Follow
Zhiyu Zhang
Title
Cited by
Cited by
Year
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
X Dong, Z Zhang, S Sun, C Wei, X Wang, L Hu
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
122021
Improved MITM cryptanalysis on Streebog
J Hua, X Dong, S Sun, Z Zhang, L Hu, X Wang
Cryptology ePrint Archive, 2022
82022
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT
H Guo, Z Zhang, Q Yang, L Hu, Y Luo
The Computer Journal 66 (5), 1069-1082, 2023
22023
The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation
K Qiao, Z Zhang, Z Niu, L Zhu, J Ma
Chinese Journal of Electronics 33 (1), 19-29, 2024
12024
Classical and quantum meet-in-the-middle nostradamus attacks on aes-like hashing
Z Zhang, S Sun, C Wang, L Hu
IACR Transactions on Symmetric Cryptology 2023 (2), 224-252, 2023
12023
若干广义非平衡 Feistel 结构的量子分析研究
于博, 孙兵, 刘国强, 罗宜元, 张志宇
密码学报 8 (6), 960-973, 2021
12021
Automatic key recovery of feistel ciphers: application to SIMON and SIMECK
Y Zhang, L Lyu, K Qiao, Z Zhang, S Sun, L Hu
Information Security Practice and Experience: 16th International Conference …, 2021
12021
Quantum Security of TNT
S Mao, Z Zhang, L Hu, L Li, P Wang
Cryptology ePrint Archive, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–8