Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 163 | 2018 |
Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead Y Hao, G Leander, W Meier, Y Todo, Q Wang Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 105* | 2020 |
Improved division property based cube attacks exploiting algebraic properties of superpoly Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang IEEE Transactions on Computers 68 (10), 1470-1486, 2019 | 104 | 2019 |
Stream cipher designs: a review L Jiao, Y Hao, D Feng Science China Information Sciences 63 (3), 131101, 2020 | 71 | 2020 |
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications L Grassi, Y Hao, C Rechberger, M Schofnegger, R Walch, Q Wang Annual International Cryptology Conference, 573-606, 2023 | 52 | 2023 |
A guess-and-determine attack on SNOW-V stream cipher L Jiao, Y Li, Y Hao The Computer Journal 63 (12), 1789-1812, 2020 | 26 | 2020 |
A meet-in-the-middle attack on round-reduced mCrypton using the differential enumeration technique Y Hao, D Bai, L Li Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 19 | 2014 |
A related-key chosen-IV distinguishing attack on full Sprout stream cipher Y Hao Cryptology ePrint Archive, 2015 | 18 | 2015 |
The boomerang attacks on BLAKE and BLAKE2 Y Hao International Conference on Information Security and Cryptology, 286-310, 2014 | 18 | 2014 |
Links between division property and other cube attack variants Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang IACR Transactions on Symmetric Cryptology, 363-395, 2020 | 16 | 2020 |
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack H Yu, Y Hao, D Bai Science China. Information Sciences 59 (5), 052110, 2016 | 13 | 2016 |
Observations on the dynamic cube attack of 855-round TRIVIUM from Crypto'18 Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang Cryptology ePrint Archive, 2018 | 12 | 2018 |
Cube attacks on non-blackbox polynomials based on division property (full version) Y Todo, T Isobe, Y Hao, W Meier Cryptology ePrint Archive, 2017 | 8 | 2017 |
Improved division property based cube attacks exploiting algebraic properties of superpoly (full version) Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier Cryptology ePrint Archive, 2017 | 7 | 2017 |
Truncated differential based known-key attacks on round-reduced SIMON Y Hao, W Meier Designs, Codes and Cryptography 83, 467-492, 2017 | 5 | 2017 |
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1. IET Information Security, 17 Y Xu, Y Hao, M Wang | 4* | 2023 |
Improved guess‐and‐determine attack on TRIVIUM L Jiao, Y Hao, Y Li IET Information Security 13 (5), 411-419, 2019 | 4 | 2019 |
A Refinement of``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018 X Fu, X Wang, X Dong, W Meier, Y Hao, B Zhao Cryptology ePrint Archive, 2018 | 4* | 2018 |
Guess‐and‐determine attacks on PANAMA‐like stream ciphers L Jiao, Y Li, Y Hao IET Information Security 12 (6), 484-497, 2018 | 3 | 2018 |
Improved meet-in-the-middle attacks on round-reduced Crypton-256 Y Hao Cryptology ePrint Archive, 2016 | 3 | 2016 |