Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials X Dong, Z Zhang, S Sun, C Wei, X Wang, L Hu Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 12 | 2021 |
Improved MITM cryptanalysis on Streebog J Hua, X Dong, S Sun, Z Zhang, L Hu, X Wang Cryptology ePrint Archive, 2022 | 8 | 2022 |
The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation K Qiao, Z Zhang, Z Niu, L Zhu, J Ma Chinese Journal of Electronics 33 (1), 19-29, 2024 | 3 | 2024 |
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT H Guo, Z Zhang, Q Yang, L Hu, Y Luo The Computer Journal 66 (5), 1069-1082, 2023 | 2 | 2023 |
Classical and quantum meet-in-the-middle nostradamus attacks on aes-like hashing Z Zhang, S Sun, C Wang, L Hu IACR Transactions on Symmetric Cryptology 2023 (2), 224-252, 2023 | 1 | 2023 |
若干广义非平衡 Feistel 结构的量子分析研究 于博, 孙兵, 刘国强, 罗宜元, 张志宇 密码学报 8 (6), 960-973, 2021 | 1 | 2021 |
Automatic key recovery of feistel ciphers: application to SIMON and SIMECK Y Zhang, L Lyu, K Qiao, Z Zhang, S Sun, L Hu Information Security Practice and Experience: 16th International Conference …, 2021 | 1 | 2021 |
Quantum Security of TNT S Mao, Z Zhang, L Hu, L Li, P Wang Cryptology ePrint Archive, 2023 | | 2023 |