Bingke Ma

According to our database1, Bingke Ma authored at least 10 papers between 2013 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
IACR Cryptol. ePrint Arch., 2015

Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version).
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Reduced-Round Whirlwind (Full Version).
IACR Cryptol. ePrint Arch., 2015

Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions.
Proceedings of the Advances in Information and Computer Security, 2015

Cryptanalysis of Reduced-Round Whirlwind.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version).
IACR Cryptol. ePrint Arch., 2014

Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014

Improved Preimage Attacks against Reduced HAS-160.
Proceedings of the Information Security Practice and Experience, 2014

Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013


  Loading...