Bin Hu

Affiliations:
  • PLA SSF Information Engineering University, Zhengzhou, China


According to our database1, Bin Hu authored at least 27 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes.
IEEE Trans. Computers, February, 2024

A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm.
Comput. J., 2024

2023
New method for combining Matsui's bounding conditions with sequential encoding method.
Des. Codes Cryptogr., November, 2023

Weak rotational property and its application.
Des. Codes Cryptogr., October, 2023

Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework.
Des. Codes Cryptogr., September, 2023

A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis.
Sci. China Inf. Sci., March, 2023

Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers.
IEEE Trans. Inf. Theory, February, 2023

Selecting Rotation Constants on SIMON-Type Ciphers.
J. Database Manag., 2023

New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

2022
Research on the Security Level of μ2 against Impossible Differential cryptanalysis.
KSII Trans. Internet Inf. Syst., 2022

Fault attacks on authenticated encryption modes for GIFT.
IET Inf. Secur., 2022

The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method.
IACR Cryptol. ePrint Arch., 2022

Practical Attacks on the Full-round FRIET.
IACR Cryptol. ePrint Arch., 2022

2021
Breaking LWC candidates: sESTATE and Elephant in quantum setting.
Des. Codes Cryptogr., 2021

2020
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property.
IACR Trans. Symmetric Cryptol., 2020

Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity.
IACR Cryptol. ePrint Arch., 2020

On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function.
IACR Cryptol. ePrint Arch., 2020

On the Structure Property of PCR's Adjacency Graph with a Prime Order and Its Application of Constructing M-Sequences.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Complete analysis of Simon's quantum algorithm with additional collisions.
Quantum Inf. Process., 2019

A Practical Method to Recover Exact Superpoly in Cube Attack.
IACR Cryptol. ePrint Arch., 2019

MILP-aided Method of Searching Division Property Using Three Subsets and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Security evaluation on Simeck against zero-correlation linear cryptanalysis.
IET Inf. Secur., 2018

MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets.
IACR Cryptol. ePrint Arch., 2018

The autocorrelation properties of single cycle polynomial T-functions.
Des. Codes Cryptogr., 2018

2016
Some properties of impossible differential and zero correlation linear cryptanalysis on TEA family-type ciphers.
Secur. Commun. Networks, 2016

Zero Correlation Linear Cryptanalysis on LEA Family Ciphers.
J. Commun., 2016

Impossible Differential Cryptanalysis on DVB-CSA.
KSII Trans. Internet Inf. Syst., 2016


  Loading...