Follow
Xiaoyang Dong
Xiaoyang Dong
Verified email at tsinghua.edu.cn
Title
Cited by
Cited by
Year
Machine learning assisted differential distinguishers for lightweight ciphers (extended version)
A Baksi, J Breier, Y Chen, X Dong
Cryptology ePrint Archive, 2020
83*2020
Quantum key-recovery attack on Feistel structures
X Dong, X Wang
Science China Information Sciences 61 (10), 102501, 2018
792018
MILP-based differential attack on round-reduced GIFT
B Zhu, X Dong, H Yu
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
772019
Quantum attacks on some Feistel block ciphers
X Dong, B Dong, X Wang
Designs, Codes and Cryptography 88 (6), 1179-1203, 2020
762020
Conditional cube attack on round-reduced ASCON
Z Li, X Dong, X Wang
Cryptology ePrint Archive, 2017
722017
Quantum cryptanalysis on some generalized Feistel schemes
X Dong, Z Li, X Wang
Science China Information Sciences 62 (2), 22501, 2019
702019
Quantum collision attacks on AES-like hashing with low quantum random access memories
X Dong, S Sun, D Shi, F Gao, X Wang, L Hu
International Conference on the Theory and Application of Cryptology and …, 2020
612020
Improved conditional cube attacks on Keccak keyed modes with MILP method
Z Li, W Bi, X Dong, X Wang
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
542017
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
B Zhao, X Dong, W Meier, K Jia, G Wang
Designs, Codes and Cryptography 88 (6), 1103-1126, 2020
482020
Meet-in-the-middle attacks revisited: Key-recovery, collision, and preimage attacks
X Dong, J Hua, S Sun, Z Li, X Wang, L Hu
Annual International Cryptology Conference, 278-308, 2021
432021
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
372021
Collision attacks on round-reduced Gimli-hash/ascon-xof/ascon-hash
R Zong, X Dong, X Wang
Cryptology ePrint Archive, 2019
352019
A key-recovery attack on 855-round Trivium
X Fu, X Wang, X Dong, W Meier
Annual International Cryptology Conference, 160-184, 2018
352018
Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny
L Qin, X Dong, X Wang, K Jia, Y Liu
IACR Transactions on Symmetric Cryptology, 249-291, 2021
332021
New related-tweakey boomerang and rectangle attacks on Deoxys-BC including BDT effect
B Zhao, X Dong, K Jia
IACR Transactions on Symmetric Cryptology, 121-151, 2019
332019
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
X Dong, L Qin, S Sun, X Wang
Annual International Conference on the Theory and Applications of …, 2022
322022
Cube-like attack on round-reduced initialization of Ketje Sr
X Dong, Z Li, X Wang, L Qin
IACR Transactions on Symmetric Cryptology, 259-280, 2017
322017
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
L Li, K Jia, X Wang, X Dong
International Workshop on Fast Software Encryption, 48-70, 2015
302015
Practical key-recovery attacks on round-reduced Ketje Jr, Xoodoo-AE and Xoodyak
H Zhou, Z Li, X Dong, K Jia, W Meier
The Computer Journal 63 (8), 1231-1246, 2020
232020
Towards key-recovery-attack friendly distinguishers: application to GIFT-128
R Zong, X Dong, H Chen, Y Luo, S Wang, Z Li
IACR Transactions on Symmetric Cryptology, 156-184, 2021
222021
The system can't perform the operation now. Try again later.
Articles 1–20