default search action
Zhenzhen Bao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm. ACISP (2) 2024: 24-43 - 2023
- [c16]Yi Chen, Zhenzhen Bao, Hongbo Yu:
Differential-Linear Approximation Semi-unconstrained Searching and Partition Tree: Application to LEA and Speck. ASIACRYPT (3) 2023: 223-255 - [c15]Zhenzhen Bao, Jinyu Lu, Yiran Yao, Liu Zhang:
More Insight on Deep Learning-Aided Cryptanalysis. ASIACRYPT (3) 2023: 436-467 - [c14]Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation. EUROCRYPT (4) 2023: 532-561 - [i23]Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version). IACR Cryptol. ePrint Arch. 2023: 253 (2023) - [i22]Zhenzhen Bao, Jinyu Lu, Yiran Yao, Liu Zhang:
More Insight on Deep Learning-aided Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 1391 (2023) - [i21]Yi Chen, Zhenzhen Bao, Hongbo Yu:
Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck. IACR Cryptol. ePrint Arch. 2023: 1414 (2023) - 2022
- [c13]Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Enhancing Differential-Neural Cryptanalysis. ASIACRYPT (1) 2022: 318-347 - [c12]Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing. CRYPTO (1) 2022: 64-93 - [c11]Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. NSS 2022: 687-711 - [i20]Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. IACR Cryptol. ePrint Arch. 2022: 1058 (2022) - [i19]Yi Chen, Zhenzhen Bao, Yantian Shen, Hongbo Yu:
A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers. IACR Cryptol. ePrint Arch. 2022: 1659 (2022) - 2021
- [c10]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804 - [i18]Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing. IACR Cryptol. ePrint Arch. 2021: 575 (2021) - [i17]Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Quantum Multi-Collision Distinguishers. IACR Cryptol. ePrint Arch. 2021: 703 (2021) - [i16]Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Conditional Differential-Neural Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 719 (2021) - 2020
- [j8]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. J. Cryptol. 33(3): 742-823 (2020) - [j7]Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang:
Optimizing Implementations of Linear Layers. IACR Trans. Symmetric Cryptol. 2020(2): 120-145 (2020) - [j6]Zhenzhen Bao, Jian Guo, Eik List:
Extended Truncated-differential Distinguishers on Round-reduced AES. IACR Trans. Symmetric Cryptol. 2020(3): 197-261 (2020) - [c9]Zhenzhen Bao, Chun Guo, Jian Guo, Ling Song:
TNT: How to Tweak a Block Cipher. EUROCRYPT (2) 2020: 641-673 - [c8]Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. SAC 2020: 535-564 - [i15]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020) - [i14]Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang:
Optimizing Implementations of Linear Layers. IACR Cryptol. ePrint Arch. 2020: 903 (2020) - [i13]Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher. IACR Cryptol. ePrint Arch. 2020: 1320 (2020)
2010 – 2019
- 2019
- [j5]Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Trans. Symmetric Cryptol. 2019(1): 330-394 (2019) - [j4]Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. IACR Trans. Symmetric Cryptol. 2019(2): 1-54 (2019) - [j3]Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang:
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. IACR Trans. Symmetric Cryptol. 2019(4): 318-347 (2019) - [i12]Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Cryptol. ePrint Arch. 2019: 209 (2019) - [i11]Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. IACR Cryptol. ePrint Arch. 2019: 600 (2019) - [i10]Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang:
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. IACR Cryptol. ePrint Arch. 2019: 607 (2019) - [i9]Zhenzhen Bao, Jian Guo, Eik List:
Extended Expectation Cryptanalysis on Round-reduced AES. IACR Cryptol. ePrint Arch. 2019: 622 (2019) - [i8]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2019: 755 (2019) - 2018
- [j2]Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Trans. Symmetric Cryptol. 2018(1): 201-253 (2018) - [i7]Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Cryptol. ePrint Arch. 2018: 374 (2018) - 2017
- [c7]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. CRYPTO (2) 2017: 404-427 - [i6]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2017: 534 (2017) - 2016
- [c6]Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. ASIACRYPT (1) 2016: 648-678 - [c5]Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. ICICS 2016: 107-123 - [c4]Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. ISPEC 2016: 13-36 - [i5]Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2016: 857 (2016) - [i4]Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
An Algorithm for Counting the Number of 2n-Periodic Binary Sequences with Fixed k-Error Linear Complexity. IACR Cryptol. ePrint Arch. 2016: 1025 (2016) - 2015
- [j1]Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede:
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12): 1-15 (2015) - [c3]Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. FSE 2015: 494-515 - [c2]Zhenzhen Bao, Peng Luo, Dongdai Lin:
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. ICICS 2015: 18-36 - [i3]Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT. IACR Cryptol. ePrint Arch. 2015: 433 (2015) - [i2]Zhenzhen Bao, Peng Luo, Dongdai Lin:
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers. IACR Cryptol. ePrint Arch. 2015: 1118 (2015) - 2014
- [c1]Zhenzhen Bao, Wentao Zhang, Dongdai Lin:
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails. Inscrypt 2014: 259-285 - [i1]Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede:
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms. IACR Cryptol. ePrint Arch. 2014: 84 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint