Siwei Sun

Orcid: 0000-0002-3058-2377

According to our database1, Siwei Sun authored at least 91 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2024

2023
New cryptanalysis of LowMC with algebraic techniques.
Des. Codes Cryptogr., May, 2023

SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers.
IACR Trans. Symmetric Cryptol., 2023

Rotational Differential-Linear Cryptanalysis Revisited.
J. Cryptol., 2023

Searching the space of tower field implementations of the 픽<sub>2<sup>8</sup></sub> inverter - with applications to AES, Camellia and SM4.
Int. J. Inf. Comput. Secur., 2023

Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2023

A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH.
IACR Cryptol. ePrint Arch., 2023

SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper).
IACR Cryptol. ePrint Arch., 2023

Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY.
IACR Cryptol. ePrint Arch., 2023

General Results of Linear Approximations over Finite Abelian Groups.
IACR Cryptol. ePrint Arch., 2023

LOL: A Highly Flexible Framework for Designing Stream Ciphers.
IACR Cryptol. ePrint Arch., 2023

2022
Some efficient quantum circuit implementations of Camellia.
Quantum Inf. Process., 2022

New Properties of Double Boomerang Connectivity Table.
IACR Cryptol. ePrint Arch., 2022

XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022

LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022

Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.
IACR Cryptol. ePrint Arch., 2022

Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits.
IACR Cryptol. ePrint Arch., 2022

Improved MITM Cryptanalysis on Streebog.
IACR Cryptol. ePrint Arch., 2022

A small first-order DPA resistant AES implementation with no fresh randomness.
Sci. China Inf. Sci., 2022

2021
Motivators of Researchers' Knowledge Sharing and Community Promotion in Online Multi-Background Community.
Int. J. Knowl. Manag., 2021

Determine Factors of NFC Mobile Payment Continuous Adoption in Shopping Malls: Evidence From Indonesia.
Int. J. Bus. Intell. Res., 2021

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.
IACR Cryptol. ePrint Arch., 2021

Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette.
IACR Cryptol. ePrint Arch., 2021

A Note on the Bias of Rotational Differential-Linear Distinguishers.
IACR Cryptol. ePrint Arch., 2021

Massive Superpoly Recovery with Nested Monomial Predictions.
IACR Cryptol. ePrint Arch., 2021

Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials.
IACR Cryptol. ePrint Arch., 2021

Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.
IACR Cryptol. ePrint Arch., 2021

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021

Unbalanced sharing: a threshold implementation of SM4.
Sci. China Inf. Sci., 2021

Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
IACR Cryptol. ePrint Arch., 2020

Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions.
IACR Cryptol. ePrint Arch., 2020

Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.
IACR Cryptol. ePrint Arch., 2020

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2020

Consumer innovativeness, product innovation and smart toys.
Electron. Commer. Res. Appl., 2020

SMACS: Smart Contract Access Control Service.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Fail-safe Watchtowers and Short-lived Assertions for Payment Channels.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Quantum Circuit Implementations of AES with Fewer Qubits.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.
IACR Trans. Symmetric Cryptol., 2019

Acceptance of Information and Communication Technologies in Education: An Investigation Into University Students' Intentions to Use Mobile Educational Apps.
Int. J. Enterp. Inf. Syst., 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019

Lightweight Iterative MDS Matrices: How Small Can We Go?
IACR Cryptol. ePrint Arch., 2019

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit.
IACR Cryptol. ePrint Arch., 2019

Permissionless Blockchains and Secure Logging.
CoRR, 2019

StrongChain: Transparent and Collaborative Proof-of-Work Consensus.
Proceedings of the 28th USENIX Security Symposium, 2019

Zero-sum Distinguishers for Round-reduced GIMLI Permutation.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Convolutional Neural Network Based Side-Channel Attacks with Customized Filters.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Permission less Block chains and Secure Logging.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Fabrication of UTC-PDs Integrated with THz Antenna.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
Cryptanalysis of AES-PRF and Its Dual.
IACR Trans. Symmetric Cryptol., 2018

On the Complexity of Impossible Differential Cryptanalysis.
Secur. Commun. Networks, 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptol. ePrint Arch., 2018

Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy.
Proceedings of the Information Security - 21st International Conference, 2018

2017
Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Cryptol. ePrint Arch., 2017

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.
Sci. China Inf. Sci., 2017

2016
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016

MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016

Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016

Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques.
Proceedings of the Information Systems Security and Privacy, 2016

MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2015
Differential fault attack on Zorro block cipher.
Secur. Commun. Networks, 2015

Improved MILP Modeling for Automatic Security Evaluation and Application to FOX.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Related-key Impossible Differential Analysis of Full Khudra.
IACR Cryptol. ePrint Arch., 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015

Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN.
IACR Cryptol. ePrint Arch., 2015

Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.
IACR Cryptol. ePrint Arch., 2015

Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
CoRR, 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

2014
Cryptanalysis of countermeasures against multiple transmission attacks on NTRU.
IET Commun., 2014

Cryptanalysis of two cryptosystems based on multiple intractability assumptions.
IET Commun., 2014

Improved Differential Analysis of Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014

Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
IACR Cryptol. ePrint Arch., 2014

Related-Key Differential Attack on Round Reduced RECTANGLE-80.
IACR Cryptol. ePrint Arch., 2014

Constructing new differentially 4-uniform permutations from the inverse function.
Finite Fields Their Appl., 2014

New constructions of APN polynomial functions in odd characteristic.
Appl. Algebra Eng. Commun. Comput., 2014

Tighter Security Bound of MIBS Block Cipher against Differential Attack.
Proceedings of the Network and System Security - 8th International Conference, 2014

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
IACR Cryptol. ePrint Arch., 2013

Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks.
IACR Cryptol. ePrint Arch., 2013

2012
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Cube Cryptanalysis of Hitag2 Stream Cipher.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
On the Kipnis-Shamir Method Solving the MinRank Problem.
Proceedings of the Advances in Information and Computer Security, 2010


  Loading...