关注
Bing Sun
Bing Sun
National University of Defense Technology
在 kuleuven.be 的电子邮件经过验证
标题
引用次数
引用次数
年份
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
902015
New results about the boomerang uniformity of permutation polynomials
K Li, L Qu, B Sun, C Li
IEEE Transactions on Information Theory 65 (11), 7542-7553, 2019
752019
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
B Sun, M Liu, J Guo, V Rijmen, R Li
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
702016
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology and …, 2018
642018
New insights on AES-like SPN ciphers
B Sun, M Liu, J Guo, L Qu, V Rijmen
Annual International Cryptology Conference, 605-624, 2016
632016
Balanced rotation symmetric Boolean functions with maximum algebraic immunity
S Fu, L Qu, C Li, B Sun
IET information security 5 (2), 93-99, 2011
632011
Impossible differential cryptanalysis of SPN ciphers
R Li, B Sun, C Li
IET Information Security 5 (2), 111-120, 2011
462011
Saturation attack on the block cipher HIGHT
P Zhang, B Sun, C Li
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
362009
Differential fault analysis on SMS4 using a single fault
R Li, B Sun, C Li, J You
Information Processing Letters 111 (4), 156-163, 2011
322011
New impossible differential cryptanalysis of ARIA
R Li, B Sun, P Zhang, C Li
Cryptology ePrint Archive, 2008
322008
Integral cryptanalysis of ARIA
P Li, B Sun, C Li
Information Security and Cryptology: 5th International Conference, Inscrypt …, 2010
312010
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions
Y Wei, P Li, B Sun, C Li
International Conference on Applied Cryptography and Network Security, 105-122, 2010
282010
New observation on division property
B Sun, X Hai, W Zhang, L Cheng, Z Yang
Cryptology ePrint Archive, 2015
242015
Rotational-XOR cryptanalysis of Simon-like block ciphers
J Lu, Y Liu, T Ashur, B Sun, C Li
Australasian Conference on Information Security and Privacy, 105-124, 2020
232020
A meet-in-the-middle attack on reduced-round ARIA
X Tang, B Sun, R Li, C Li, J Yin
Journal of Systems and Software 84 (10), 1685-1692, 2011
212011
Truncated differential cryptanalysis of PRINCE
G Zhao, B Sun, C Li, J Su
Security and Communication Networks 8 (16), 2875-2887, 2015
182015
SQUARE attack on block ciphers with low algebraic degree
B Sun, RL Li, LJ Qu, C Li
Science China Information Sciences 53, 1988-1995, 2010
172010
Impossible differential cryptanalysis of 13-round CLEFIA-128
X Tang, B Sun, R Li, C Li
Journal of Systems and Software 84 (7), 1191-1196, 2011
162011
Differential fault analysis on LED using SuperSbox
G Zhao, R Li, L Cheng, C Li, B Sun
IET Information Security 9 (4), 209-218, 2015
152015
Fault analysis study of the block cipher FOX64
R Li, J You, B Sun, C Li
Multimedia Tools and Applications 63 (3), 691-708, 2013
152013
系统目前无法执行此操作,请稍后再试。
文章 1–20