Ling Song

Orcid: 0000-0001-9298-7313

Affiliations:
  • Nanyang Technological University, Singapore


According to our database1, Ling Song authored at least 53 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
J. Cryptol., June, 2024

Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
IACR Cryptol. ePrint Arch., 2024

2023
Generic attacks on small-state stream cipher constructions in the multi-user setting.
Cybersecur., December, 2023

Revisiting the Differential Meet-In-The-Middle Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY.
IACR Cryptol. ePrint Arch., 2023

Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies.
IACR Cryptol. ePrint Arch., 2023

Improved Differential Cryptanalysis on SPECK Using Plaintext Structures.
IACR Cryptol. ePrint Arch., 2023

Improving the Rectangle Attack on GIFT-64.
IACR Cryptol. ePrint Arch., 2023

Improved Boomerang Attacks on Deoxys-BC.
Proceedings of the Advances in Information and Computer Security, 2023

Improved Related-Key Rectangle Attack Against the Full AES-192.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
New Properties of Double Boomerang Connectivity Table.
IACR Cryptol. ePrint Arch., 2022

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
IACR Cryptol. ePrint Arch., 2022

Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3.
IACR Cryptol. ePrint Arch., 2022

Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256.
IACR Cryptol. ePrint Arch., 2022

2021
Security analysis of Subterranean 2.0.
Des. Codes Cryptogr., 2021

2020
Practical Collision Attacks against Round-Reduced SHA-3.
J. Cryptol., 2020

Improved Rectangle Attacks on SKINNY and CRAFT.
IACR Cryptol. ePrint Arch., 2020

TNT: How to Tweak a Block Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Boomerang Connectivity Table Revisited. Application to SKINNY and AES.
IACR Trans. Symmetric Cryptol., 2019

Comprehensive security analysis of CRAFT.
IACR Trans. Symmetric Cryptol., 2019

Boomerang Connectivity Table Revisited.
IACR Cryptol. ePrint Arch., 2019

2018
Key-Recovery Attacks on Full Kravatte.
IACR Trans. Symmetric Cryptol., 2018

Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.
IACR Cryptol. ePrint Arch., 2018

Boomerang Connectivity Table: A New Cryptanalysis Tool.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper).
IACR Trans. Symmetric Cryptol., 2017

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak.
IACR Cryptol. ePrint Arch., 2017

New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions.
IACR Cryptol. ePrint Arch., 2017

New Collision Attacks on Round-Reduced Keccak.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.
Sci. China Inf. Sci., 2017

2016
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA.
IACR Cryptol. ePrint Arch., 2016

Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak.
IACR Cryptol. ePrint Arch., 2016

Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Differential fault attack on Zorro block cipher.
Secur. Commun. Networks, 2015

Related-key Impossible Differential Analysis of Full Khudra.
IACR Cryptol. ePrint Arch., 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015

Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN.
IACR Cryptol. ePrint Arch., 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

2014
Improved Differential Analysis of Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014

Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
IACR Cryptol. ePrint Arch., 2014

Related-Key Differential Attack on Round Reduced RECTANGLE-80.
IACR Cryptol. ePrint Arch., 2014

Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks.
IACR Cryptol. ePrint Arch., 2013

Differential Fault Attack on the PRINCE Block Cipher.
IACR Cryptol. ePrint Arch., 2013

Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher.
Proceedings of the Information Security Practice and Experience, 2013


  Loading...