发表论文
(1) Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Sel¸cuk Meet-in-the-Middle Cryptanalysis of SKINNY, 欧密 2023, 2023, 第 4 作者(2) Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 第 4 作者(3) Rotational Differential-Linear Cryptanalysis Revisited, Journal of Cryptology, 2023, 第 5 作者(4) New cryptanalysis of LowMC with algebraic techniques, DESIGNS CODES AND CRYPTOGRAPHY, 2023, 第 4 作者(5) A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT, COMPUTER JOURNAL, 2023, 第 4 作者(6) Automatic Demirci-Selçuk meet-in-the-middle attack on SIMON,, The Computer Journal, 2023, 第 4 作者(7) Revisiting Modular Inversion Hidden Number Problem and Its Applications, IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 第 3 作者(8) Improved linear cryptanalysis of block cipher BORON, The Computer Journal, 2023, 第 3 作者(9) Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra, The 19th International Conference on Information Security and Cryptology (Inscrypt 2023), 2023, 第 3 作者(10) A small first-order DPA resistant AES implementation with no fresh randomness, A small first-order DPA resistant AES implementation with no fresh randomness, SCIENCE CHINA-INFORMATION SCIENCES, 2022, 第 5 作者(11) Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery, Asiacrypt 2022, 亚密 2022, 2022, 第 6 作者(12) New Results of Breaking the CLS Scheme from ACM-CCS 2014, ICICS 2022, 2022, 第 4 作者(13) Inferring Sequences Produced by the Quadratic Generator, Inscrypt 2022, 2022, 第 3 作者(14) Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange, Asiacrypt 2022, 2022, 第 4 作者(15) Improved MITM Cryptanalysis on Streebog, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 第 5 作者(16) Quantum Attacks on PRFs Based on Public Random Permutations, Indocrypt 2022, 2022, 第 4 作者(17) Quantum attacks on Lai-Massey structure, PQCrypto 2022, 2022, 第 4 作者(18) improved zero knowledge proofs for commitments from learning parity with noise, TRUSTCOMM, 2022, 第 4 作者(19) Attack Beyond-Birthday-Bound MACs in Quantum Setting, PQCrypto 2021, 2021, 第 3 作者(20) Security analysis of Subterranean 2.0, DESIGNS CODES AND CRYPTOGRAPHY, 2021, 第 4 作者(21) Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials, Asiacrypt 2021, 2021, 第 1 作者(22) Camellia算法S盒的紧凑硬件实现, 密码学报, 2021, 第 1 作者(23) A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs, Asiacrypt 2021, 2021, 第 5 作者(24) A small first-order DPA resistant AES implementation with no fresh randomness, 2021, 第 1 作者(25) Simon量子算法攻击下的可调加密方案研究, 信息安全学报, 2021, 第 1 作者(26) Further results on optimal ternary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2021, 第 2 作者(27) Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials, ASIACRYPT 2021, 2021, (28) Integer LWE with Non-Subgaussian Error and Related Attacks, International Security Conference (ISC 2021), 2021, 第 4 作者(29) Unbalanced sharing:a threshold implementation of SM4, Unbalanced sharing: a threshold implementation of SM4, SCIENCE CHINA-INFORMATION SCIENCES, 2021, 第 4 作者(30) Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks, CRYPTO 2021, 2021, 第 1 作者(31) Cryptanalysis of elliptic curve hidden number problem from PKC 2017, DESIGNS CODES AND CRYPTOGRAPHY, 2020, 第 2 作者(32) Grain-v1快速相关攻击的改进, Improved Fast Correlation Attack on Grain-v1, 密码学报, 2020, 第 2 作者(33) Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories, 亚密 2020, 2020, 第 6 作者(34) Scrutinizing the Tower Field Implementation of the F(2^8) Inverter - with Applications to AES, Camellia, and SM4, International Journal of Information and Computer Security, 2020, 第 1 作者(35) Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 第 6 作者(36) Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions, ToSC 2020, IACR Transactions on Symmetric Cryptology (ToSC) (FSE 2020)), 2020, 第 1 作者(37) Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging, The 21st International Conference on Information and Communications Security (ICICS 2019), 2019, 第 4 作者(38) New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 第 3 作者(39) Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS, 美密 2019, 2019, 第 5 作者(40) Boomerang Connectivity Table Revisited Application to SKINNY and AES, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 第 3 作者(41) A smaller first-order DPA resistant AES implementation with no fresh randomness, SCIENCE CHINA Information Sciences, 2019, 第 1 作者(42) Constructions of Involutions Over Finite Fields, IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 