Current affiliation: Tsinghua UniversitySubject speciality: Computer SciencePrimary location: China, People's Republic of
Published in:IET Information SecurityPublication date:2016-05-01
We give algorithms to evaluate the structure of monomials in cryptologic primitives. In this way, we give a theoretical evaluation to the primitive...
Published in:Network and System SecurityPublication date:2014-01-01
Use the meet-in-the-middle (MITM) method to attack the lightweight blockcipher mCrypton, the round-reduced versions.
Our basic 7-round attack reach...
Published in:Information Security and CryptologyPublication date:2015-01-01
Use the classical boomerang attack on round-reduced BLAKE and BLAKE2 hash functions. It is surprising to find that the elimination of the round con...
Published in:Designs Codes and CryptographyPublication date:2016-06-28
Published in:Security and Communication NetworksPublication date:2016-01-01
Cryptanalysis of the LSH hash functions
Published in:Science China Information SciencesPublication date:2016-03-10