Near collision attack on the grain v1 stream cipher B Zhang, Z Li, D Feng, D Lin International Workshop on Fast Software Encryption, 518-538, 2013 | 37 | 2013 |
Cube cryptanalysis of LBlock with noisy leakage Z Li, B Zhang, Y Yao, D Lin International Conference on Information Security and Cryptology, 141-155, 2012 | 14 | 2012 |
A new model for error-tolerant side-channel cube attacks Z Li, B Zhang, J Fan, I Verbauwhede International Conference on Cryptographic Hardware and Embedded Systems, 453-470, 2013 | 12 | 2013 |
Improvement and analysis of VDP method in time/memory tradeoff applications W Wang, D Lin, Z Li, T Wang Information and Communications Security: 13th International Conference …, 2011 | 5 | 2011 |
Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords Z Jing, LIN Dongdai, HAO Chunhui, LI Zheuqi, W Wenhao, LU Yao Chinese Journal of Electronics 22 (4), 671-676, 2013 | 3 | 2013 |
Combined cache timing attacks and template attacks on stream cipher MUGI S Du, Z Li, B Zhang, D Lin International Conference on Information Security Practice and Experience …, 2015 | 2 | 2015 |
Error-Tolerant Side-Channel Cube Attack Revisited Z Li, B Zhang, A Roy, J Fan Selected Areas in Cryptography - SAC 2014 (to appear), 2014 | 2 | 2014 |
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack Z Li, Y Lu, W Wang, B Zhang, D Lin Information and Communications Security: 14th International Conference …, 2012 | 2 | 2012 |
Fault Attacks on Stream Cipher Scream S Du, B Zhang, Z Li, D Lin Information Security Practice and Experience: 11th International Conference …, 2015 | | 2015 |
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack Z Li, B Zhang, Y Lu, J Zou, D Lin Information and Communications Security: 14th International Conference …, 2012 | | 2012 |