default search action
Danping Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang:
Improved Linear Cryptanalysis of Block Cipher BORON. Comput. J. 67(1): 210-219 (2024) - [j11]Yin Lv, Danping Shi, Lei Hu, Yi Guo:
Utilizing FWT in linear cryptanalysis of block ciphers with various structures. Des. Codes Cryptogr. 92(11): 3813-3842 (2024) - [j10]Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. J. Cryptol. 37(2): 19 (2024) - [c16]Fangzhou Liu, Xueqi Zhu, Ruozhou Xu, Danping Shi, Peng Wang:
The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher. ACISP (1) 2024: 3-19 - [c15]Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-Like Hashing. EUROCRYPT (1) 2024: 398-426 - [i22]Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-like Hashing. IACR Cryptol. ePrint Arch. 2024: 300 (2024) - [i21]Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. IACR Cryptol. ePrint Arch. 2024: 1197 (2024) - 2023
- [j9]Yin Lv, Danping Shi, Yi Guo, Qiu Chen, Lei Hu, Zihui Guo:
Automatic Demirci-Selçuk Meet-In-The-Middle Attack On SIMON. Comput. J. 66(12): 3052-3068 (2023) - [c14]Yi Guo, Danping Shi, Lei Hu, Yin Lv:
Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra. Inscrypt (2) 2023: 153-171 - [c13]Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang:
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY. EUROCRYPT (4) 2023: 67-97 - [i20]Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang:
Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY. IACR Cryptol. ePrint Arch. 2023: 255 (2023) - 2022
- [j8]Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu:
New Properties of the Double Boomerang Connectivity Table. IACR Trans. Symmetric Cryptol. 2022(4): 208-242 (2022) - [c12]Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. ASIACRYPT (1) 2022: 410-440 - [c11]Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing. CRYPTO (1) 2022: 64-93 - [i19]Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. IACR Cryptol. ePrint Arch. 2022: 723 (2022) - [i18]Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu:
New Properties of Double Boomerang Connectivity Table. IACR Cryptol. ePrint Arch. 2022: 1579 (2022) - 2021
- [j7]Ling Song, Yi Tu, Danping Shi, Lei Hu:
Security analysis of Subterranean 2.0. Des. Codes Cryptogr. 89(8): 1875-1905 (2021) - [c10]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804 - [i17]Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing. IACR Cryptol. ePrint Arch. 2021: 575 (2021) - 2020
- [j6]Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Trans. Symmetric Cryptol. 2020(3): 119-151 (2020) - [j5]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2020(3): 152-174 (2020) - [c9]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. ASIACRYPT (2) 2020: 727-757 - [i16]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020) - [i15]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. IACR Cryptol. ePrint Arch. 2020: 1030 (2020) - [i14]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1045 (2020) - [i13]Ling Song, Yi Tu, Danping Shi, Lei Hu:
Security Analysis of Subterranean 2.0. IACR Cryptol. ePrint Arch. 2020: 1133 (2020) - [i12]Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Cryptol. ePrint Arch. 2020: 1177 (2020)
2010 – 2019
- 2019
- [j4]Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu:
Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Trans. Symmetric Cryptol. 2019(4): 147-170 (2019) - [c8]Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS. CRYPTO (2) 2019: 180-209 - [c7]Qiu Chen, Danping Shi, Siwei Sun, Lei Hu:
Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. ICICS 2019: 233-247 - [c6]Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu:
Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. ICICS 2019: 799-813 - [i11]Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. IACR Cryptol. ePrint Arch. 2019: 172 (2019) - [i10]Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu:
Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Cryptol. ePrint Arch. 2019: 1310 (2019) - 2018
- [j3]Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun:
On the Complexity of Impossible Differential Cryptanalysis. Secur. Commun. Networks 2018: 7393401:1-7393401:11 (2018) - [c5]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. ASIACRYPT (2) 2018: 3-34 - [c4]Ling Song, Jian Guo, Danping Shi, San Ling:
New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions. ASIACRYPT (2) 2018: 65-95 - [i9]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. IACR Cryptol. ePrint Arch. 2018: 813 (2018) - [i8]Dingfeng Ye, Danping Shi, Peng Wang:
Lightweight AE and HASH in a Single Round Function. IACR Cryptol. ePrint Arch. 2018: 1126 (2018) - 2017
- [j2]Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. Sci. China Inf. Sci. 60(3): 39101:1-39101:3 (2017) - [i7]Ling Song, Jian Guo, Danping Shi:
New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions. IACR Cryptol. ePrint Arch. 2017: 1030 (2017) - 2016
- [c3]Danping Shi, Lei Hu, Siwei Sun, Ling Song:
Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. ICISSP 2016: 364-371 - [i6]Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu:
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or. IACR Cryptol. ePrint Arch. 2016: 338 (2016) - 2015
- [j1]Danping Shi, Lei Hu, Ling Song, Siwei Sun:
Differential fault attack on Zorro block cipher. Secur. Commun. Networks 8(16): 2826-2835 (2015) - [i5]Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. IACR Cryptol. ePrint Arch. 2015: 122 (2015) - [i4]Danping Shi, Lei Hu, Siwei Sun, Ling Song:
Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN. IACR Cryptol. ePrint Arch. 2015: 964 (2015) - 2014
- [c2]Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:
Error-Tolerant Algebraic Side-Channel Attacks Using BEE. ICICS 2014: 1-15 - [c1]Ling Song, Lei Hu, Bingke Ma, Danping Shi:
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers. LightSec 2014: 140-151 - [i3]Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:
Error-Tolerant Algebraic Side-Channel Attacks Using BEE. IACR Cryptol. ePrint Arch. 2014: 683 (2014) - [i2]Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song:
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications. IACR Cryptol. ePrint Arch. 2014: 747 (2014) - [i1]Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON. IACR Cryptol. ePrint Arch. 2014: 973 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint