Ling Song
Jinan University
H-index: 21
Asia-China
Top articles of Ling Song
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond | Cryptology ePrint Archive | Ling Song Qianqian Yang Yincen Chen Lei Hu Jian Weng | 2024 |
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery | Journal of Cryptology | Qianqian Yang Ling Song Nana Zhang Danping Shi Libo Wang | 2024/4 |
CCA security for contracting (quasi-) Feistel constructions with tight round complexity | Designs, Codes and Cryptography | Chun Guo Ling Song | 2024/3/23 |
Boomerang Cryptanalysis | Symmetric Cryptography 2: Cryptanalysis and Future Directions | Ling SONG | 2024/1/5 |
Exploiting non-full key additions: full-fledged automatic Demirci-Selcuk meet-in-the-middle cryptanalysis of skinny | Danping Shi Siwei Sun Ling Song Lei Hu Qianqian Yang | 2023/4/15 | |
Improved Related-Key Rectangle Attack Against the Full AES-192 | Xuanyu Liang Yincen Chen Ling Song Qianqian Yang Zhuohui Feng | 2023/10/20 | |
Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies | Cryptology ePrint Archive | Qinggan Fu Ye Luo Qianqian Yang Ling Song | 2023 |
Generic attacks on small-state stream cipher constructions in the multi-user setting | Cybersecurity | Jianfu Huang Ye Luo Qinggan Fu Yincen Chen Chao Wang | 2023/10/8 |
Revisiting the Differential Meet-In-The-Middle Cryptanalysis | Cryptology ePrint Archive | Ling Song Qianqian Yang Huimin Liu | 2023 |
Improved Boomerang Attacks on Deoxys-BC | Jiahao Zhao Nana Zhang Qianqian Yang Ling Song Lei Hu | 2023/8/24 | |
Improving the Rectangle Attack on GIFT-64 | Yincen Chen Nana Zhang Xuanyu Liang Ling Song Qianqian Yang | 2023/8/14 | |
Improved differential cryptanalysis on speck using plaintext structures | Zhuohui Feng Ye Luo Chao Wang Qianqian Yang Zhiquan Liu | 2023/6/15 | |
Revisiting the Boomerang Attack from a Perspective of 3-differential | IEEE Transactions on Information Theory | Libo Wang Ling Song Baofeng Wu Mostafizar Rahman Takanori Isobe | 2023/10/23 |
Key structures: improved related-key boomerang attack against the full AES-256 | Jian Guo Ling Song Haoyang Wang | 2022/11/28 | |
New properties of the double boomerang connectivity table | IACR Transactions on Symmetric Cryptology | Qianqian Yang Ling Song Siwei Sun Danping Shi Lei Hu | 2022/12/7 |
Optimizing rectangle attacks: a unified and generic framework for key recovery | Ling Song Nana Zhang Qianqian Yang Danping Shi Jiahao Zhao | 2022/12/5 | |
Exploring SAT for cryptanalysis:(quantum) collision attacks against 6-round SHA-3 | Jian Guo Guozhen Liu Ling Song Yi Tu | 2022 | |
Security analysis of Subterranean 2.0 | Designs, Codes and Cryptography | Ling Song Yi Tu Danping Shi Lei Hu | 2021/8 |
Improved rectangle attacks on SKINNY and CRAFT | IACR Transactions on Symmetric Cryptology | Hosein Hadipour Nasour Bagheri Ling Song | 2021/6/11 |
TNT: how to tweak a block cipher | Zhenzhen Bao Chun Guo Jian Guo Ling Song | 2020/5/1 |