Bing Sun
Bing Sun
National University of Defense Technology
Verified email at
Cited by
Cited by
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
New results about the boomerang uniformity of permutation polynomials
K Li, L Qu, B Sun, C Li
IEEE Transactions on Information Theory 65 (11), 7542-7553, 2019
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
B Sun, M Liu, J Guo, V Rijmen, R Li
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conferenceá…, 2016
Programming the Demirci-Selšuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology andá…, 2018
New insights on AES-like SPN ciphers
B Sun, M Liu, J Guo, L Qu, V Rijmen
Annual International Cryptology Conference, 605-624, 2016
Balanced rotation symmetric Boolean functions with maximum algebraic immunity
S Fu, L Qu, C Li, B Sun
IET information security 5 (2), 93-99, 2011
Impossible differential cryptanalysis of SPN ciphers
R Li, B Sun, C Li
IET Information Security 5 (2), 111-120, 2011
Saturation attack on the block cipher HIGHT
P Zhang, B Sun, C Li
Cryptology and Network Security: 8th International Conference, CANS 2009á…, 2009
Differential fault analysis on SMS4 using a single fault
R Li, B Sun, C Li, J You
Information Processing Letters 111 (4), 156-163, 2011
New impossible differential cryptanalysis of ARIA
R Li, B Sun, P Zhang, C Li
Cryptology ePrint Archive, 2008
Integral cryptanalysis of ARIA
P Li, B Sun, C Li
Information Security and Cryptology: 5th International Conference, Inscryptá…, 2010
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions
Y Wei, P Li, B Sun, C Li
International Conference on Applied Cryptography and Network Security, 105-122, 2010
Rotational-XOR cryptanalysis of Simon-like block ciphers
J Lu, Y Liu, T Ashur, B Sun, C Li
Australasian Conference on Information Security and Privacy, 105-124, 2020
New observation on division property
B Sun, X Hai, W Zhang, L Cheng, Z Yang
Cryptology ePrint Archive, 2015
A meet-in-the-middle attack on reduced-round ARIA
X Tang, B Sun, R Li, C Li, J Yin
Journal of Systems and Software 84 (10), 1685-1692, 2011
Truncated differential cryptanalysis of PRINCE
G Zhao, B Sun, C Li, J Su
Security and Communication Networks 8 (16), 2875-2887, 2015
SQUARE attack on block ciphers with low algebraic degree
B Sun, RL Li, LJ Qu, C Li
Science China Information Sciences 53, 1988-1995, 2010
Fault analysis study of the block cipher FOX64
R Li, J You, B Sun, C Li
Multimedia Tools and Applications 63 (3), 691-708, 2013
Impossible differential cryptanalysis of 13-round CLEFIA-128
X Tang, B Sun, R Li, C Li
Journal of Systems and Software 84 (7), 1191-1196, 2011
Differential fault analysis on LED using Super‐Sbox
G Zhao, R Li, L Cheng, C Li, B Sun
IET Information Security 9 (4), 209-218, 2015
The system can't perform the operation now. Try again later.
Articles 1–20