Shaozhen Chen

Orcid: 0000-0003-1015-8875

According to our database1, Shaozhen Chen authored at least 29 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A deep learning aided differential distinguisher improvement framework with more lightweight and universality.
Cybersecur., December, 2023

Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Practical Attacks of Round-Reduced SIMON Based on Deep Learning.
Comput. J., October, 2023

Improved neural distinguishers with multi-round and multi-splicing construction.
J. Inf. Secur. Appl., May, 2023

Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search.
IET Inf. Secur., May, 2023

Conditional differential analysis on the KATAN ciphers based on deep learning.
IET Inf. Secur., May, 2023

2022
DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V.
Sensors, 2022

Effective Network Parameter Reduction Schemes for Neural Distinguisher.
IACR Cryptol. ePrint Arch., 2022

Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC.
Comput. J., 2022

The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

2021
Improved meet-in-the-middle attacks on reduced-round Joltik-BC.
IET Inf. Secur., 2021

Improve Neural Distinguisher for Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning.
IACR Cryptol. ePrint Arch., 2021

2019
Cryptanalysis of Reduced-Round SPECK.
IEEE Access, 2019

Improved Integral Attack on Reduced-Round Simeck.
IEEE Access, 2019

2017
Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits.
Comput. J., 2017

Cryptanalysis of full PRIDE block cipher.
Sci. China Inf. Sci., 2017

2016
Security analysis of Khudra: a lightweight block cipher for FPGAs.
Secur. Commun. Networks, 2016

Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI.
IET Inf. Secur., 2016

Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family.
IACR Cryptol. ePrint Arch., 2016

Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Attribute-based signature for threshold predicates from lattices.
Secur. Commun. Networks, 2015

Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT.
KSII Trans. Internet Inf. Syst., 2015

A New Lattice-Based Threshold Attribute-Based Signature Scheme.
Proceedings of the Information Security Practice and Experience, 2015

2014
Multidimensional Zero-Correlation Linear Attacks on Reduced-Round MISTY1.
CoRR, 2014

Integral Cryptanalysis of the Block Cipher E2.
CoRR, 2014

2013
A compress slide attack on the full GOST block cipher.
Inf. Process. Lett., 2013

2010
Attribute-based ring signature scheme with constant-size signature.
IET Inf. Secur., 2010


  Loading...