Folgen
Xiaoyang Dong
Xiaoyang Dong
Bestätigte E-Mail-Adresse bei tsinghua.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Machine learning assisted differential distinguishers for lightweight ciphers (extended version)
A Baksi, J Breier, Y Chen, X Dong
Cryptology ePrint Archive, 2020
80*2020
Quantum key-recovery attack on Feistel structures
X Dong, X Wang
Science China Information Sciences 61 (10), 102501, 2018
772018
Quantum attacks on some Feistel block ciphers
X Dong, B Dong, X Wang
Designs, Codes and Cryptography 88 (6), 1179-1203, 2020
752020
MILP-based differential attack on round-reduced GIFT
B Zhu, X Dong, H Yu
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
752019
Quantum cryptanalysis on some generalized Feistel schemes
X Dong, Z Li, X Wang
Science China Information Sciences 62 (2), 22501, 2019
702019
Conditional cube attack on round-reduced ASCON
Z Li, X Dong, X Wang
Cryptology ePrint Archive, 2017
702017
Quantum collision attacks on AES-like hashing with low quantum random access memories
X Dong, S Sun, D Shi, F Gao, X Wang, L Hu
International Conference on the Theory and Application of Cryptology and …, 2020
582020
Improved conditional cube attacks on Keccak keyed modes with MILP method
Z Li, W Bi, X Dong, X Wang
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
542017
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
B Zhao, X Dong, W Meier, K Jia, G Wang
Designs, Codes and Cryptography 88 (6), 1103-1126, 2020
472020
Meet-in-the-middle attacks revisited: Key-recovery, collision, and preimage attacks
X Dong, J Hua, S Sun, Z Li, X Wang, L Hu
Annual International Cryptology Conference, 278-308, 2021
412021
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
352021
A key-recovery attack on 855-round Trivium
X Fu, X Wang, X Dong, W Meier
Annual International Cryptology Conference, 160-184, 2018
352018
New related-tweakey boomerang and rectangle attacks on Deoxys-BC including BDT effect
B Zhao, X Dong, K Jia
IACR Transactions on Symmetric Cryptology, 121-151, 2019
332019
Collision attacks on round-reduced Gimli-hash/ascon-xof/ascon-hash
R Zong, X Dong, X Wang
Cryptology ePrint Archive, 2019
332019
Cube-like attack on round-reduced initialization of Ketje Sr
X Dong, Z Li, X Wang, L Qin
IACR Transactions on Symmetric Cryptology, 259-280, 2017
322017
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
X Dong, L Qin, S Sun, X Wang
Annual International Conference on the Theory and Applications of …, 2022
312022
Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny
L Qin, X Dong, X Wang, K Jia, Y Liu
IACR Transactions on Symmetric Cryptology, 249-291, 2021
312021
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
L Li, K Jia, X Wang, X Dong
International Workshop on Fast Software Encryption, 48-70, 2015
292015
Practical key-recovery attacks on round-reduced Ketje Jr, Xoodoo-AE and Xoodyak
H Zhou, Z Li, X Dong, K Jia, W Meier
The Computer Journal 63 (8), 1231-1246, 2020
232020
Differential analysis on block cipher PRIDE
J Zhao, X Wang, M Wang, X Dong
Cryptology ePrint Archive, 2014
222014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20