Differential cryptanalysis of reduced-round PRESENT M Wang International Conference on Cryptology in Africa, 40-49, 2008 | 139 | 2008 |
MILP-based automatic search algorithms for differential and linear trails for speck K Fu, M Wang, Y Guo, S Sun, L Hu International Conference on Fast Software Encryption, 268-288, 2016 | 128 | 2016 |
Zero correlation linear cryptanalysis with reduced data complexity A Bogdanov, M Wang International Workshop on Fast Software Encryption, 29-48, 2012 | 127 | 2012 |
Integral and multidimensional linear distinguishers with correlation zero A Bogdanov, G Leander, K Nyberg, M Wang International Conference on the Theory and Application of Cryptology and …, 2012 | 114 | 2012 |
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined … S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu Cryptology ePrint Archive, 2014 | 110 | 2014 |
Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT J Nakahara, P Sepehrdad, B Zhang, M Wang International Conference on Cryptology and Network Security, 58-75, 2009 | 94 | 2009 |
New automatic search tool for impossible differentials and zero-correlation linear approximations T Cui, S Chen, K Jia, K Fu, M Wang Cryptology ePrint Archive, 2016 | 85 | 2016 |
Automatic search of bit-based division property for ARX ciphers and word-based division property L Sun, W Wang, M Wang International Conference on the Theory and Application of Cryptology and …, 2017 | 82 | 2017 |
Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA A Bogdanov, H Geng, M Wang, L Wen, B Collard International Conference on Selected Areas in Cryptography, 306-323, 2013 | 80 | 2013 |
Conditional cube attack on reduced-round Keccak sponge function S Huang, X Wang, G Xu, M Wang, J Zhao Annual International Conference on the Theory and Applications of …, 2017 | 73 | 2017 |
MILP‐aided bit‐based division property for primitives with non‐bit‐permutation linear layers L Sun, W Wang, MQ Wang IET Information Security 14 (1), 12-20, 2020 | 68 | 2020 |
Side channel cube attack on PRESENT L Yang, M Wang, S Qiao International Conference on Cryptology and Network Security, 379-391, 2009 | 66 | 2009 |
Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT J Chen, M Wang, B Preneel International Conference on Cryptology in Africa, 117-137, 2012 | 63 | 2012 |
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard L Wen, M Wang, A Bogdanov, H Chen Information Processing Letters 114 (6), 322-330, 2014 | 43 | 2014 |
Key difference invariant bias in block ciphers A Bogdanov, C Boura, V Rijmen, M Wang, L Wen, J Zhao International Conference on the Theory and Application of Cryptology and …, 2013 | 39 | 2013 |
MILP-aided bit-based division property for ARX-based block cipher L Sun, W Wang, R Liu, M Wang Cryptology ePrint Archive, 2016 | 33 | 2016 |
A model for structure attacks, with applications to PRESENT and Serpent M Wang, Y Sun, E Tischhauser, B Preneel International Workshop on Fast Software Encryption, 49-68, 2012 | 32 | 2012 |
More accurate differential properties of LED64 and Midori64 L Sun, W Wang, M Wang IACR Transactions on Symmetric Cryptology, 93-123, 2018 | 27 | 2018 |
An algebraic formulation of the division property: Revisiting degree evaluations, cube attacks, and key-independent sums K Hu, S Sun, M Wang, Q Wang International Conference on the Theory and Application of Cryptology and …, 2020 | 26 | 2020 |
Related-key impossible differential attack on reduced-round LBlock L Wen, MQ Wang, JY Zhao Journal of Computer Science and Technology 29 (1), 165-176, 2014 | 26 | 2014 |