Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic search method for multiple differentials and its application on MANTIS., , , and . Sci. China Inf. Sci., 62 (3): 32111:1-32111:15 (2019)Investigation for 8-bit SKINNY-like S-boxes, analysis and applications., , , , , and . Cryptogr. Commun., 13 (5): 617-636 (2021)Algebraic Key-Recovery Attacks on Reduced-Round Xoofff., and . SAC, volume 12804 of Lecture Notes in Computer Science, page 171-197. Springer, (2020)An STP-based model toward designing S-boxes with good cryptographic properties., , , , and . Des. Codes Cryptogr., 90 (5): 1179-1202 (2022)FPGA-Based Real-time Interference Alignment Verification System., , , , and . ICCC, page 656-660. IEEE, (2018)Finding Impossible Differentials in ARX Ciphers under Weak Keys., , , , , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 326-356 (2024)OpenEval: Benchmarking Chinese LLMs across Capability, Alignment and Safety., , , , , , , , , and 4 other author(s). CoRR, (2024)Distinguisher on full-round compression function of GOST R., , and . Inf. Process. Lett., (2020)Stability of networked control system subject to denial-of-service., , , and . Sci. China Inf. Sci., (2021)Improved Single-Key Attacks on 2-GOST., , , , , , , , and . Secur. Commun. Networks, (2020)