Quantum cryptanalysis on some generalized Feistel schemes X Dong, Z Li, X Wang Science China Information Sciences 62 (2), 22501, 2019 | 83 | 2019 |
Conditional cube attack on round-reduced ASCON Z Li, X Dong, X Wang IACR Transactions on Symmetric Cryptology, 175-202, 2017 | 81 | 2017 |
Improved conditional cube attacks on Keccak keyed modes with MILP method Z Li, W Bi, X Dong, X Wang International Conference on the Theory and Application of Cryptology and …, 2017 | 54 | 2017 |
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks X Dong, J Hua, S Sun, Z Li, X Wang, L Hu Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 47 | 2021 |
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 39 | 2021 |
An expressive fully policy-hidden ciphertext policy attribute-based encryption scheme with credible verification based on blockchain Z Zhang, J Zhang, Y Yuan, Z Li IEEE Internet of Things Journal 9 (11), 8681-8692, 2021 | 36 | 2021 |
Cube-like attack on round-reduced initialization of Ketje Sr X Dong, Z Li, X Wang, L Qin IACR Transactions on Symmetric Cryptology, 259-280, 2017 | 32 | 2017 |
Practical key-recovery attacks on round-reduced Ketje Jr, Xoodoo-AE and Xoodyak H Zhou, Z Li, X Dong, K Jia, W Meier The Computer Journal 63 (8), 1231-1246, 2020 | 23 | 2020 |
New Conditional Cube Attack on Keccak Keyed Modes Z Li, X Dong, W Bi, K Jia, X Wang, W Meier IACR Transactions on Symmetric Cryptology, 94-124, 2019 | 23 | 2019 |
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes W Bi, X Dong, Z Li, R Zong, X Wang Designs, Codes and Cryptography 87 (6), 1271-1296, 2019 | 20 | 2019 |
Conditional cube attack on round-reduced River Keyak W Bi, Z Li, X Dong, L Li, X Wang Designs, Codes and Cryptography 86 (6), 1295-1310, 2018 | 9 | 2018 |