Siwei Sun
Siwei Sun
Chinese Academy of Sciences; Singapore University of Technology and Design
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block ciphers
S Sun, L Hu, P Wang, K Qiao, X Ma, L Song
International Conference on the Theory and Application of Cryptology and†…, 2014
2102014
MILP-based automatic search algorithms for differential and linear trails for speck
K Fu, M Wang, Y Guo, S Sun, L Hu
International Conference on Fast Software Encryption, 268-288, 2016
972016
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined†…
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
Cryptol. ePrint Archive, Report 747, 2014-45, 2014
782014
Constructing new differentially 4-uniform permutations from the inverse function
Z Zha, L Hu, S Sun
Finite Fields and Their Applications 25, 64-78, 2014
562014
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks
S Sun, L Hu, L Song, Y Xie, P Wang
International Conference on Information Security and Cryptology, 39-51, 2013
502013
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR Transactions on Symmetric Cryptology 2017 (1), 281--306, 2017
422017
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
D Shi, L Hu, S Sun, L Song, K Qiao, X Ma
Science China Information Sciences 60 (3), 1-3, 2017
332017
Cube cryptanalysis of Hitag2 stream cipher
S Sun, L Hu, Y Xie, X Zeng
International Conference on Cryptology and Network Security, 15-25, 2011
272011
Differential analysis on simeck and simon with dynamic key-guessing techniques
K Qiao, L Hu, S Sun
International Conference on Information Systems Security and Privacy, 64-85, 2016
222016
Further results on differentially 4-uniform permutations over
Z Zha, L Hu, S Sun, J Shan
Science China Mathematics 58 (7), 1577-1588, 2015
192015
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.
K Qiao, L Hu, S Sun
IACR Cryptol. ePrint Arch. 2015, 902, 2015
162015
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song
IACR Cryptol. ePrint Arch. 2014, 747, 2014
162014
Strongchain: Transparent and collaborative proof-of-work consensus
P Szalachowski, D Reijsbergen, I Homoliak, S Sun
28th {USENIX} Security Symposium ({USENIX} Security 19), 819-836, 2019
152019
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
IACR Cryptol. ePrint Arch. 2015, 122, 2015
142015
Related-Key Impossible Differential Analysis of Full Khudra
Q Yang, L Hu, S Sun, L Song
International Workshop on Security, 135-146, 2016
132016
Improved differential analysis of block cipher PRIDE
Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma
International Conference on Information Security Practice and Experience†…, 2015
132015
Programming the demirci-selÁuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology and†…, 2018
102018
Related-Key Differential Attack on Round Reduced RECTANGLE-80.
J Shan, L Hu, L Song, S Sun, X Ma
IACR Cryptol. ePrint Arch. 2014, 986, 2014
102014
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full
D Shi, S Sun, Y Sasaki, C Li, L Hu
Annual International Cryptology Conference, 180-209, 2019
92019
Constructing low-latency involutory MDS matrices with lightweight circuits
S Li, S Sun, C Li, Z Wei, L Hu
IACR Transactions on Symmetric Cryptology, 84-117, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20