Follow
Yonglin Hao
Yonglin Hao
State Key Laboratory of Cryptology
Verified email at sklc.org
Title
Cited by
Cited by
Year
Cube attacks on non-blackbox polynomials based on division property
Y Todo, T Isobe, Y Hao, W Meier
IEEE Transactions on Computers 67 (12), 1720-1736, 2018
1512018
Improved division property based cube attacks exploiting algebraic properties of superpoly
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Annual Cryptology Conference 2018 - CRYPTO 2018 1, 275-305, 2018
922018
Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead
Y Hao, G Leander, W Meier, Y Todo, Q Wang
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
88*2020
Stream cipher designs: a review
L Jiao, Y Hao, D Feng
Science China Information Sciences 63 (3), 131101, 2020
542020
Horst meets fluid-SPN: griffin for zero-knowledge applications
L Grassi, Y Hao, C Rechberger, M Schofnegger, R Walch, Q Wang
Cryptology ePrint Archive, 2022
322022
A guess-and-determine attack on SNOW-V stream cipher
L Jiao, Y Li, Y Hao
The Computer Journal 63 (12), 1789-1812, 2020
212020
A meet-in-the-middle attack on round-reduced mCrypton using the differential enumeration technique
Y Hao, D Bai, L Li
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
192014
A related-key chosen-IV distinguishing attack on full Sprout stream cipher
Y Hao
Cryptology ePrint Archive, 2015
182015
The boomerang attacks on BLAKE and BLAKE2
Y Hao
International Conference on Information Security and Cryptology, 286-310, 2014
172014
Links between division property and other cube attack variants
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
IACR Transactions on Symmetric Cryptology 2020 (1), 363-395, 2020
162020
Observations on the dynamic cube attack of 855-round TRIVIUM from Crypto'18
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
Cryptology ePrint Archive, 2018
122018
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
H Yu, Y Hao, D Bai
Science China. Information Sciences 59 (5), 052110, 2016
122016
Cube attacks on non-blackbox polynomials based on division property (full version)
Y Todo, T Isobe, Y Hao, W Meier
Cryptology ePrint Archive, 2017
82017
Improved division property based cube attacks exploiting algebraic properties of superpoly
Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang
IEEE Transactions on Computers 68 (10), 1470-1486, 2019
62019
Improved division property based cube attacks exploiting algebraic properties of superpoly (full version)
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Cryptology ePrint Archive, 2017
62017
Truncated differential based known-key attacks on round-reduced SIMON
Y Hao, W Meier
Designs, Codes and Cryptography 83, 467-492, 2017
52017
Improved guess‐and‐determine attack on TRIVIUM
L Jiao, Y Hao, Y Li
IET Information Security 13 (5), 411-419, 2019
42019
A Refinement of``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
X Fu, X Wang, X Dong, W Meier, Y Hao, B Zhao
Cryptology ePrint Archive, 2018
4*2018
Guess‐and‐determine attacks on PANAMA‐like stream ciphers
L Jiao, Y Li, Y Hao
IET Information Security 12 (6), 484-497, 2018
32018
Improved meet-in-the-middle attacks on round-reduced Crypton-256
Y Hao
Cryptology ePrint Archive, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20