当前位置: X-MOL首页全球导师 国内导师 › 孙思维

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Bowen Liu, Pawel Szalachowski, Siwei Sun: Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. CoRR abs/2003.06127 (2020) Bowen Liu, Siwei Sun, Pawel Szalachowski: SMACS: Smart Contract Access Control Service. CoRR abs/2003.07495 (2020) Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang: Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020) Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu: Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits. IACR Trans. Symmetric Cryptol. 2019(1): 84-117 (2019) Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu: Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Trans. Symmetric Cryptol. 2019(4): 147-170 (2019) Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu: Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS. CRYPTO (2) 2019: 180-209 Chunpeng Ge, Siwei Sun, Pawel Szalachowski: Permission less Block chains and Secure Logging. IEEE ICBC 2019: 56-60 Qiu Chen, Danping Shi, Siwei Sun, Lei Hu: Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. ICICS 2019: 233-247 Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu: Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. ICICS 2019: 799-813 Jiahao Cai, Zihao Wei, Yingjie Zhang, Siwei Sun, Lei Hu: Zero-sum Distinguishers for Round-reduced GIMLI Permutation. ICISSP 2019: 38-43 Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun: StrongChain: Transparent and Collaborative Proof-of-Work Consensus. USENIX Security Symposium 2019: 819-836 Chunpeng Ge, Siwei Sun, Pawel Szalachowski: Permissionless Blockchains and Secure Logging. CoRR abs/1903.03954 (2019) Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun: StrongChain: Transparent and Collaborative Proof-of-Work Consensus. CoRR abs/1905.09655 (2019) Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu: Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit. IACR Cryptol. ePrint Arch. 2019: 107 (2019) Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu: Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. IACR Cryptol. ePrint Arch. 2019: 172 (2019) Zihao Wei, Siwei Sun, Lei Hu, Man Wei, Joan Boyar, René Peralta: Scrutinizing the Tower Field Implementation of the 픽28 Inverter - with Applications to AES, Camellia, and SM4. IACR Cryptol. ePrint Arch. 2019: 738 (2019) Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu: Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Cryptol. ePrint Arch. 2019: 1310 (2019) 2018 Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun: On the Complexity of Impossible Differential Cryptanalysis. Security and Communication Networks 2018: 7393401:1-7393401:11 (2018) Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018) Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. ASIACRYPT (2) 2018: 3-34 Yingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu:Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy. ISC 2018: 101-115 Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. IACR Cryptol. ePrint Arch. 2018: 813 (2018)2017 Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. Sci. China Inf. Sci. 60(3): 39101:1-39101:3 (2017) Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Trans. Symmetric Cryptol. 2017(1): 281-306 (2017) Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 162 (2017)2016 Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. FSE 2016: 268-288 Kexin Qiao, Lei Hu, Siwei Sun:Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques. ICISSP (Revised Selected Papers) 2016: 64-85 Kexin Qiao, Lei Hu, Siwei Sun:Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. ICISSP 2016: 74-84 Danping Shi, Lei Hu, Siwei Sun, Ling Song:Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. ICISSP 2016: 364-371 Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Related-Key Impossible Differential Analysis of Full Khudra. IWSEC 2016: 135-146 Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. NSS 2016: 398-411 Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher. IACR Cryptol. ePrint Arch. 2016: 84 (2016) Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu:Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or. IACR Cryptol. ePrint Arch. 2016: 338 (2016) Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck. IACR Cryptol. ePrint Arch. 2016: 407 (2016) 2015 Kexin Qiao, Lei Hu, Siwei Sun, Xiaoshuang Ma, Haibin Kan:Improved MILP Modeling for Automatic Security Evaluation and Application to FOX. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 72-80 (2015) Danping Shi, Lei Hu, Ling Song, Siwei Sun:Differential fault attack on Zorro block cipher. Security and Communication Networks 8(16): 2826-2835 (2015) Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:Improved Differential Analysis of Block Cipher PRIDE. ISPEC 2015: 209-219 Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan:Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. ISC 2015: 141-157 Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song:Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s. IWSEC 2015: 97-111 Zhengbang Zha, Lei Hu, Siwei Sun, Jinyong Shan:Further results on differentially 4-uniform permutations over F22m. CoRR abs/1502.03874 (2015) Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. IACR Cryptol. ePrint Arch. 2015: 122 (2015) Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Related-key Impossible Differential Analysis of Full Khudra. IACR Cryptol. ePrint Arch. 2015: 840 (2015) Kexin Qiao, Lei Hu, Siwei Sun:Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. IACR Cryptol. ePrint Arch. 2015: 902 (2015) Danping Shi, Lei Hu, Siwei Sun, Ling Song:Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN. IACR Cryptol. ePrint Arch. 2015: 964 (2015) 2014 Zhengbang Zha, Lei Hu, Siwei Sun, Yao Sun:New constructions of APN polynomial functions in odd characteristic. Appl. Algebra Eng. Commun. Comput. 25(4): 249-263 (2014) Zhengbang Zha, Lei Hu, Siwei Sun:Constructing new differentially 4-uniform permutations from the inverse function. Finite Fields Their Appl. 25: 64-78 (2014) Jun Xu, Lei Hu, Siwei Sun, Yonghong Xie:Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET Communications 8(12): 2142-2146 (2014) Jun Xu, Lei Hu, Siwei Sun:Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET Communications 8(14): 2433-2437 (2014) Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song:Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. ASIACRYPT (1) 2014: 158-178 Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:Error-Tolerant Algebraic Side-Channel Attacks Using BEE. ICICS 2014: 1-15 Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan:Tighter Security Bound of MIBS Block Cipher against Differential Attack. NSS 2014: 518-525 Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:Error-Tolerant Algebraic Side-Channel Attacks Using BEE. IACR Cryptol. ePrint Arch. 2014: 683 (2014) Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song:Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications. IACR Cryptol. ePrint Arch. 2014: 747 (2014) Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON. IACR Cryptol. ePrint Arch. 2014: 973 (2014) Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:Improved Differential Analysis of Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 978 (2014) Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma:Related-Key Differential Attack on Round Reduced RECTANGLE-80. IACR Cryptol. ePrint Arch. 2014: 986 (2014) 2013 Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks. Inscrypt 2013: 39-51 Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 547 (2013) Siwei Sun, Lei Hu, Peng Wang:Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others. IACR Cryptol. ePrint Arch. 2013: 676 (2013) 2012 Jun Xu, Lei Hu, Siwei Sun, Ping Wang:Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. CANS 2012: 32-42 Jun Xu, Lei Hu, Siwei Sun:Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem. ICICS 2012: 45-57 2011 Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng:Cube Cryptanalysis of Hitag2 Stream Cipher. CANS 2011: 15-25 2010 Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun:On the Kipnis-Shamir Method Solving the MinRank Problem. IWSEC (Short Papers) 2010: 1-13

学术兼职

1. 中国密码学会第四届理事会理事 2. 中国密码学会青年工作委员会委员

推荐链接
down
wechat
bug