Zhenzhen Bao

Orcid: 0000-0003-2839-6687

According to our database1, Zhenzhen Bao authored at least 34 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck.
IACR Cryptol. ePrint Arch., 2023

More Insight on Deep Learning-aided Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version).
IACR Cryptol. ePrint Arch., 2023

XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Differential-Linear Approximation Semi-unconstrained Searching and Partition Tree: Application to LEA and Speck.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers.
IACR Cryptol. ePrint Arch., 2022

Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings.
IACR Cryptol. ePrint Arch., 2022

Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Enhancing Differential-Neural Cryptanalysis.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing.
IACR Cryptol. ePrint Arch., 2021

Quantum Multi-Collision Distinguishers.
IACR Cryptol. ePrint Arch., 2021

Conditional Differential-Neural Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

2020
Extended Truncated-differential Distinguishers on Round-reduced AES.
IACR Trans. Symmetric Cryptol., 2020

Generic Attacks on Hash Combiners.
J. Cryptol., 2020

Optimizing Implementations of Linear Layers.
IACR Cryptol. ePrint Arch., 2020

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2020

WARP : Revisiting GFN for Lightweight 128-bit Block Cipher.
IACR Cryptol. ePrint Arch., 2020

TNT: How to Tweak a Block Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Trans. Symmetric Cryptol., 2019

SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Cryptol. ePrint Arch., 2019

Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes.
IACR Cryptol. ePrint Arch., 2019

Extended Expectation Cryptanalysis on Round-reduced AES.
IACR Cryptol. ePrint Arch., 2019

ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
IACR Cryptol. ePrint Arch., 2019

2018
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions.
IACR Cryptol. ePrint Arch., 2018

2017
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners.
IACR Cryptol. ePrint Arch., 2017

2016
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2016

An Algorithm for Counting the Number of 2<sup>n</sup>-Periodic Binary Sequences with Fixed k-Error Linear Complexity.
IACR Cryptol. ePrint Arch., 2016

The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity.
Proceedings of the Information Security Practice and Experience, 2016

The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT.
IACR Cryptol. ePrint Arch., 2015

Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers.
IACR Cryptol. ePrint Arch., 2015

RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms.
Sci. China Inf. Sci., 2015

2014
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms.
IACR Cryptol. ePrint Arch., 2014

Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014


  Loading...