Follow
Yonglin Hao
Yonglin Hao
State Key Laboratory of Cryptology
Verified email at sklc.org
Title
Cited by
Cited by
Year
Cube attacks on non-blackbox polynomials based on division property
Y Todo, T Isobe, Y Hao, W Meier
IEEE Transactions on Computers 67 (12), 1720-1736, 2018
1632018
Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead
Y Hao, G Leander, W Meier, Y Todo, Q Wang
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
105*2020
Improved division property based cube attacks exploiting algebraic properties of superpoly
Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang
IEEE Transactions on Computers 68 (10), 1470-1486, 2019
1042019
Stream cipher designs: a review
L Jiao, Y Hao, D Feng
Science China Information Sciences 63 (3), 131101, 2020
712020
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
L Grassi, Y Hao, C Rechberger, M Schofnegger, R Walch, Q Wang
Annual International Cryptology Conference, 573-606, 2023
522023
A guess-and-determine attack on SNOW-V stream cipher
L Jiao, Y Li, Y Hao
The Computer Journal 63 (12), 1789-1812, 2020
262020
A meet-in-the-middle attack on round-reduced mCrypton using the differential enumeration technique
Y Hao, D Bai, L Li
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
192014
A related-key chosen-IV distinguishing attack on full Sprout stream cipher
Y Hao
Cryptology ePrint Archive, 2015
182015
The boomerang attacks on BLAKE and BLAKE2
Y Hao
International Conference on Information Security and Cryptology, 286-310, 2014
182014
Links between division property and other cube attack variants
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
IACR Transactions on Symmetric Cryptology, 363-395, 2020
162020
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
H Yu, Y Hao, D Bai
Science China. Information Sciences 59 (5), 052110, 2016
132016
Observations on the dynamic cube attack of 855-round TRIVIUM from Crypto'18
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
Cryptology ePrint Archive, 2018
122018
Cube attacks on non-blackbox polynomials based on division property (full version)
Y Todo, T Isobe, Y Hao, W Meier
Cryptology ePrint Archive, 2017
82017
Improved division property based cube attacks exploiting algebraic properties of superpoly (full version)
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Cryptology ePrint Archive, 2017
72017
Truncated differential based known-key attacks on round-reduced SIMON
Y Hao, W Meier
Designs, Codes and Cryptography 83, 467-492, 2017
52017
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1. IET Information Security, 17
Y Xu, Y Hao, M Wang
4*2023
Improved guess‐and‐determine attack on TRIVIUM
L Jiao, Y Hao, Y Li
IET Information Security 13 (5), 411-419, 2019
42019
A Refinement of``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
X Fu, X Wang, X Dong, W Meier, Y Hao, B Zhao
Cryptology ePrint Archive, 2018
4*2018
Guess‐and‐determine attacks on PANAMA‐like stream ciphers
L Jiao, Y Li, Y Hao
IET Information Security 12 (6), 484-497, 2018
32018
Improved meet-in-the-middle attacks on round-reduced Crypton-256
Y Hao
Cryptology ePrint Archive, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20