Yonglin Hao

Orcid: 0000-0003-4069-2438

According to our database1, Yonglin Hao authored at least 39 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Quantum Attacks on Sum of Even-Mansour Construction Utilizing Online Classical Queries.
IACR Cryptol. ePrint Arch., 2025

Conditional Constant Function Problem and Its Quantum Solutions: Attacking Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2025

Breaking The Authenticated Encryption scheme HiAE.
IACR Cryptol. ePrint Arch., 2025

Persistence of Hourglass(-like) Structure: Improved Differential-Linear Distinguishers for Several ARX Ciphers.
IACR Cryptol. ePrint Arch., 2025

SCMAC and LOL2.0: An AEAD Design Framework and A New Version of LOL Stream Cipher Design Framework.
IACR Cryptol. ePrint Arch., 2025

2024
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA.
IET Inf. Secur., 2024

A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods.
IACR Cryptol. ePrint Arch., 2024

LOL: a highly flexible framework for designing stream ciphers.
Sci. China Inf. Sci., 2024

2023
Guess-and-determine attacks on SNOW-Vi stream cipher.
Des. Codes Cryptogr., May, 2023

Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1.
IACR Cryptol. ePrint Arch., 2023

Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE.
IACR Cryptol. ePrint Arch., 2023

Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW.
IACR Cryptol. ePrint Arch., 2023

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Key Filtering in Cube Attacks from the Implementation Aspect.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
IACR Cryptol. ePrint Arch., 2022

2021
FAN: A Lightweight Authenticated Cryptographic Algorithm.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Links between Division Property and Other Cube Attack Variants.
IACR Trans. Symmetric Cryptol., 2020

Modeling for Three-Subset Division Property without Unknown Subset.
IACR Cryptol. ePrint Arch., 2020

A Guess-And-Determine Attack On SNOW-V Stream Cipher.
Comput. J., 2020

Stream cipher designs: a review.
Sci. China Inf. Sci., 2020

Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019

Improved guess-and-determine attack on TRIVIUM.
IET Inf. Secur., 2019

2018
Guess-and-determine attacks on PANAMA-like stream ciphers.
IET Inf. Secur., 2018

Improved integral attacks without full codebook.
IET Inf. Secur., 2018

Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
IACR Cryptol. ePrint Arch., 2018

A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018.
IACR Cryptol. ePrint Arch., 2018

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Cube Attacks on Non-Blackbox Polynomials Based on Division Property.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Cryptanalysis of the LSH hash functions.
Secur. Commun. Networks, 2016

Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers.
IET Inf. Secur., 2016

Truncated Differential Based Known-Key Attacks on Round-Reduced Simon.
IACR Cryptol. ePrint Arch., 2016

Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256.
IACR Cryptol. ePrint Arch., 2016

Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack.
Sci. China Inf. Sci., 2016

2015
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher.
IACR Cryptol. ePrint Arch., 2015

2014
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.
Proceedings of the Network and System Security - 8th International Conference, 2014

The Boomerang Attacks on BLAKE and BLAKE2.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
A Meet-in-the-middle Attack on Round-Reduced mCrypton.
IACR Cryptol. ePrint Arch., 2013


  Loading...