第 4 作者(43) Convolutional Neural Network Based Side-Channel Attacks with Customized Filters, ICICS 2019, 2019, 第 5 作者(44) Lightweight Iterative MDS Matrices: How Small Can We Go?, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 第 5 作者(45) RSA变型方案小解密指数攻击的改进分析, Improved Analysis of Variant of RSA Scheme with Small Decryption Exponent, 密码学报, 2019, 第 3 作者(46) Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 第 3 作者(47) On the Complexity of Impossible Differential Cryptanalysis, SECURITY AND COMMUNICATION NETWORKS, 2018, 通讯作者(48) A Deterministic Algorithm for Computing Divisors in an Interval, INFORMATION SECURITY AND PRIVACY, 2018, 第 5 作者(49) New results on permutation polynomials of the form(x^{p^m}−x+δ)^s+ x^{p^m}+x over F_{p^{2m}}, Cryptography and Communications, 2018, 第 1 作者(50) Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints, 亚密 2018, 2018, 第 6 作者(51) A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties, A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties, JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 通讯作者(52) Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy, ISC 2018-The 21st Information Security Conference-ISC2018, 2018, 第 1 作者(53) Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator, DESIGNS CODES AND CRYPTOGRAPHY, 2018, 第 3 作者(54) Analysis of AES, SKINNY, and Others with Constraint Programming, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017, 第 7 作者(55) Cryptanalysis of Dual RSA, DESIGNS CODES AND CRYPTOGRAPHY, 2017, 第 2 作者(56) Further results on permutation trinomials over finite fields with even characteristic, FINITE FIELDS AND THEIR APPLICATIONS, 2017, 第 2 作者(57) Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator., Design, Codes Cryptography, 2017, 第 1 作者(58) Several Classes of Boolean Functions with Four-Valued Walsh Spectra, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 第 2 作者(59) 有限域上置换多项式的几种构造, Several Constructions of Permutation Polynomials over Finite Fields, 密码学报, 2017, 第 2 作者(60) Improved linear (hull) cryptanalysis of round-reduced versions of simon, SCIENCE CHINA-INFORMATION SCIENCES, 2017, 通讯作者(61) Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}}, Finite Fields and Their Applications, 2016, 第 1 作者(62) MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck, FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 第 5 作者(63) The weight distributions of two classes of binary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2015, 第 3 作者(64) Security of LBlock-s against Related-Key Differential Attack, 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, 第 2 作者(65) Improved MILP Modeling for Automatic Security Evaluation and Application to FOX, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, 第 2 作者(66) Differential fault attack on Zorro block cipher, SECURITY AND COMMUNICATION NETWORKS, 2015, 第 2 作者(67) Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 通讯作者(68) The weight distributions of a class of non-primitive cyclic codes with two nonzeros, SCIENCE CHINA-MATHEMATICS, 2015, 第 3 作者(69) Constructing permutations and complete permutations over finite fields via subfield-valued polynomials, FINITE FIELDS AND THEIR APPLICATIONS, 2015, 第 2 作者(70) The weight distribution of a family of p-ary cyclic codes, DESIGNS CODES AND CRYPTOGRAPHY, 2015, 第 4 作者(71) Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis, INFORMATION SECURITY, ISC 2015, 2015, 通讯作者(72) Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications, IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 第 2 作者(73) Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks, DESIGNS CODES AND CRYPTOGRAPHY, 2015, 第 5 作者(74) 19轮RECTANGLE-80的相关密钥差分分析, Related-Key Differential Attack on 19-Round Reduced RECTANGLE-80, 密码学报, 2015, 第 2 作者(75) Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH, DESIGNS CODES AND CRYPTOGRAPHY, 2014, 第 2 作者(76) New constructions of APN polynomial functions in odd characteristic, APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2014, 第 2 作者(77) Cryptanalysis of countermeasures against multiple transmission attacks on ntru, IET COMMUNICATIONS, 2014, 第 2 作者(78) Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者(79) Several classes of complete permutation polynomials, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 3 作者(80) A generic homomorphic MAC construction for authentication in network