BibTeX records: Bin Zhang 0003

download as .bib file

@article{DBLP:journals/dcc/ZhouFZ22,
  author       = {Zhaocun Zhou and
                  Dengguo Feng and
                  Bin Zhang},
  title        = {Efficient and extensive search for precise linear approximations with
                  high correlations of full {SNOW-V}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2449--2479},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01090-8},
  doi          = {10.1007/S10623-022-01090-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhouFZ22,
  author       = {Zhaocun Zhou and
                  Dengguo Feng and
                  Bin Zhang},
  title        = {Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications
                  to Stream Cipher Grain-128a},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {322--350},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.322-350},
  doi          = {10.46586/TOSC.V2022.I2.322-350},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhouFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GongZ21,
  author       = {Xinxin Gong and
                  Bin Zhang},
  title        = {Resistance of {SNOW-V} against Fast Correlation Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {378--410},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.378-410},
  doi          = {10.46586/TOSC.V2021.I1.378-410},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GongZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GongZ21a,
  author       = {Xinxin Gong and
                  Bin Zhang},
  title        = {Comparing Large-unit and Bitwise Linear Approximations of {SNOW} 2.0
                  and {SNOW} 3G and Related Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {71--103},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.71-103},
  doi          = {10.46586/TOSC.V2021.I2.71-103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GongZ21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CaforioBTM0L021,
  author       = {Andrea Caforio and
                  Subhadeep Banik and
                  Yosuke Todo and
                  Willi Meier and
                  Takanori Isobe and
                  Fukang Liu and
                  Bin Zhang},
  title        = {Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {4},
  pages        = {36--73},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i4.36-73},
  doi          = {10.46586/TOSC.V2021.I4.36-73},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CaforioBTM0L021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouFZ21,
  author       = {Zhaocun Zhou and
                  Dengguo Feng and
                  Bin Zhang},
  title        = {Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications
                  to Stream Cipher Grain-128a},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1435},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1435},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouFZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaforioBTMILZ21,
  author       = {Andrea Caforio and
                  Subhadeep Banik and
                  Yosuke Todo and
                  Willi Meier and
                  Takanori Isobe and
                  Fukang Liu and
                  Bin Zhang},
  title        = {Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1523},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1523},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CaforioBTMILZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouFZ21a,
  author       = {Zhaocun Zhou and
                  Dengguo Feng and
                  Bin Zhang},
  title        = {Efficient and Extensive Search Linear Approximations with High for
                  Precise Correlations of Full {SNOW-V}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1607},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1607},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouFZ21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GongZ20,
  author       = {Xinxin Gong and
                  Bin Zhang},
  title        = {Fast computation of linear approximation over certain composition
                  functions and applications to {SNOW} 2.0 and {SNOW} 3G},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2407--2431},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00790-3},
  doi          = {10.1007/S10623-020-00790-3},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GongZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HamannKMZ18,
  author       = {Matthias Hamann and
                  Matthias Krause and
                  Willi Meier and
                  Bin Zhang},
  title        = {Design and analysis of small-state grain-like stream ciphers},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {5},
  pages        = {803--834},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0261-6},
  doi          = {10.1007/S12095-017-0261-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/HamannKMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ZhangXF18,
  author       = {Bin Zhang and
                  Chao Xu and
                  Dengguo Feng},
  title        = {Practical Cryptanalysis of Bluetooth Encryption with Condition Masking},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {2},
  pages        = {394--433},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9260-1},
  doi          = {10.1007/S00145-017-9260-1},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ZhangXF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TodoIMAZ18,
  author       = {Yosuke Todo and
                  Takanori Isobe and
                  Willi Meier and
                  Kazumaro Aoki and
                  Bin Zhang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a,
                  Grain-128, and Grain-v1},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {129--159},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_5},
  doi          = {10.1007/978-3-319-96881-0\_5},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/TodoIMAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ZhangXM18,
  author       = {Bin Zhang and
                  Chao Xu and
                  Willi Meier},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Fast Near Collision Attack on the Grain v1 Stream Cipher},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {771--802},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_25},
  doi          = {10.1007/978-3-319-78375-8\_25},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ZhangXM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXM18,
  author       = {Bin Zhang and
                  Chao Xu and
                  Willi Meier},
  title        = {Fast Near Collision Attack on the Grain v1 Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/145},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangXM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TodoIMAZ18,
  author       = {Yosuke Todo and
                  Takanori Isobe and
                  Willi Meier and
