Zhenzhen Bao
Cited by
Cited by
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
W Zhang, Z Bao, D Lin, V Rijmen, B Yang, I Verbauwhede
Cryptology ePrint Archive, 2014
Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
Z Xiang, W Zhang, Z Bao, D Lin
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms.
W Zhang, Z Bao, D Lin, V Rijmen, B Yang, I Verbauwhede
IACR Cryptol. ePrint Arch. 2014, 84, 2014
PHOTON-beetle authenticated encryption and hash family
Z Bao, A Chakraborti, N Datta, J Guo, M Nandi, T Peyrin, K Yasuda
NIST Lightweight Compet. Round 1, 115, 2019
Optimizing implementations of linear layers
Z Xiang, X Zeng, D Lin, Z Bao, S Zhang
IACR Transactions on Symmetric Cryptology, 2020
WARP: Revisiting GFN for lightweight 128-bit block cipher
S Banik, Z Bao, T Isobe, H Kubo, F Liu, K Minematsu, K Sakamoto, ...
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT
W Zhang, Z Bao, V Rijmen, M Liu
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
PEIGEN–a platform for evaluation, implementation, and generation of S-boxes
Y Sasaki, S Ling, J Guo, Z Bao
Conditional Differential-Neural Cryptanalysis.
Z Bao, J Guo, M Liu, L Ma, Y Tu
IACR Cryptol. ePrint Arch. 2021, 719, 2021
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
Z Bao, J Guo, D Shi, Y Tu
Annual International Cryptology Conference, 64-93, 2022
ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption
Z Bao, J Guo, T Iwata, K Minematsu
IACR Transactions on Symmetric Cryptology, 1-54, 2019
TNT: how to tweak a block cipher
Z Bao, C Guo, J Guo, L Song
Annual International Conference on the Theory and Applications of …, 2020
Speeding up the search algorithm for the best differential and best linear trails
Z Bao, W Zhang, D Lin
International Conference on Information Security and Cryptology, 259-285, 2014
KNOT: algorithm specifications and supporting document
W Zhang, T Ding, B Yang, Z Bao, Z Xiang, F Ji, X Zhao
Submission to NIST lightweight cryptography project, 2019
Bitsliced implementations of the PRINCE, LED and RECTANGLE block ciphers on AVR 8-bit microcontrollers
Z Bao, P Luo, D Lin
Information and Communications Security: 17th International Conference …, 2016
Extended truncated-differential distinguishers on round-reduced AES
Z Bao, J Guo, E List
Cryptology ePrint Archive, 2019
Improved meet-in-the-middle preimage attacks against AES hashing modes
Z Bao, L Ding, J Guo, H Wang, W Zhang
IACR Transactions on Symmetric Cryptology, 318-347, 2019
Functional graph revisited: Updates on (second) preimage attacks on hash combiners
Z Bao, L Wang, J Guo, D Gu
Annual International Cryptology Conference, 404-427, 2017
Generic attacks on hash combiners
Z Bao, I Dinur, J Guo, G Leurent, L Wang
Journal of Cryptology 33 (3), 742-823, 2020
The system can't perform the operation now. Try again later.
Articles 1–20