What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bin Zhang
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
2022
journals/tosc
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a.
Zhaocun Zhou
Dengguo Feng
Bin Zhang
2021
journals/tosc
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
Andrea Caforio
Subhadeep Banik
Yosuke Todo
Willi Meier
Takanori Isobe
Fukang Liu
Bin Zhang
2021
journals/tosc
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks.
Xinxin Gong
Bin Zhang
2021
journals/tosc
Resistance of SNOW-V against Fast Correlation Attacks.
Xinxin Gong
Bin Zhang
2018
journals/joc
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking.
Bin Zhang
Chao Xu
Dengguo Feng
2018
conf/crypto
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
Yosuke Todo
Takanori Isobe
Willi Meier
Kazumaro Aoki
Bin Zhang
2018
conf/eurocrypt
Fast Near Collision Attack on the Grain v1 Stream Cipher.
Bin Zhang
Chao Xu
Willi Meier
2017
journals/tosc
Fast Correlation Attacks on Grain-like Small State Stream Ciphers.
Bin Zhang
Xinxin Gong
Willi Meier
2015
conf/ccs
A Single Query Forgery Attack on Raviyoyla v1.
Yuan Yao
Bin Zhang
Wenling Wu
2015
conf/crypto
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0.
Bin Zhang
Chao Xu
Willi Meier
2015
conf/asiacrypt
Another Tradeoff Attack on Sprout-Like Stream Ciphers.
Bin Zhang
Xinxin Gong
2014
conf/icics
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter.
Xiao Zhong
Mingsheng Wang
Bin Zhang
Shengbao Wu
2014
conf/sacrypt
Error-Tolerant Side-Channel Cube Attack Revisited.
Zhenqi Li
Bin Zhang
Arnab Roy
Junfeng Fan
2013
conf/fse
Near Collision Attack on the Grain v1 Stream Cipher.
Bin Zhang
Zhenqi Li
Dengguo Feng
Dongdai Lin
2013
conf/acisp
Cryptanalysis of Helix and Phelix Revisited.
Zhenqing Shi
Bin Zhang
Dengguo Feng
2013
conf/crypto
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract).
Bin Zhang
Chao Xu
Dengguo Feng
2013
conf/ches
A New Model for Error-Tolerant Side-Channel Cube Attacks.
Zhenqi Li
Bin Zhang
Junfeng Fan
Ingrid Verbauwhede
2013
conf/wisa
Some New Weaknesses in the RC4 Stream Cipher.
Jing Lv
Bin Zhang
Dongdai Lin
2012
conf/icisc
Cube Cryptanalysis of LBlock with Noisy Leakage.
Zhenqi Li
Bin Zhang
Yuan Yao
Dongdai Lin
2012
conf/icisc
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha.
Zhenqing Shi
Bin Zhang
Dengguo Feng
Wenling Wu
2012
conf/icics
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Zhenqi Li
Yao Lu
Wenhao Wang
Bin Zhang
Dongdai Lin
2012
conf/icics
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.
Zhenqi Li
Bin Zhang
Yao Lu
Jing Zou
Dongdai Lin
2011
conf/acns
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
Alex Biryukov
Ilya Kizhvatov
Bin Zhang
2010
conf/acns
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G<sup> (+) </sup>.
Alex Biryukov
Deike Priemuth-Schmid
Bin Zhang
2009
conf/sacrypt
New Cryptanalysis of Irregularly Decimated Stream Ciphers.
Bin Zhang
2008
conf/sacrypt
An Improved Fast Correlation Attack on Stream Ciphers.
Bin Zhang
Dengguo Feng
2006
conf/asiacrypt
New Guess-and-Determine Attack on the Self-Shrinking Generator.
Bin Zhang
Dengguo Feng
2006
conf/sacrypt
Multi-pass Fast Correlation Attack on Stream Ciphers.
Bin Zhang
Dengguo Feng
2005
conf/icisc
Weaknesses of COSvd (2, 128) Stream Cipher.
Bin Zhang
Hongjun Wu
Dengguo Feng
Hong Wang
2005
conf/ctrsa
A Fast Correlation Attack on the Shrinking Generator.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
2004
conf/acns
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
2004
conf/icics
Security Analysis of the Generalized Self-shrinking Generator.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
Coauthors
Alex Biryukov
(2)
Andrea Caforio
(1)
Arnab Roy
(1)
Bin Zhang
(32)
Chao Xu
(4)
Deike Priemuth-Schmid
(1)
Dengguo Feng
(13)
Dongdai Lin
(5)
Feng Bao
(3)
Fukang Liu
(1)
Hong Wang
(1)
Hongjun Wu
(4)
Ilya Kizhvatov
(1)
Ingrid Verbauwhede
(1)
Jing Lv
(1)
Jing Zou
(1)
Junfeng Fan
(2)
Kazumaro Aoki
(1)
Mingsheng Wang
(1)
Shengbao Wu
(1)
Subhadeep Banik
(1)
Takanori Isobe
(2)
Wenhao Wang
(1)
Wenling Wu
(2)
Willi Meier
(5)
Xiao Zhong
(1)
Xinxin Gong
(4)
Yao Lu
(2)
Yosuke Todo
(2)
Yuan Yao
(2)
Zhaocun Zhou
(1)
Zhenqi Li
(6)
Zhenqing Shi
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to