Seguir
Bing Sun
Bing Sun
National University of Defense Technology
Dirección de correo verificada de kuleuven.be
Título
Citado por
Citado por
Año
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
902015
New results about the boomerang uniformity of permutation polynomials
K Li, L Qu, B Sun, C Li
IEEE Transactions on Information Theory 65 (11), 7542-7553, 2019
772019
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
B Sun, M Liu, J Guo, V Rijmen, R Li
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
702016
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology and …, 2018
642018
New insights on AES-like SPN ciphers
B Sun, M Liu, J Guo, L Qu, V Rijmen
Annual International Cryptology Conference, 605-624, 2016
632016
Balanced rotation symmetric Boolean functions with maximum algebraic immunity
S Fu, L Qu, C Li, B Sun
IET information security 5 (2), 93-99, 2011
632011
Impossible differential cryptanalysis of SPN ciphers
R Li, B Sun, C Li
IET Information Security 5 (2), 111-120, 2011
472011
Saturation attack on the block cipher HIGHT
P Zhang, B Sun, C Li
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
372009
Differential fault analysis on SMS4 using a single fault
R Li, B Sun, C Li, J You
Information Processing Letters 111 (4), 156-163, 2011
322011
New impossible differential cryptanalysis of ARIA
R Li, B Sun, P Zhang, C Li
Cryptology ePrint Archive, 2008
322008
Integral cryptanalysis of ARIA
P Li, B Sun, C Li
Information Security and Cryptology: 5th International Conference, Inscrypt …, 2010
312010
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions
Y Wei, P Li, B Sun, C Li
International Conference on Applied Cryptography and Network Security, 105-122, 2010
282010
Rotational-XOR cryptanalysis of Simon-like block ciphers
J Lu, Y Liu, T Ashur, B Sun, C Li
Australasian Conference on Information Security and Privacy, 105-124, 2020
242020
New observation on division property
B Sun, X Hai, W Zhang, L Cheng, Z Yang
Cryptology ePrint Archive, 2015
242015
A meet-in-the-middle attack on reduced-round ARIA
X Tang, B Sun, R Li, C Li, J Yin
Journal of Systems and Software 84 (10), 1685-1692, 2011
212011
Truncated differential cryptanalysis of PRINCE
G Zhao, B Sun, C Li, J Su
Security and Communication Networks 8 (16), 2875-2887, 2015
182015
SQUARE attack on block ciphers with low algebraic degree
B Sun, RL Li, LJ Qu, C Li
Science China Information Sciences 53, 1988-1995, 2010
172010
Impossible differential cryptanalysis of 13-round CLEFIA-128
X Tang, B Sun, R Li, C Li
Journal of Systems and Software 84 (7), 1191-1196, 2011
162011
Differential fault analysis on LED using Super‐Sbox
G Zhao, R Li, L Cheng, C Li, B Sun
IET Information Security 9 (4), 209-218, 2015
152015
Fault analysis study of the block cipher FOX64
R Li, J You, B Sun, C Li
Multimedia Tools and Applications 63 (3), 691-708, 2013
152013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20