Zejun Xiang

Orcid: 0000-0002-5149-5133

Affiliations:
  • Hubei University, Wuhan, China
  • State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China (former)


According to our database1, Zejun Xiang authored at least 22 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Further insights on constructing quantum circuits for Camellia block cipher.
Quantum Inf. Process., December, 2023

Quantum circuit implementations of SM4 block cipher based on different gate sets.
Quantum Inf. Process., July, 2023

A Novel Automatic Technique Based on MILP to Search for Impossible Differentials.
IACR Cryptol. ePrint Arch., 2023

Optimized Quantum Implementation of AES.
IACR Cryptol. ePrint Arch., 2023

Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers.
IACR Cryptol. ePrint Arch., 2023

On the second-order zero differential spectra of some power functions over finite fields.
CoRR, 2023

2022
High-throughput block cipher implementations with SIMD.
J. Inf. Secur. Appl., 2022

On the bit-based division property of S-boxes.
Sci. China Inf. Sci., 2022

Cube attacks on round-reduced MORUS and Gimli.
Sci. China Inf. Sci., 2022

Conditional Cube Attacks on Full Members of KNOT-AEAD Family.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
On the Relationships between Different Methods for Degree Evaluation.
IACR Trans. Symmetric Cryptol., 2021

On the Relationships between Different Methods for Degree Evaluation (Full Version).
IACR Cryptol. ePrint Arch., 2021

Quantum Implementation and Resource Estimates for RECTANGLE and KNOT.
IACR Cryptol. ePrint Arch., 2021

A Framework to Optimize Implementations of Matrices.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

More Accurate Division Property Propagations Based on Optimized Implementations of Linear Layers.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Optimizing Implementations of Linear Layers.
IACR Cryptol. ePrint Arch., 2020

2019
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach.
IACR Trans. Symmetric Cryptol., 2019

Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach.
IACR Cryptol. ePrint Arch., 2019

2018
Improved Integral Attacks on PRESENT-80.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2016
On the Division Property of SIMON48 and SIMON64.
IACR Cryptol. ePrint Arch., 2016

Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2016

2015
A New Cryptographic Analysis of 4-bit S-Boxes.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015


  Loading...