Follow
Siwei Sun
Title
Cited by
Cited by
Year
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block ciphers
S Sun, L Hu, P Wang, K Qiao, X Ma, L Song
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
4472014
MILP-based automatic search algorithms for differential and linear trails for speck
K Fu, M Wang, Y Guo, S Sun, L Hu
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
1892016
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined …
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
Cryptology ePrint Archive, 2014
1482014
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
942017
Constructing new differentially 4-uniform permutations from the inverse function
Z Zha, L Hu, S Sun
Finite Fields and Their Applications 25, 64-78, 2014
812014
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks
S Sun, L Hu, L Song, Y Xie, P Wang
International Conference on Information Security and Cryptology, 39-51, 2013
802013
Quantum circuit implementations of AES with fewer qubits
J Zou, Z Wei, S Sun, X Liu, W Wu
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
672020
An algebraic formulation of the division property: Revisiting degree evaluations, cube attacks, and key-independent sums
K Hu, S Sun, M Wang, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2020
642020
{StrongChain}: Transparent and Collaborative {Proof-of-Work} Consensus
P Szalachowski, D Reijsbergen, I Homoliak, S Sun
28th USENIX Security Symposium (USENIX Security 19), 819-836, 2019
642019
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology and …, 2018
642018
Quantum collision attacks on AES-like hashing with low quantum random access memories
X Dong, S Sun, D Shi, F Gao, X Wang, L Hu
International Conference on the Theory and Application of Cryptology and …, 2020
612020
Constructing low-latency involutory MDS matrices with lightweight circuits
S Li, S Sun, C Li, Z Wei, L Hu
IACR Transactions on Symmetric Cryptology, 84-117, 2019
482019
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
X Dong, J Hua, S Sun, Z Li, X Wang, L Hu
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
432021
Rotational Cryptanalysis from a Differential-Linear Perspective: Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette
Y Liu, S Sun, C Li
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
422021
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
D Shi, L Hu, S Sun, L Song, K Qiao, X Ma
Cryptology ePrint Archive, 2014
402014
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits
Z Huang, S Sun
International Conference on the Theory and Application of Cryptology and …, 2022
392022
Differential analysis on simeck and simon with dynamic key-guessing techniques
K Qiao, L Hu, S Sun
International Conference on Information Systems Security and Privacy, 64-85, 2016
392016
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
372021
Cube cryptanalysis of Hitag2 stream cipher
S Sun, L Hu, Y Xie, X Zeng
Cryptology and Network Security: 10th International Conference, CANS 2011 …, 2011
332011
Massive superpoly recovery with nested monomial predictions
K Hu, S Sun, Y Todo, M Wang, Q Wang
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
302021
The system can't perform the operation now. Try again later.
Articles 1–20