                  Kazumaro Aoki and
                  Bin Zhang},
  title        = {Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a,
                  Grain-128, and Grain-v1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/522},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TodoIMAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangGM17,
  author       = {Bin Zhang and
                  Xinxin Gong and
                  Willi Meier},
  title        = {Fast Correlation Attacks on Grain-like Small State Stream Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {58--81},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.58-81},
  doi          = {10.13154/TOSC.V2017.I4.58-81},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhangGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamann0MZ17,
  author       = {Matthias Hamann and
                  Matthias Krause and
                  Willi Meier and
                  Bin Zhang},
  title        = {Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamann0MZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangG17,
  author       = {Bin Zhang and
                  Xinxin Gong},
  title        = {New Algorithms for Solving {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {780},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/780},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/YaoZW16,
  author       = {Yuan Yao and
                  Bin Zhang and
                  Wenling Wu},
  title        = {Utilizing Probabilistic Linear Equations in Cube Attacks},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {31},
  number       = {2},
  pages        = {317--325},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11390-016-1629-3},
  doi          = {10.1007/S11390-016-1629-3},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/YaoZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXM16,
  author       = {Bin Zhang and
                  Chao Xu and
                  Willi Meier},
  title        = {Fast Correlation Attacks over Extension Fields, Large-unit Linear
                  Approximation and Cryptanalysis of {SNOW} 2.0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangXM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Shi0F15,
  author       = {Zhenqing Shi and
                  Bin Zhang and
                  Dengguo Feng},
  title        = {Practical-time related-key attack on Hummingbird-2},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {321--327},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0424},
  doi          = {10.1049/IET-IFS.2014.0424},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Shi0F15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhangG15,
  author       = {Bin Zhang and
                  Xinxin Gong},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Another Tradeoff Attack on Sprout-Like Stream Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {561--585},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_23},
  doi          = {10.1007/978-3-662-48800-3\_23},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhangG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YaoZW15,
  author       = {Yuan Yao and
                  Bin Zhang and
                  Wenling Wu},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {A Single Query Forgery Attack on Raviyoyla v1},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {671},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714645},
  doi          = {10.1145/2714576.2714645},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YaoZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ZhangXM15,
  author       = {Bin Zhang and
                  Chao Xu and
                  Willi Meier},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Fast Correlation Attacks over Extension Fields, Large-Unit Linear
                  Approximation and Cryptanalysis of {SNOW} 2.0},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {643--662},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_31},
  doi          = {10.1007/978-3-662-47989-6\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ZhangXM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Du0LL15,
  author       = {Shaoyu Du and
                  Bin Zhang and
                  Zhenqi Li and
                  Dongdai Lin},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Fault Attacks on Stream Cipher Scream},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {50--64},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_4},
  doi          = {10.1007/978-3-319-17533-1\_4},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Du0LL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/DuL0L15,
  author       = {Shaoyu Du and
                  Zhenqi Li and
                  Bin Zhang and
                  Dongdai Lin},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Combined Cache Timing Attacks and Template Attacks on Stream Cipher
                  {MUGI}},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {235--249},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_17},
  doi          = {10.1007/978-3-319-17533-1\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/DuL0L15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Yao0W15,
  author       = {Yuan Yao and
                  Bin Zhang and
                  Wenling Wu},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Automatic Search for Linear Trails of the {SPECK} Family},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {158--176},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_9},
  doi          = {10.1007/978-3-319-23318-5\_9},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Yao0W15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiZFV15,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Junfeng Fan and
                  Ingrid Verbauwhede},
  title        = {A New Model for Error-Tolerant Side-Channel Cube Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiZFV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GongZWF14,
  author       = {Xinxin Gong and
                  Bin Zhang and
                  Wenling Wu and
                  Dengguo Feng},
  title        = {Computing Walsh coefficients from the algebraic normal form of a Boolean
                  function},
  journal      = {Cryptogr. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {335--358},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12095-014-0103-8},
  doi          = {10.1007/S12095-014-0103-8},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/GongZWF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhongWZW14,
  author       = {Xiao Zhong and
                  Mingsheng Wang and
                  Bin Zhang and
                  Shengbao Wu},
  editor       = {Lucas Chi Kwong Hui and
                  S. H. Qing and
                  Elaine Shi and
                  Siu{-}Ming Yiu},
  title        = {A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear
                  Filter},
  booktitle    = {Information and Communications Security - 16th International Conference,
