基本信息

史丹萍  女    中国科学院信息工程研究所
电子邮件: shidanping@iie.ac.cn

研究领域

对称密码的设计与分析

招生信息

   
招生专业
083900-网络空间安全
070104-应用数学
0812Z1-信息安全
招生方向
分组密码
杂凑函数

专利与奖励

   
奖励信息
(1) 中国密码学会密码创新奖二等奖, 二等奖, 其他, 2022

出版信息

   
发表论文
[1] 史丹萍, 孙思维, Ling Song, Lei Hu, Qianqian Yang. Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Sel¸cuk Meet-in-the-Middle Cryptanalysis of SKINNY. 欧密 2023null. 2023, [2] Yin Lv, Danping Shi, Yi Guo, 胡磊, Zihui Guo, Caibing Wang. Automatic Demirci-Selçuk meet-in-the-middle attack on SIMON,. The Computer Journal[J]. 2023, [3] Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, 王彩冰. Improved linear cryptanalysis of block cipher BORON. The Computer Journal[J]. 2023, [4] Zhenzhen Bao, Jian Guo, 史丹萍, Yi Tu. Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing. 美密 2022null. 2022, [5] Ling Song, Nana Zhang, Qiaqian Yang, Danping Shi, Jiahao Zhao, 胡磊, Jian Weng. Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery, Asiacrypt 2022. 亚密 2022null. 2022, [6] Ling Song, Yi Tu, Danping Shi, Lei Hu. Security analysis of Subterranean 2.0. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2021, 89(8): 1875-1905, http://dx.doi.org/10.1007/s10623-021-00892-6.
[7] Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang. Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. 欧密2021[J]. 2021, 12696: 771-804., https://link.springer.com/chapter/10.1007/978-3-030-77870-5_27.
[8] Xiaoyang Dong, Sun Siwei, Danping Shi, fei gao, Xiaoyun Wang, Lei Hu. Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. 亚密 2020[J]. 2020, https://link.springer.com/chapter/10.1007/978-3-030-64834-3_25.
[9] Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang. Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2020, https://tosc.iacr.org/index.php/ToSC/article/view/8698.
[10] Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang. On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2020, https://doaj.org/article/4c20999bb57b4dc7b4e3693020ff0fb5.
[11] Qiu Chen, Danping Shi, Siwei Sun, Lei Hu. Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging. The 21st International Conference on Information and Communications Security (ICICS 2019)null. 2019, https://link.springer.com/chapter/10.1007/978-3-030-41579-2_14.
[12] Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu. Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. 美密 2019[J]. 2019, 11693: 180-209, https://link.springer.com/chapter/10.1007/978-3-030-26951-7_7.
[13] Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu. Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. ICICS 2019[J]. 2019, 11999: 799-813, https://link.springer.com/chapter/10.1007/978-3-030-41579-2_46.
[14] Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu. Lightweight Iterative MDS Matrices: How Small Can We Go?. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2019, 2019(4): 147-170, http://dx.doi.org/10.13154/tosc.v2019.i4.147-170.
[15] Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun. On the Complexity of Impossible Differential Cryptanalysis. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, https://www.hindawi.com/journals/scn/2018/7393401/.
[16] Song Ling, Jian Guo, 史丹萍, Ling San. New MILP Modeling: Improved Conditional Cube Attacks on Keccak-based Constructions. 亚密 2018[J]. 2018, [17] Danping Shi, Siwei Sun, Patrick Derbez, sasaki yu, bing sun, Lei Hu. Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints. 亚密 2018[J]. 2018, 11273: 3-34, https://link.springer.com/chapter/10.1007/978-3-030-03329-3_1.
[18] Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma. Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 60(3): http://www.corc.org.cn/handle/1471x/2376207.
[19] Danping Shi, Lei Hu, Ling Song, Siwei Sun. Differential fault attack on Zorro block cipher. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 8(16): 2826-2835, https://www.webofscience.com/wos/woscc/full-record/WOS:000363086500019.

科研活动