Follow
Bing Sun
Bing Sun
National University of Defense Technology
Verified email at kuleuven.be
Title
Cited by
Cited by
Year
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
672015
Balanced rotation symmetric Boolean functions with maximum algebraic immunity
S Fu, L Qu, C Li, B Sun
IET information security 5 (2), 93-99, 2011
622011
New results about the boomerang uniformity of permutation polynomials
K Li, L Qu, B Sun, C Li
IEEE Transactions on Information Theory 65 (11), 7542-7553, 2019
572019
New insights on AES-like SPN ciphers
B Sun, M Liu, J Guo, L Qu, V Rijmen
Annual International Cryptology Conference, 605-624, 2016
522016
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
B Sun, M Liu, J Guo, V Rijmen, R Li
Annual International Conference on the Theory and Applications ofá…, 2016
522016
Impossible differential cryptanalysis of SPN ciphers
R Li, B Sun, C Li
IET Information Security 5 (2), 111-120, 2011
412011
Saturation attack on the block cipher HIGHT
P Zhang, B Sun, C Li
International Conference on Cryptology and Network Security, 76-86, 2009
362009
Differential fault analysis on SMS4 using a single fault
R Li, B Sun, C Li, J You
Information Processing Letters 111 (4), 156-163, 2011
322011
Integral cryptanalysis of ARIA
P Li, B Sun, C Li
International Conference on Information Security and Cryptology, 1-14, 2009
312009
New impossible differential cryptanalysis of ARIA
R Li, B Sun, P Zhang, C Li
Cryptology ePrint Archive, 2008
312008
Impossible differential cryptanalysis on Feistel ciphers with SP and SPS round functions
Y Wei, P Li, B Sun, C Li
International Conference on Applied Cryptography and Network Security, 105-122, 2010
252010
Programming the Demirci-Selšuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology andá…, 2018
232018
New observation on division property
B Sun, X Hai, W Zhang, L Cheng, Z Yang
Cryptology ePrint Archive, 2015
222015
A meet-in-the-middle attack on reduced-round ARIA
X Tang, B Sun, R Li, C Li, J Yin
Journal of Systems and Software 84 (10), 1685-1692, 2011
202011
SQUARE attack on block ciphers with low algebraic degree
B Sun, RL Li, LJ Qu, C Li
Science China Information Sciences 53 (10), 1988-1995, 2010
172010
Rotational-XOR cryptanalysis of Simon-like block ciphers
J Lu, Y Liu, T Ashur, B Sun, C Li
Australasian Conference on Information Security and Privacy, 105-124, 2020
162020
Impossible differential cryptanalysis of 13-round CLEFIA-128
X Tang, B Sun, R Li, C Li
Journal of Systems and Software 84 (7), 1191-1196, 2011
162011
New cryptanalysis of block ciphers with low algebraic degree
B Sun, L Qu, C Li
International Workshop on Fast Software Encryption, 180-192, 2009
142009
Truncated differential cryptanalysis of PRINCE
G Zhao, B Sun, C Li, J Su
Security and Communication Networks 8 (16), 2875-2887, 2015
132015
Differential fault analysis on LED using Super‐Sbox
G Zhao, R Li, L Cheng, C Li, B Sun
IET Information Security 9 (4), 209-218, 2015
132015
The system can't perform the operation now. Try again later.
Articles 1–20