                  {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8958},
  pages        = {132--142},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21966-0\_10},
  doi          = {10.1007/978-3-319-21966-0\_10},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhongWZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/XuZF14,
  author       = {Chao Xu and
                  Bin Zhang and
                  Dengguo Feng},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {Linear Cryptanalysis of {FASER128/256} and TriviA-ck},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {237--254},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_14},
  doi          = {10.1007/978-3-319-13039-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/XuZF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LiZRF14,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Arnab Roy and
                  Junfeng Fan},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Error-Tolerant Side-Channel Cube Attack Revisited},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {261--277},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_16},
  doi          = {10.1007/978-3-319-13051-4\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LiZRF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Shi0F13,
  author       = {Zhenqing Shi and
                  Bin Zhang and
                  Dengguo Feng},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Cryptanalysis of Helix and Phelix Revisited},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {27--40},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_3},
  doi          = {10.1007/978-3-642-39059-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Shi0F13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiZFV13,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Junfeng Fan and
                  Ingrid Verbauwhede},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {A New Model for Error-Tolerant Side-Channel Cube Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {453--470},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_26},
  doi          = {10.1007/978-3-642-40349-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiZFV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/GongZFY13,
  author       = {Xinxin Gong and
                  Bin Zhang and
                  Dengguo Feng and
                  Tongjiang Yan},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Autocorrelation Values of New Generalized Cyclotomic Sequences of
                  Order Six Over Z{\_}pq},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {86--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_6},
  doi          = {10.1007/978-3-319-12087-4\_6},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/GongZFY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0003XF13,
  author       = {Bin Zhang and
                  Chao Xu and
                  Dengguo Feng},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking
                  - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {165--182},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_10},
  doi          = {10.1007/978-3-642-40041-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0003XF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangLFL13,
  author       = {Bin Zhang and
                  Zhenqi Li and
                  Dengguo Feng and
                  Dongdai Lin},
  editor       = {Shiho Moriai},
  title        = {Near Collision Attack on the Grain v1 Stream Cipher},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {518--538},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_27},
  doi          = {10.1007/978-3-662-43933-3\_27},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangLFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LvZL13,
  author       = {Jing Lv and
                  Bin Zhang and
                  Dongdai Lin},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Some New Weaknesses in the {RC4} Stream Cipher},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_2},
  doi          = {10.1007/978-3-319-05149-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LvZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LvZL13,
  author       = {Jing Lv and
                  Bin Zhang and
                  Dongdai Lin},
  title        = {Distinguishing Attacks on {RC4} and {A} New Improvement of the Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LvZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiLWZL12,
  author       = {Zhenqi Li and
                  Yao Lu and
                  Wenhao Wang and
                  Bin Zhang and
                  Dongdai Lin},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {A New Variant of Time Memory Trade-Off on the Improvement of Thing
                  and Ying's Attack},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {311--320},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_28},
  doi          = {10.1007/978-3-642-34129-8\_28},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiLWZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiZLZL12,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Yao Lu and
                  Jing Zou and
                  Dongdai Lin},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {321--330},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_29},
  doi          = {10.1007/978-3-642-34129-8\_29},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiZLZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiZYL12,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Yuan Yao and
                  Dongdai Lin},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Cube Cryptanalysis of LBlock with Noisy Leakage},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_11},
  doi          = {10.1007/978-3-642-37682-5\_11},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LiZYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Shi0FW12,
  author       = {Zhenqing Shi and
                  Bin Zhang and
                  Dengguo Feng and
                  Wenling Wu},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {337--351},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_24},
  doi          = {10.1007/978-3-642-37682-5\_24},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/Shi0FW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangF11,
  author       = {Bin Zhang and
                  Dengguo Feng},
  title        = {Improved multi-pass fast correlation attacks with applications},
  journal      = {Sci. China Inf. Sci.},
  volume       = {54},
  number       = {8},
  pages        = {1635--1644},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11432-011-4295-7},
  doi          = {10.1007/S11432-011-4295-7},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BiryukovKZ11,
  author       = {Alex Biryukov and
                  Ilya Kizhvatov and
                  Bin Zhang},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and
                  CryptoRF},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {91--109},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_6},
