Yafei Zheng

According to our database1, Yafei Zheng authored at least 17 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori.
Comput. J., February, 2024

2023
Cryptanalysis on Reduced-Round 3D and Saturnin.
Comput. J., April, 2023

Related-Cipher Attacks: Applications to Ballet and ANT.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
LLLWBC: A New Low-Latency Light-Weight Block Cipher.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2019
A Demand Forecasting Method Based on Stochastic Frontier Analysis and Model Average: An Application in Air Travel Demand Forecasting.
J. Syst. Sci. Complex., 2019

On the extension and security of key schedule of GOST.
IET Inf. Secur., 2019

New method to describe the differential distribution table for large S-boxes in MILP and its application.
IET Inf. Secur., 2019

The Relationship between the Construction and Solution of the MILP Models and Applications.
IACR Cryptol. ePrint Arch., 2019

2017
Remote Sensing Image Registration Based on Multifeature and Region Division.
IEEE Geosci. Remote. Sens. Lett., 2017

Remote Sensing Image Registration With Modified SIFT and Enhanced Feature Matching.
IEEE Geosci. Remote. Sens. Lett., 2017

Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers.
Proceedings of the Information Security - 20th International Conference, 2017

2016
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version).
IACR Cryptol. ePrint Arch., 2016

Collision Attacks on CAESAR Second-Round Candidate: ELmD.
Proceedings of the Information Security Practice and Experience, 2016

Security of SM4 Against (Related-Key) Differential Cryptanalysis.
Proceedings of the Information Security Practice and Experience, 2016

Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Biclique Attack of Block Cipher SKINNY.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015


  Loading...