The following pages link to Xiaoyang Dong (Q1752547):
Displaying 23 items.
- Conditional cube attack on round-reduced River Keyak (Q1752548) (← links)
- A key-recovery attack on 855-round Trivium (Q1784086) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems (Q2104437) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 (Q2179384) (← links)
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 (Q2179408) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- Quantum attacks on some Feistel block ciphers (Q2182081) (← links)
- MILP-based differential attack on round-reduced GIFT (Q2290463) (← links)
- Improved conditional cube attacks on Keccak keyed modes with MILP method (Q2412869) (← links)
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (Q2416936) (← links)
- Mathematical models of nutrient recycling and toxin production in a gradostat (Q2627228) (← links)
- Improved Attacks on Reduced-Round Camellia-128/192/256 (Q2790031) (← links)
- Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia (Q2946934) (← links)
- Improved attacks against reduced-round Whirlwind (Q6063133) (← links)
- Triangulating rebound attack on AES-like hashing (Q6097258) (← links)
- Improved differential attacks on GIFT-64 (Q6536224) (← links)
- Quantum attacks: a view of data complexity on offline Simon's algorithm (Q6575058) (← links)
- Quantum attacks on hash constructions with low quantum random access memory (Q6595804) (← links)
- Automated meet-in-the-middle attack goes to Feistel (Q6595820) (← links)
- Generic MitM attack frameworks on sponge constructions (Q6652908) (← links)