Skip to main content

and
  1. No Access

    Article

    Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW

    The Mixed Integer Linear Programming (MILP) technique has been widely applied in the realm of symmetric-key cryptanalysis. In this paper, we propose a new bitwise breakdown MILP modeling strategy for describin...

    **nxin Gong, Yonglin Hao, Qingju Wang in Designs, Codes and Cryptography (2024)

  2. No Access

    Article

    Guess-and-determine attacks on SNOW-Vi stream cipher

    Recently, a faster variant of SNOW-V, called SNOW-Vi, was proposed for fast enough performance not only in cloud settings but also on low grade CPUs, in response to the requirements of confidentiality and inte...

    Lin Jiao, Yonglin Hao, Yongqiang Li in Designs, Codes and Cryptography (2023)

  3. No Access

    Article

    Modeling for Three-Subset Division Property without Unknown Subset

    A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application to stream ciphers, ...

    Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang in Journal of Cryptology (2021)

  4. No Access

    Article

    Stream cipher designs: a review

    Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advantages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or ...

    Lin Jiao, Yonglin Hao, Dengguo Feng in Science China Information Sciences (2020)

  5. No Access

    Article

    Truncated differential based known-key attacks on round-reduced SIMON

    At Crypto 2015, Blondeau, Peyrin and Wang proposed a truncated-differential-based known-key attack on full PRESENT, a nibble oriented lightweight block cipher with an SPN structure. The truncated difference th...

    Yonglin Hao, Willi Meier in Designs, Codes and Cryptography (2017)

  6. No Access

    Article

    Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack

    For an n-bit random permutation, there are three types of boomerang distinguishers, denoted as Type I, II and III, with generic complexities 2 n , 2 ...

    Hongbo Yu, Yonglin Hao, Dongxia Bai in Science China Information Sciences (2016)