  doi          = {10.1007/978-3-642-21554-4\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BiryukovKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovKZ11,
  author       = {Alex Biryukov and
                  Ilya Kizhvatov and
                  Bin Zhang},
  title        = {Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and
                  CryptoRF},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BiryukovPZ10,
  author       = {Alex Biryukov and
                  Deike Priemuth{-}Schmid and
                  Bin Zhang},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Multiset Collision Attacks on Reduced-Round {SNOW} 3G and {SNOW} 3G\({}^{\mbox{
                  {(+)} }}\)},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {139--153},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_9},
  doi          = {10.1007/978-3-642-13708-2\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BiryukovPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/BiryukovPZ10,
  author       = {Alex Biryukov and
                  Deike Priemuth{-}Schmid and
                  Bin Zhang},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Differential Resynchronization Attacks on Reduced Round {SNOW} 3G
                  {\(\oplus\)}},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {147--157},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_9},
  doi          = {10.1007/978-3-642-25206-8\_9},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/BiryukovPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BiryukovPZ10,
  author       = {Alex Biryukov and
                  Deike Priemuth{-}Schmid and
                  Bin Zhang},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Analysis of {SNOW} 3G{\(\oplus\)} Resynchronization Mechanism},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {327--333},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Sat, 22 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BiryukovPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Zhang09,
  author       = {Bin Zhang},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {New Cryptanalysis of Irregularly Decimated Stream Ciphers},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {449--465},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_28},
  doi          = {10.1007/978-3-642-05445-7\_28},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Zhang09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ZhangF08,
  author       = {Bin Zhang and
                  Dengguo Feng},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {An Improved Fast Correlation Attack on Stream Ciphers},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {214--227},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_14},
  doi          = {10.1007/978-3-642-04159-4\_14},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ZhangF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangF06,
  author       = {Bin Zhang and
                  Dengguo Feng},
  title        = {Security analysis of a new stream cipher},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {49},
  number       = {3},
  pages        = {286--301},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11432-006-0286-5},
  doi          = {10.1007/S11432-006-0286-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhangF06,
  author       = {Bin Zhang and
                  Dengguo Feng},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {New Guess-and-Determine Attack on the Self-Shrinking Generator},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_4},
  doi          = {10.1007/11935230\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhangF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/ZhangF06,
  author       = {Bin Zhang and
                  Dengguo Feng},
  title        = {A New Variant of the Self-Shrinking Generator},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {1619--1622},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.261550},
  doi          = {10.1109/ISIT.2006.261550},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/ZhangF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ZhangF06,
  author       = {Bin Zhang and
                  Dengguo Feng},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Multi-pass Fast Correlation Attack on Stream Ciphers},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {234--248},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_17},
  doi          = {10.1007/978-3-540-74462-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ZhangF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ZhangWFB05,
  author       = {Bin Zhang and
                  Hongjun Wu and
                  Dengguo Feng and
                  Feng Bao},
  editor       = {Alfred Menezes},
  title        = {A Fast Correlation Attack on the Shrinking Generator},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_7},
  doi          = {10.1007/978-3-540-30574-3\_7},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ZhangWFB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangWFW05,
  author       = {Bin Zhang and
                  Hongjun Wu and
                  Dengguo Feng and
                  Hong Wang},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Weaknesses of COSvd (2, 128) Stream Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {270--283},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_23},
  doi          = {10.1007/11734727\_23},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangWFW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangWFB04,
  author       = {Bin Zhang and
                  Hongjun Wu and
                  Dengguo Feng and
                  Feng Bao},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {303--309},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_22},
  doi          = {10.1007/978-3-540-24852-1\_22},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangWFB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangWFB04,
  author       = {Bin Zhang and
                  Hongjun Wu and
                  Dengguo Feng and
                  Feng Bao},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Security Analysis of the Generalized Self-shrinking Generator},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {388--400},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_30},
  doi          = {10.1007/978-3-540-30191-2\_30},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangWFB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhangWFB04,
  author       = {Bin Zhang and
                  Hongjun Wu and
                  Dengguo Feng and
                  Feng Bao},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream
                  Ciphers},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {73--83},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_7},
  doi          = {10.1007/978-3-540-30556-9\_7},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ZhangWFB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics