Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bin Zhang 0003
@article{DBLP:journals/dcc/ZhouFZ22, author = {Zhaocun Zhou and Dengguo Feng and Bin Zhang}, title = {Efficient and extensive search for precise linear approximations with high correlations of full {SNOW-V}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2449--2479}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01090-8}, doi = {10.1007/S10623-022-01090-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhouFZ22, author = {Zhaocun Zhou and Dengguo Feng and Bin Zhang}, title = {Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {322--350}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.322-350}, doi = {10.46586/TOSC.V2022.I2.322-350}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZhouFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GongZ21, author = {Xinxin Gong and Bin Zhang}, title = {Resistance of {SNOW-V} against Fast Correlation Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {378--410}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.378-410}, doi = {10.46586/TOSC.V2021.I1.378-410}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GongZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GongZ21a, author = {Xinxin Gong and Bin Zhang}, title = {Comparing Large-unit and Bitwise Linear Approximations of {SNOW} 2.0 and {SNOW} 3G and Related Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {71--103}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.71-103}, doi = {10.46586/TOSC.V2021.I2.71-103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GongZ21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CaforioBTM0L021, author = {Andrea Caforio and Subhadeep Banik and Yosuke Todo and Willi Meier and Takanori Isobe and Fukang Liu and Bin Zhang}, title = {Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {4}, pages = {36--73}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i4.36-73}, doi = {10.46586/TOSC.V2021.I4.36-73}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CaforioBTM0L021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouFZ21, author = {Zhaocun Zhou and Dengguo Feng and Bin Zhang}, title = {Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1435}, year = {2021}, url = {https://eprint.iacr.org/2021/1435}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhouFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaforioBTMILZ21, author = {Andrea Caforio and Subhadeep Banik and Yosuke Todo and Willi Meier and Takanori Isobe and Fukang Liu and Bin Zhang}, title = {Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1523}, year = {2021}, url = {https://eprint.iacr.org/2021/1523}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CaforioBTMILZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouFZ21a, author = {Zhaocun Zhou and Dengguo Feng and Bin Zhang}, title = {Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full {SNOW-V}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1607}, year = {2021}, url = {https://eprint.iacr.org/2021/1607}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhouFZ21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GongZ20, author = {Xinxin Gong and Bin Zhang}, title = {Fast computation of linear approximation over certain composition functions and applications to {SNOW} 2.0 and {SNOW} 3G}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2407--2431}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00790-3}, doi = {10.1007/S10623-020-00790-3}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GongZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HamannKMZ18, author = {Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang}, title = {Design and analysis of small-state grain-like stream ciphers}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {803--834}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0261-6}, doi = {10.1007/S12095-017-0261-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HamannKMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ZhangXF18, author = {Bin Zhang and Chao Xu and Dengguo Feng}, title = {Practical Cryptanalysis of Bluetooth Encryption with Condition Masking}, journal = {J. Cryptol.}, volume = {31}, number = {2}, pages = {394--433}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9260-1}, doi = {10.1007/S00145-017-9260-1}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ZhangXF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TodoIMAZ18, author = {Yosuke Todo and Takanori Isobe and Willi Meier and Kazumaro Aoki and Bin Zhang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {129--159}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_5}, doi = {10.1007/978-3-319-96881-0\_5}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/TodoIMAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhangXM18, author = {Bin Zhang and Chao Xu and Willi Meier}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Fast Near Collision Attack on the Grain v1 Stream Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {771--802}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_25}, doi = {10.1007/978-3-319-78375-8\_25}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhangXM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangXM18, author = {Bin Zhang and Chao Xu and Willi Meier}, title = {Fast Near Collision Attack on the Grain v1 Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2018}, url = {http://eprint.iacr.org/2018/145}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangXM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TodoIMAZ18, author = {Yosuke Todo and Takanori Isobe and Willi Meier and Kazumaro Aoki and Bin Zhang}, title = {Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2018}, url = {https://eprint.iacr.org/2018/522}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TodoIMAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangGM17, author = {Bin Zhang and Xinxin Gong and Willi Meier}, title = {Fast Correlation Attacks on Grain-like Small State Stream Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {58--81}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.58-81}, doi = {10.13154/TOSC.V2017.I4.58-81}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhangGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamann0MZ17, author = {Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang}, title = {Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2017}, url = {http://eprint.iacr.org/2017/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamann0MZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangG17, author = {Bin Zhang and Xinxin Gong}, title = {New Algorithms for Solving {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {780}, year = {2017}, url = {http://eprint.iacr.org/2017/780}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/YaoZW16, author = {Yuan Yao and Bin Zhang and Wenling Wu}, title = {Utilizing Probabilistic Linear Equations in Cube Attacks}, journal = {J. Comput. Sci. Technol.}, volume = {31}, number = {2}, pages = {317--325}, year = {2016}, url = {https://doi.org/10.1007/s11390-016-1629-3}, doi = {10.1007/S11390-016-1629-3}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/YaoZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangXM16, author = {Bin Zhang and Chao Xu and Willi Meier}, title = {Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of {SNOW} 2.0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2016}, url = {http://eprint.iacr.org/2016/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangXM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Shi0F15, author = {Zhenqing Shi and Bin Zhang and Dengguo Feng}, title = {Practical-time related-key attack on Hummingbird-2}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {6}, pages = {321--327}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0424}, doi = {10.1049/IET-IFS.2014.0424}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Shi0F15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZhangG15, author = {Bin Zhang and Xinxin Gong}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Another Tradeoff Attack on Sprout-Like Stream Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {561--585}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_23}, doi = {10.1007/978-3-662-48800-3\_23}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZhangG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoZW15, author = {Yuan Yao and Bin Zhang and Wenling Wu}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {A Single Query Forgery Attack on Raviyoyla v1}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {671}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714645}, doi = {10.1145/2714576.2714645}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YaoZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZhangXM15, author = {Bin Zhang and Chao Xu and Willi Meier}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of {SNOW} 2.0}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {643--662}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_31}, doi = {10.1007/978-3-662-47989-6\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ZhangXM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Du0LL15, author = {Shaoyu Du and Bin Zhang and Zhenqi Li and Dongdai Lin}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Fault Attacks on Stream Cipher Scream}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {50--64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_4}, doi = {10.1007/978-3-319-17533-1\_4}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Du0LL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/DuL0L15, author = {Shaoyu Du and Zhenqi Li and Bin Zhang and Dongdai Lin}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Combined Cache Timing Attacks and Template Attacks on Stream Cipher {MUGI}}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {235--249}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_17}, doi = {10.1007/978-3-319-17533-1\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/DuL0L15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Yao0W15, author = {Yuan Yao and Bin Zhang and Wenling Wu}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Automatic Search for Linear Trails of the {SPECK} Family}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {158--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_9}, doi = {10.1007/978-3-319-23318-5\_9}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Yao0W15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiZFV15, author = {Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede}, title = {A New Model for Error-Tolerant Side-Channel Cube Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2015}, url = {http://eprint.iacr.org/2015/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiZFV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GongZWF14, author = {Xinxin Gong and Bin Zhang and Wenling Wu and Dengguo Feng}, title = {Computing Walsh coefficients from the algebraic normal form of a Boolean function}, journal = {Cryptogr. Commun.}, volume = {6}, number = {4}, pages = {335--358}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0103-8}, doi = {10.1007/S12095-014-0103-8}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GongZWF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhongWZW14, author = {Xiao Zhong and Mingsheng Wang and Bin Zhang and Shengbao Wu}, editor = {Lucas Chi Kwong Hui and S. H. Qing and Elaine Shi and Siu{-}Ming Yiu}, title = {A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter}, booktitle = {Information and Communications Security - 16th International Conference, {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8958}, pages = {132--142}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21966-0\_10}, doi = {10.1007/978-3-319-21966-0\_10}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhongWZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/XuZF14, author = {Chao Xu and Bin Zhang and Dengguo Feng}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {Linear Cryptanalysis of {FASER128/256} and TriviA-ck}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {237--254}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_14}, doi = {10.1007/978-3-319-13039-2\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/XuZF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LiZRF14, author = {Zhenqi Li and Bin Zhang and Arnab Roy and Junfeng Fan}, editor = {Antoine Joux and Amr M. Youssef}, title = {Error-Tolerant Side-Channel Cube Attack Revisited}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {261--277}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_16}, doi = {10.1007/978-3-319-13051-4\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/LiZRF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Shi0F13, author = {Zhenqing Shi and Bin Zhang and Dengguo Feng}, editor = {Colin Boyd and Leonie Simpson}, title = {Cryptanalysis of Helix and Phelix Revisited}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {27--40}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_3}, doi = {10.1007/978-3-642-39059-3\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Shi0F13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiZFV13, author = {Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {A New Model for Error-Tolerant Side-Channel Cube Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {453--470}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_26}, doi = {10.1007/978-3-642-40349-1\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/LiZFV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GongZFY13, author = {Xinxin Gong and Bin Zhang and Dengguo Feng and Tongjiang Yan}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z{\_}pq}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {86--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_6}, doi = {10.1007/978-3-319-12087-4\_6}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GongZFY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0003XF13, author = {Bin Zhang and Chao Xu and Dengguo Feng}, editor = {Ran Canetti and Juan A. Garay}, title = {Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {165--182}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_10}, doi = {10.1007/978-3-642-40041-4\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0003XF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangLFL13, author = {Bin Zhang and Zhenqi Li and Dengguo Feng and Dongdai Lin}, editor = {Shiho Moriai}, title = {Near Collision Attack on the Grain v1 Stream Cipher}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {518--538}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_27}, doi = {10.1007/978-3-662-43933-3\_27}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangLFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LvZL13, author = {Jing Lv and Bin Zhang and Dongdai Lin}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Some New Weaknesses in the {RC4} Stream Cipher}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {28--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_2}, doi = {10.1007/978-3-319-05149-9\_2}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LvZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LvZL13, author = {Jing Lv and Bin Zhang and Dongdai Lin}, title = {Distinguishing Attacks on {RC4} and {A} New Improvement of the Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2013}, url = {http://eprint.iacr.org/2013/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LvZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiLWZL12, author = {Zhenqi Li and Yao Lu and Wenhao Wang and Bin Zhang and Dongdai Lin}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {311--320}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_28}, doi = {10.1007/978-3-642-34129-8\_28}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiLWZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiZLZL12, author = {Zhenqi Li and Bin Zhang and Yao Lu and Jing Zou and Dongdai Lin}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {321--330}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_29}, doi = {10.1007/978-3-642-34129-8\_29}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiZLZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiZYL12, author = {Zhenqi Li and Bin Zhang and Yuan Yao and Dongdai Lin}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Cube Cryptanalysis of LBlock with Noisy Leakage}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {141--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_11}, doi = {10.1007/978-3-642-37682-5\_11}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LiZYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Shi0FW12, author = {Zhenqing Shi and Bin Zhang and Dengguo Feng and Wenling Wu}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {337--351}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_24}, doi = {10.1007/978-3-642-37682-5\_24}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/Shi0FW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangF11, author = {Bin Zhang and Dengguo Feng}, title = {Improved multi-pass fast correlation attacks with applications}, journal = {Sci. China Inf. Sci.}, volume = {54}, number = {8}, pages = {1635--1644}, year = {2011}, url = {https://doi.org/10.1007/s11432-011-4295-7}, doi = {10.1007/S11432-011-4295-7}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BiryukovKZ11, author = {Alex Biryukov and Ilya Kizhvatov and Bin Zhang}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {91--109}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_6}, doi = {10.1007/978-3-642-21554-4\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BiryukovKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovKZ11, author = {Alex Biryukov and Ilya Kizhvatov and Bin Zhang}, title = {Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2011}, url = {http://eprint.iacr.org/2011/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BiryukovPZ10, author = {Alex Biryukov and Deike Priemuth{-}Schmid and Bin Zhang}, editor = {Jianying Zhou and Moti Yung}, title = {Multiset Collision Attacks on Reduced-Round {SNOW} 3G and {SNOW} 3G\({}^{\mbox{ {(+)} }}\)}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {139--153}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_9}, doi = {10.1007/978-3-642-13708-2\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BiryukovPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/BiryukovPZ10, author = {Alex Biryukov and Deike Priemuth{-}Schmid and Bin Zhang}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Differential Resynchronization Attacks on Reduced Round {SNOW} 3G {\(\oplus\)}}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {147--157}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_9}, doi = {10.1007/978-3-642-25206-8\_9}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/BiryukovPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BiryukovPZ10, author = {Alex Biryukov and Deike Priemuth{-}Schmid and Bin Zhang}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Analysis of {SNOW} 3G{\(\oplus\)} Resynchronization Mechanism}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {327--333}, publisher = {SciTePress}, year = {2010}, timestamp = {Sat, 22 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BiryukovPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Zhang09, author = {Bin Zhang}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {New Cryptanalysis of Irregularly Decimated Stream Ciphers}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {449--465}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_28}, doi = {10.1007/978-3-642-05445-7\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Zhang09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ZhangF08, author = {Bin Zhang and Dengguo Feng}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {An Improved Fast Correlation Attack on Stream Ciphers}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {214--227}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_14}, doi = {10.1007/978-3-642-04159-4\_14}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ZhangF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangF06, author = {Bin Zhang and Dengguo Feng}, title = {Security analysis of a new stream cipher}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {49}, number = {3}, pages = {286--301}, year = {2006}, url = {https://doi.org/10.1007/s11432-006-0286-5}, doi = {10.1007/S11432-006-0286-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZhangF06, author = {Bin Zhang and Dengguo Feng}, editor = {Xuejia Lai and Kefei Chen}, title = {New Guess-and-Determine Attack on the Self-Shrinking Generator}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {54--68}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_4}, doi = {10.1007/11935230\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZhangF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/ZhangF06, author = {Bin Zhang and Dengguo Feng}, title = {A New Variant of the Self-Shrinking Generator}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1619--1622}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261550}, doi = {10.1109/ISIT.2006.261550}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/ZhangF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ZhangF06, author = {Bin Zhang and Dengguo Feng}, editor = {Eli Biham and Amr M. Youssef}, title = {Multi-pass Fast Correlation Attack on Stream Ciphers}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {234--248}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_17}, doi = {10.1007/978-3-540-74462-7\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ZhangF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ZhangWFB05, author = {Bin Zhang and Hongjun Wu and Dengguo Feng and Feng Bao}, editor = {Alfred Menezes}, title = {A Fast Correlation Attack on the Shrinking Generator}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {72--86}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_7}, doi = {10.1007/978-3-540-30574-3\_7}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/ZhangWFB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangWFW05, author = {Bin Zhang and Hongjun Wu and Dengguo Feng and Hong Wang}, editor = {Dongho Won and Seungjoo Kim}, title = {Weaknesses of COSvd (2, 128) Stream Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {270--283}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_23}, doi = {10.1007/11734727\_23}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ZhangWFW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangWFB04, author = {Bin Zhang and Hongjun Wu and Dengguo Feng and Feng Bao}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {303--309}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_22}, doi = {10.1007/978-3-540-24852-1\_22}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ZhangWFB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangWFB04, author = {Bin Zhang and Hongjun Wu and Dengguo Feng and Feng Bao}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Security Analysis of the Generalized Self-shrinking Generator}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {388--400}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_30}, doi = {10.1007/978-3-540-30191-2\_30}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangWFB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ZhangWFB04, author = {Bin Zhang and Hongjun Wu and Dengguo Feng and Feng Bao}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {73--83}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_7}, doi = {10.1007/978-3-540-30556-9\_7}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/ZhangWFB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.