coding, SECURITY AND COMMUNICATION NETWORKS, 2014, 第 2 作者(81) The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs, IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 第 5 作者(82) Constructing new differentially 4-uniform permutations from the inverse function, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 2 作者(83) Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 第 2 作者(84) The weight distributions of two classes of p-ary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 3 作者(85) Constructing permutation polynomials from piecewise permutations, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 2 作者(86) Cryptanalysis of two cryptosystems based on multiple intractability assumptions, IET COMMUNICATIONS, 2014, 第 2 作者(87) Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher, CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 第 2 作者(88) 模背包向量问题的实际复杂度与基于格密码体制的实际安全性, 密码学报, 2014, 第 2 作者(89) Analysis of two public key cryptosystems based on randomized knapsack sequences∗, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者(90) CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 第 2 作者(91) Periods of polynomials over a Galois ring, SCIENCE CHINA-MATHEMATICS, 2013, 通讯作者(92) NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 第 4 作者(93) Analysis of two knapsack public key cryptosystems, IET COMMUNICATIONS, 2013, 第 2 作者(94) On a class of binomial bent functions over the finite fields of odd characteristic, APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 第 3 作者(95) Permutation polynomials with low differential uniformity over finite fields of odd characteristic, SCIENCE CHINA-MATHEMATICS, 2013, 第 5 作者(96) Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security, COMPUTERS AND MATHEMATICS WITH APPLICATIONS, 2012, 第 2 作者(97) A matrix construction of Boolean functions with maximum algebraic immunity, JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2012, 第 2 作者(98) A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions, FINITE FIELDS AND THEIR APPLICATIONS, 2012, 第 3 作者(99) A construction of hyperbent functions with polynomial trace form, SCIENCE CHINA-MATHEMATICS, 2011, 第 2 作者(100) Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure, Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure, 电子学报:英文版, 2011, (101) Construction of 1-resilient Boolean functions with optimum algebraic immunity, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 第 3 作者(102) 诚实发送者承诺与诚实接收者承诺电子与信息学报,, 电子与信息学报, 2011, 第 1 作者(103) Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n}, Appl. Algebra Eng. Commun. Comput., 2010, (104) An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model, 中国科学院研究生院学报, 2010, 第 1 作者(105) 从Σ-协议到公共参考串模型下可否认零知识的高效编译器, An efficient compiler from Σ-protocol to deniable zero knowledge in CRS model, 中国科学院研究生院学报, 2010, 第 2 作者(106) Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme, POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 第 3 作者(107) Two new families of optimal binary sequences obtained from quaternary sequences, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 3 作者(108) Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure, INFORMATION SECURITY APPLICATIONS, 2009, 第 2 作者(109) New optimal quadriphase sequences with larger linear span, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 2 作者(110) GMW sequences over Galois rings and their linear complexities, FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA, 2009, 第 1 作者(111) Period-Different m-Sequences With at Most Four-Valued Cross Correlation, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 2 作者(112) Further properties of several classes of Boolean functions with optimum algebraic immunity, DESIGNS CODES AND CRYPTOGRAPHY, 2009, 第 4 作者(113) Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, (114) 一种改进的WLAN与3GPP系统互连框架, An Improved WLAN and 3GPP System Interworking Network Architecture, 微电子学与计算机, 2008, 第 3 作者(115) 基于两族函数的低相关二元序列集构造, Construction for Families of Binary Sequences with Low Correlation Based on Two Families of Functions, 电子学报, 2007, 第 3 作者(116) 指数对的k阶自适应窗口表示算法, Adaptive k-Ary Window Expansion Algorithm for Pairs of Exponentiations, 电子学报, 2006, 第 2 作者(117) 一类零相关区序列集构造方法的改进, An Improved Method for Constructing ZCZ Sequence Sets, 电子学报, 2005, 第 3 作者(118) Weight Distribution of A p-ary Cyclic Code, 第 2 作者(119) Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$, 第 2 作者