Bin Zhang

Affiliations:
  • Chinese Academy of Sciences, Institute of Software, State Key Laboratory of Information Security, Beijing, China
  • University of Luxembourg (former)


According to our database1, Bin Zhang authored at least 53 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V.
Des. Codes Cryptogr., 2022

2021
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks.
IACR Trans. Symmetric Cryptol., 2021

Resistance of SNOW-V against Fast Correlation Attacks.
IACR Trans. Symmetric Cryptol., 2021

Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V.
IACR Cryptol. ePrint Arch., 2021

Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a.
IACR Cryptol. ePrint Arch., 2021

Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
IACR Cryptol. ePrint Arch., 2021

2020
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G.
Des. Codes Cryptogr., 2020

2018
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking.
J. Cryptol., 2018

Fast Near Collision Attack on the Grain v1 Stream Cipher.
IACR Cryptol. ePrint Arch., 2018

Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
IACR Cryptol. ePrint Arch., 2018

Design and analysis of small-state grain-like stream ciphers.
Cryptogr. Commun., 2018

2017
Fast Correlation Attacks on Grain-like Small State Stream Ciphers.
IACR Trans. Symmetric Cryptol., 2017

New Algorithms for Solving LPN.
IACR Cryptol. ePrint Arch., 2017

Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers.
IACR Cryptol. ePrint Arch., 2017

2016
Utilizing Probabilistic Linear Equations in Cube Attacks.
J. Comput. Sci. Technol., 2016

Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0.
IACR Cryptol. ePrint Arch., 2016

2015
Practical-time related-key attack on Hummingbird-2.
IET Inf. Secur., 2015

A New Model for Error-Tolerant Side-Channel Cube Attacks.
IACR Cryptol. ePrint Arch., 2015

Automatic Search for Linear Trails of the SPECK Family.
Proceedings of the Information Security - 18th International Conference, 2015

Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI.
Proceedings of the Information Security Practice and Experience, 2015

Fault Attacks on Stream Cipher Scream.
Proceedings of the Information Security Practice and Experience, 2015

A Single Query Forgery Attack on Raviyoyla v1.
Proceedings of the 10th ACM Symposium on Information, 2015

Another Tradeoff Attack on Sprout-Like Stream Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Computing Walsh coefficients from the algebraic normal form of a Boolean function.
Cryptogr. Commun., 2014

Error-Tolerant Side-Channel Cube Attack Revisited.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Linear Cryptanalysis of FASER128/256 and TriviA-ck.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Distinguishing Attacks on RC4 and A New Improvement of the Cipher.
IACR Cryptol. ePrint Arch., 2013

Some New Weaknesses in the RC4 Stream Cipher.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Near Collision Attack on the Grain v1 Stream Cipher.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Cryptanalysis of Helix and Phelix Revisited.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Cube Cryptanalysis of LBlock with Noisy Leakage.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
IACR Cryptol. ePrint Arch., 2011

Improved multi-pass fast correlation attacks with applications.
Sci. China Inf. Sci., 2011

2010
Analysis of SNOW 3G⊕ Resynchronization Mechanism.
Proceedings of the SECRYPT 2010, 2010

Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G<sup> (+) </sup>.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
New Cryptanalysis of Irregularly Decimated Stream Ciphers.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

2008
An Improved Fast Correlation Attack on Stream Ciphers.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

2006
Security analysis of a new stream cipher.
Sci. China Ser. F Inf. Sci., 2006

Multi-pass Fast Correlation Attack on Stream Ciphers.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

A New Variant of the Self-Shrinking Generator.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

New Guess-and-Determine Attack on the Self-Shrinking Generator.
Proceedings of the Advances in Cryptology, 2006

2005
Weaknesses of COSvd (2, 128) Stream Cipher.
Proceedings of the Information Security and Cryptology, 2005

A Fast Correlation Attack on the Shrinking Generator.
Proceedings of the Topics in Cryptology, 2005

2004
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.
Proceedings of the Progress in Cryptology, 2004

Security Analysis of the Generalized Self-shrinking Generator.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 2004


  Loading...