Bing Sun

Orcid: 0000-0002-7403-8795

Affiliations:
  • National University of Defense Technology, Department of Mathematics, Changsha, China


According to our database1, Bing Sun authored at least 54 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers.
Comput. J., February, 2024

Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials.
IACR Trans. Symmetric Cryptol., 2024

Feistel-Like Structures Revisited: Classification and Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Further insights on constructing quantum circuits for Camellia block cipher.
Quantum Inf. Process., December, 2023

More constructions of <i>n</i>-cycle permutations.
Finite Fields Their Appl., June, 2023

New Wine Old Bottles: Feistel Structure Revised.
IEEE Trans. Inf. Theory, March, 2023

2022
Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC.
IET Inf. Secur., 2022

Improved rotational-XOR cryptanalysis of Simon-like block ciphers.
IET Inf. Secur., 2022

Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK.
IACR Cryptol. ePrint Arch., 2022

More constructions of n-cycle permutations.
CoRR, 2022

2021
New Constructions of Complete Permutations.
IEEE Trans. Inf. Theory, 2021

Provable Security Evaluation of Block Ciphers Against Demirci-Selçuk's Meet-in-the-Middle Attack.
IEEE Trans. Inf. Theory, 2021

Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures.
Secur. Commun. Networks, 2021

Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers.
IACR Cryptol. ePrint Arch., 2020

The phantom of differential characteristics.
Des. Codes Cryptogr., 2020

2019
New Results About the Boomerang Uniformity of Permutation Polynomials.
IEEE Trans. Inf. Theory, 2019

Improved Cryptanalysis on SipHash.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptol. ePrint Arch., 2018

2017
New observation on division property.
Sci. China Inf. Sci., 2017

Revised cryptanalysis for SMS4.
Sci. China Inf. Sci., 2017

Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers.
Proceedings of the Information Security Practice and Experience, 2017

2016
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys.
IET Inf. Secur., 2016

Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2016

New Insights on AES-like SPN Ciphers.
IACR Cryptol. ePrint Arch., 2016

Impossible Differentials of SPN Ciphers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Truncated differential cryptanalysis of PRINCE.
Secur. Commun. Networks, 2015

Differential fault analysis on LED using Super-Sbox.
IET Inf. Secur., 2015

Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015

2013
Fault analysis study of the block cipher FOX64.
Multim. Tools Appl., 2013

Security evaluation of MISTY structure with SPN round function.
Comput. Math. Appl., 2013

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
On Algebraic Property of T-Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
A meet-in-the-middle attack on reduced-round ARIA.
J. Syst. Softw., 2011

Impossible differential cryptanalysis of 13-round CLEFIA-128.
J. Syst. Softw., 2011

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
J. Inf. Sci. Eng., 2011

Differential Fault Analysis on SMS4 using a single fault.
Inf. Process. Lett., 2011

Impossible differential cryptanalysis of SPN ciphers.
IET Inf. Secur., 2011

Balanced rotation symmetric boolean functions with maximum algebraic immunity.
IET Inf. Secur., 2011

Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0.
Proceedings of the 2011 World Congress on Internet Security, 2011

2010
Improved Fault Attack on FOX.
IACR Cryptol. ePrint Arch., 2010

A Meet-in-the-Middle Attack on ARIA.
IACR Cryptol. ePrint Arch., 2010

Some Observations on MISTY Structure with SPN Round Function.
IACR Cryptol. ePrint Arch., 2010

SQUARE attack on block ciphers with low algebraic degree.
Sci. China Inf. Sci., 2010

Impossible Differential Cryptanalysis on Feistel Ciphers with <i>SP</i> and <i>SPS</i> Round Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
New Integral Distinguisher for Rijndael-256.
IACR Cryptol. ePrint Arch., 2009

Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network.
IACR Cryptol. ePrint Arch., 2009

New Cryptanalysis of Block Ciphers with Low Algebraic Degree.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Integral Cryptanalysis of ARIA.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Saturation Attack on the Block Cipher HIGHT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
New Impossible Differential Cryptanalysis of ARIA.
IACR Cryptol. ePrint Arch., 2008

Construction of Resilient Functions with Multiple Cryptographic Criteria.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Enumeration of Homogeneous Rotation Symmetric Functions over Fp.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008


  Loading...