Zhenqing Shi

According to our database1, Zhenqing Shi authored at least 5 papers between 2011 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Practical-time related-key attack on Hummingbird-2.
IET Inf. Secur., 2015

2013
Cryptanalysis of Helix and Phelix Revisited.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
On Guess and Determine Analysis of Rabbit.
Int. J. Found. Comput. Sci., 2011


  Loading...