) - [i37]Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing. IACR Cryptol. ePrint Arch. 2022: 1714 (2022) - 2021
- [j22]Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. Sci. China Inf. Sci. 64(3) (2021) - [j21]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. Comput. J. 64(4): 628-638 (2021) - [j20]Rui Zong, Xiaoyang Dong, Huaifeng Chen, Yiyuan Luo, Si Wang, Zheng Li:
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128. IACR Trans. Symmetric Cryptol. 2021(1): 156-184 (2021) - [j19]Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You:
(Quantum) Collision Attacks on Reduced Simpira v2. IACR Trans. Symmetric Cryptol. 2021(2): 222-248 (2021) - [j18]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021) - [c14]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. ASIACRYPT (1) 2021: 241-271 - [c13]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. CRYPTO (3) 2021: 278-308 - [c12]Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong:
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. DATE 2021: 176-181 - [c11]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804 - [c10]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. ICISC 2021: 195-216 - [i36]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. IACR Cryptol. ePrint Arch. 2021: 427 (2021) - [i35]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. IACR Cryptol. ePrint Arch. 2021: 656 (2021) - [i34]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems. IACR Cryptol. ePrint Arch. 2021: 732 (2021) - [i33]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. IACR Cryptol. ePrint Arch. 2021: 856 (2021) - [i32]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. IACR Cryptol. ePrint Arch. 2021: 1119 (2021) - 2020
- [j17]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak. Comput. J. 63(8): 1231-1246 (2020) - [j16]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020) - [j15]Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang:
Quantum attacks on some feistel block ciphers. Des. Codes Cryptogr. 88(6): 1179-1203 (2020) - [c9]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. ASIACRYPT (2) 2020: 727-757 - [i31]Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Cryptol. ePrint Arch. 2020: 102 (2020) - [i30]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128. IACR Cryptol. ePrint Arch. 2020: 103 (2020) - [i29]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020) - [i28]Anubhab Baksi, Jakub Breier, Xiaoyang Dong, Chen Yi:
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. IACR Cryptol. ePrint Arch. 2020: 571 (2020) - [i27]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. IACR Cryptol. ePrint Arch. 2020: 781 (2020) - [i26]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. IACR Cryptol. ePrint Arch. 2020: 1030 (2020)
2010 – 2019
- 2019
- [j14]Rui Zong, Xiaoyang Dong:
MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC. IEEE Access 7: 153683-153693 (2019) - [j13]Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2): 22501:1-22501:12 (2019) - [j12]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci. China Inf. Sci. 62(3): 32102:1-32102:12 (2019) - [j11]Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptogr. 87(6): 1271-1296 (2019) - [j10]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019) - [j9]Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Trans. Symmetric Cryptol. 2019(3): 121-151 (2019) - [c8]Baoyu Zhu, Xiaoyang Dong, Hongbo Yu:
MILP-Based Differential Attack on Round-Reduced GIFT. CT-RSA 2019: 372-390 - [c7]Huaifeng Chen, Rui Zong, Xiaoyang Dong:
Improved Differential Attacks on GIFT-64. ICICS 2019: 447-462 - [c6]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128. INDOCRYPT 2019: 139-159 - [c5]Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata:
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256. INDOCRYPT 2019: 433-455 - [i25]Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. IACR Cryptol. ePrint Arch. 2019: 170 (2019) - [i24]Boyu Ni, Xiaoyang Dong:
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256. IACR Cryptol. ePrint Arch. 2019: 318 (2019) - [i23]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2019: 392 (2019) - [i22]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. IACR Cryptol. ePrint Arch. 2019: 447 (2019) - [i21]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule. IACR Cryptol. ePrint Arch. 2019: 714 (2019) - [i20]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. IACR Cryptol. ePrint Arch. 2019: 1115 (2019) - 2018
- [j8]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible differential attack on Simpira v2. Sci. China Inf. Sci. 61(3): 032106:1-032106:13 (2018) - [j7]Xiaoyang Dong, Xiaoyun Wang:
Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10): 102501:1-102501:7 (2018) - [j6]Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang:
Conditional cube attack on round-reduced River Keyak. Des. Codes Cryptogr. 86(6): 1295-1310 (2018) - [j5]Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li, Xiaoyang Dong, Yaoling Ding, Yonglin Hao:
Improved integral attacks without full codebook. IET Inf. Secur. 12(6): 513-520 (2018) - [j4]Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Xiaoyang Dong, Lu Li:
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. Secur. Commun. Networks 2018: 5160237:1-5160237:11 (2018) - [c4]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184 - [i19]Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2018: 75 (2018) - [i18]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC. IACR Cryptol. ePrint Arch. 2018: 142 (2018) - [i17]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-recovery Attack on 855-round Trivium. IACR Cryptol. ePrint Arch. 2018: 198 (2018) - [i16]Baoyu Zhu, Xiaoyang Dong, Hongbo Yu:
MILP-based Differential Attack on Round-reduced GIFT. IACR Cryptol. ePrint Arch. 2018: 390 (2018) - [i15]Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang:
Quantum Attacks on Some Feistel Block Ciphers. IACR Cryptol. ePrint Arch. 2018: 504 (2018) - [i14]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256. IACR Cryptol. ePrint Arch. 2018: 680 (2018) - [i13]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao:
A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018. IACR Cryptol. ePrint Arch. 2018: 999 (2018) - 2017
- [j3]Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1): 175-202 (2017) - [j2]Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1): 259-280 (2017) - [c3]Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127 - [i12]Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Cryptol. ePrint Arch. 2017: 159 (2017) - [i11]Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. IACR Cryptol. ePrint Arch. 2017: 160 (2017) - [i10]Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. IACR Cryptol. ePrint Arch. 2017: 804 (2017) - [i9]Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced River Keyak. IACR Cryptol. ePrint Arch. 2017: 1012 (2017) - [i8]Xiaoyang Dong, Xiaoyun Wang:
Quantum Key-recovery Attack on Feistel Structures. IACR Cryptol. ePrint Arch. 2017: 1199 (2017) - [i7]Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum Cryptanalysis on Some Generalized Feistel Schemes. IACR Cryptol. ePrint Arch. 2017: 1249 (2017) - 2016
- [j1]Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Trans. Symmetric Cryptol. 2016(1): 13-32 (2016) - [i6]Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Cryptol. ePrint Arch. 2016: 509 (2016) - [i5]Xiaoyang Dong, Yanzhao Shen:
Cryptanalysis of Reduced-Round Midori64 Block Cipher. IACR Cryptol. ePrint Arch. 2016: 676 (2016) - [i4]Rui Zong, Xiaoyang Dong:
Meet-in-the-Middle Attack on QARMA Block Cipher. IACR Cryptol. ePrint Arch. 2016: 1160 (2016) - [i3]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible Differential Attack on Simpira v2. IACR Cryptol. ePrint Arch. 2016: 1161 (2016) - 2015
- [c2]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. CT-RSA 2015: 59-83 - [c1]Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong:
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. FSE 2015: 48-70 - [i2]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. IACR Cryptol. ePrint Arch. 2015: 896 (2015) - 2014
- [i1]Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong:
Differential Analysis on Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 525 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint