Links among impossible differential, integral and zero correlation linear cryptanalysis B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li Annual Cryptology Conference, 95-115, 2015 | 101 | 2015 |
New results about the boomerang uniformity of permutation polynomials K Li, L Qu, B Sun, C Li IEEE Transactions on Information Theory 65 (11), 7542-7553, 2019 | 89 | 2019 |
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis B Sun, M Liu, J Guo, V Rijmen, R Li Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 73 | 2016 |
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu International Conference on the Theory and Application of Cryptology and …, 2018 | 69 | 2018 |
Balanced rotation symmetric Boolean functions with maximum algebraic immunity S Fu, L Qu, C Li, B Sun IET information security 5 (2), 93-99, 2011 | 65 | 2011 |
New insights on AES-like SPN ciphers B Sun, M Liu, J Guo, L Qu, V Rijmen Annual International Cryptology Conference, 605-624, 2016 | 63 | 2016 |
Impossible differential cryptanalysis of SPN ciphers R Li, B Sun, C Li IET Information Security 5 (2), 111-120, 2011 | 48 | 2011 |
Saturation attack on the block cipher HIGHT P Zhang, B Sun, C Li Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009 | 37 | 2009 |
Differential fault analysis on SMS4 using a single fault R Li, B Sun, C Li, J You Information Processing Letters 111 (4), 156-163, 2011 | 33 | 2011 |
New impossible differential cryptanalysis of ARIA R Li, B Sun, P Zhang, C Li Cryptology ePrint Archive, 2008 | 33 | 2008 |
Integral cryptanalysis of ARIA P Li, B Sun, C Li Information Security and Cryptology: 5th International Conference, Inscrypt …, 2010 | 32 | 2010 |
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions Y Wei, P Li, B Sun, C Li International Conference on Applied Cryptography and Network Security, 105-122, 2010 | 30 | 2010 |
Rotational-XOR cryptanalysis of Simon-like block ciphers J Lu, Y Liu, T Ashur, B Sun, C Li Australasian Conference on Information Security and Privacy, 105-124, 2020 | 26 | 2020 |
New observation on division property B Sun, X Hai, W Zhang, L Cheng, Z Yang Cryptology ePrint Archive, 2015 | 23 | 2015 |
A meet-in-the-middle attack on reduced-round ARIA X Tang, B Sun, R Li, C Li, J Yin Journal of Systems and Software 84 (10), 1685-1692, 2011 | 21 | 2011 |
Truncated differential cryptanalysis of PRINCE G Zhao, B Sun, C Li, J Su Security and Communication Networks 8 (16), 2875-2887, 2015 | 20 | 2015 |
SQUARE attack on block ciphers with low algebraic degree B Sun, RL Li, LJ Qu, C Li Science China Information Sciences 53, 1988-1995, 2010 | 17 | 2010 |
Improved cryptanalysis on SipHash W Xin, Y Liu, B Sun, C Li International Conference on Cryptology and Network Security, 61-79, 2019 | 16 | 2019 |
Differential fault analysis on LED using SuperSbox G Zhao, R Li, L Cheng, C Li, B Sun IET Information Security 9 (4), 209-218, 2015 | 16 | 2015 |
Fault analysis study of the block cipher FOX64 R Li, J You, B Sun, C Li Multimedia Tools and Applications 63 (3), 691-708, 2013 | 16 | 2013 |