Showing
1 - 11
results of
11
for search '
Xiaoyang Dong
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Xiaoyang Dong
Showing
1 - 11
results of
11
for search '
Xiaoyang Dong
'
, query time: 0.10s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
by
Xiaoyang
Dong
,
Xiaoyun Wang
Published 2016-12-01
Get full text
Article
2
MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC
by
Rui Zong
,
Xiaoyang
Dong
Published 2019-01-01
Get full text
Article
3
Conditional Cube Attack on Round-Reduced ASCON
by
Zheng Li
,
Xiaoyang
Dong
,
Xiaoyun Wang
Published 2017-03-01
Get full text
Article
4
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
by
Boxin Zhao
,
Xiaoyang
Dong
,
Keting Jia
Published 2019-09-01
Get full text
Article
5
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
by
Xiaoyang
Dong
,
Zheng Li
,
Xiaoyun Wang
,
Ling Qin
Published 2017-03-01
Get full text
Article
6
Differential Fault Attack on KASUMI Cipher Used in GSM Telephony
by
Zongyue Wang
,
Xiaoyang
Dong
,
Keting Jia
,
Jingyuan Zhao
Published 2014-01-01
Get full text
Article
7
(Quantum) Collision Attacks on Reduced Simpira v2
by
Boyu Ni
,
Xiaoyang
Dong
,
Keting Jia
,
Qidi You
Published 2021-06-01
Get full text
Article
8
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques
by
Zhihui Chu
,
Huaifeng Chen
,
Xiaoyun Wang
,
Xiaoyang
Dong
,
Lu Li
Published 2018-01-01
Get full text
Article
9
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule
by
Lingyue Qin
,
Xiaoyang
Dong
,
Xiaoyun Wang
,
Keting Jia
,
Yunwen Liu
Published 2021-06-01
Get full text
Article
10
New Conditional Cube Attack on Keccak Keyed Modes
by
Zheng Li
,
Xiaoyang
Dong
,
Wenquan Bi
,
Keting Jia
,
Xiaoyun Wang
,
Willi Meier
Published 2019-06-01
Get full text
Article
11
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128
by
Rui Zong
,
Xiaoyang
Dong
,
Huaifeng Chen
,
Yiyuan Luo
,
Si Wang
,
Zheng Li
Published 2021-03-01
Get full text
Article
Search Tools:
Get RSS Feed
—
Email this Search
Loading...