Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections

    The optimization of traffic signal control has become a significant issue concerned by the whole society with the increasingly travel demands and the rise of vehicles on roadways. As one of the mature optimiza...

    Ziyan Qiao, Rui Sun, Shiyao Chen, Dong Zi in Intelligent Information Processing XI (2022)

  2. No Access

    Chapter and Conference Paper

    Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly \(\mathbb {F}_p\) -Based Ciphers

    The emergence of advanced cryptographic protocols has promoted the developments of many applications, such as secure multi-party computation (MPC). For this reason, new symmetric-key primitives have been desig...

    Zeyu Xu, Shiyao Chen, Meiqin Wang, Puwen Wei in Information Security and Privacy (2023)

  3. No Access

    Chapter and Conference Paper

    Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures

    With the urgency of the threat imposed by quantum computers, there is a strong interest in making the signature schemes quantum resistant. As the promising candidates to ensure post-quantum security, symmetric...

    Shiyao Chen, Chun Guo, Jian Guo, Li Liu in Information Security and Cryptology – ICIS… (2023)

  4. No Access

    Chapter and Conference Paper

    Diving Deep into the Preimage Security of AES-Like Hashing

    Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision attacks on hash functions. At Eurocrypt 2021, Bao et al. automated...

    Shiyao Chen, Jian Guo, Eik List, Dan** Shi in Advances in Cryptology – EUROCRYPT 2024 (2024)

  5. No Access

    Chapter and Conference Paper

    Full Round Distinguishing and Key-Recovery Attacks on SAND-2

    This paper presents full round distinguishing and key recovery attacks on lightweight block cipher SAND-2 with 64-bit block size and 128-bit key size, which appears to be a mixture of the AND-Rotation-XOR (AND...

    Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang in Information Security and Cryptology (2024)