Ling Song

Orcid: 0000-0001-9298-7313

Affiliations:
  • Nanyang Technological University, Singapore


According to our database1, Ling Song authored at least 62 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Preimage and collision attacks on reduced Ascon using algebraic strategies.
Cybersecur., December, 2025

A Holistic Framework for Impossible Boomerang Attacks.
IACR Commun. Cryptol., 2025

2024
Revisiting the shuffle of generalized Feistel structure.
Cybersecur., December, 2024

Preimage Attacks on Xoodyak and Gaston Based on Algebraic Strategies.
IEEE Internet Things J., October, 2024

CCA security for contracting (quasi-)Feistel constructions with tight round complexity.
Des. Codes Cryptogr., August, 2024

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
IACR Cryptol. ePrint Arch., 2024

Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY.
IACR Cryptol. ePrint Arch., 2024

Improving Differential-Neural Cryptanalysis for Large-State SPECK.
Proceedings of the Information and Communications Security - 26th International Conference, 2024

Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

Generic Differential Key Recovery Attacks and Beyond.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Generic attacks on small-state stream cipher constructions in the multi-user setting.
Cybersecur., December, 2023

Revisiting the Boomerang Attack from a Perspective of 3-differential.
IACR Cryptol. ePrint Arch., 2023

Revisiting the Differential Meet-In-The-Middle Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

Improving the Rectangle Attack on GIFT-64.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

Improved Boomerang Attacks on Deoxys-BC.
Proceedings of the Advances in Information and Computer Security, 2023

Improved Related-Key Rectangle Attack Against the Full AES-192.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Improved Differential Cryptanalysis on SPECK Using Plaintext Structures.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
New Properties of Double Boomerang Connectivity Table.
IACR Cryptol. ePrint Arch., 2022

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2020
Security Analysis of Subterranean 2.0.
IACR Cryptol. ePrint Arch., 2020

Improved Rectangle Attacks on SKINNY and CRAFT.
IACR Cryptol. ePrint Arch., 2020

TNT: How to Tweak a Block Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Boomerang Connectivity Table Revisited. Application to SKINNY and AES.
IACR Trans. Symmetric Cryptol., 2019

Comprehensive security analysis of CRAFT.
IACR Trans. Symmetric Cryptol., 2019

Boomerang Connectivity Table Revisited.
IACR Cryptol. ePrint Arch., 2019

Practical Collision Attacks against Round-Reduced SHA-3.
IACR Cryptol. ePrint Arch., 2019

2018
Key-Recovery Attacks on Full Kravatte.
IACR Trans. Symmetric Cryptol., 2018

Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Boomerang Connectivity Table: A New Cryptanalysis Tool.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper).
IACR Trans. Symmetric Cryptol., 2017

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.
Sci. China Inf. Sci., 2017

New Collision Attacks on Round-Reduced Keccak.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016

Related-Key Impossible Differential Analysis of Full Khudra.
Proceedings of the Advances in Information and Computer Security, 2016

Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Differential fault attack on Zorro block cipher.
Secur. Commun. Networks, 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

Improved Differential Analysis of Block Cipher PRIDE.
Proceedings of the Information Security Practice and Experience, 2015

2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014

Related-Key Differential Attack on Round Reduced RECTANGLE-80.
IACR Cryptol. ePrint Arch., 2014

Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014

Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Differential Fault Attack on the PRINCE Block Cipher.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher.
Proceedings of the Information Security Practice and Experience, 2013

Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013


  Loading...