Danping Shi

Orcid: 0000-0003-2809-8647

According to our database1, Danping Shi authored at least 33 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
J. Cryptol., June, 2024

Improved Linear Cryptanalysis of Block Cipher BORON.
Comput. J., January, 2024

Diving Deep into the Preimage Security of AES-like Hashing.
IACR Cryptol. ePrint Arch., 2024

2023
Automatic Demirci-Selçuk Meet-In-The-Middle Attack On SIMON.
Comput. J., December, 2023

Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY.
IACR Cryptol. ePrint Arch., 2023

Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
New Properties of Double Boomerang Connectivity Table.
IACR Cryptol. ePrint Arch., 2022

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
IACR Cryptol. ePrint Arch., 2022

Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing.
IACR Cryptol. ePrint Arch., 2021

Security analysis of Subterranean 2.0.
Des. Codes Cryptogr., 2021

2020
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions.
IACR Cryptol. ePrint Arch., 2020

Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.
IACR Cryptol. ePrint Arch., 2020

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2020

2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019

Lightweight Iterative MDS Matrices: How Small Can We Go?
IACR Cryptol. ePrint Arch., 2019

Convolutional Neural Network Based Side-Channel Attacks with Customized Filters.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
On the Complexity of Impossible Differential Cryptanalysis.
Secur. Commun. Networks, 2018

Lightweight AE and HASH in a Single Round Function.
IACR Cryptol. ePrint Arch., 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptol. ePrint Arch., 2018

New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions.
IACR Cryptol. ePrint Arch., 2017

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.
Sci. China Inf. Sci., 2017

2016
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016

2015
Differential fault attack on Zorro block cipher.
Secur. Commun. Networks, 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015

Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN.
IACR Cryptol. ePrint Arch., 2015

2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014

Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
IACR Cryptol. ePrint Arch., 2014

Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014


  Loading...