New attacks on LowMC instances with a single plaintext/ciphertext pair S Banik, K Barooti, S Vaudenay, H Yan Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 19 | 2021 |
Transposition of AES key schedule J Huang, H Yan, X Lai Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017 | 16 | 2017 |
New zero‐sum distinguishers on full 24‐round Keccak ‐f using the division property H Yan, X Lai, L Wang, Y Yu, Y Xing IET Information Security 13 (5), 469-478, 2019 | 14 | 2019 |
Meet-in-the-middle preimage attacks on sponge-based hashing L Qin, J Hua, X Dong, H Yan, X Wang Annual International Conference on the Theory and Applications of …, 2023 | 13 | 2023 |
Symmetric asynchronous ratcheted communication with associated data H Yan, S Vaudenay Advances in Information and Computer Security: 15th International Workshop …, 2020 | 8 | 2020 |
Security evaluation and improvement of a white-box SMS4 implementation based on affine equivalence algorithm T Lin, H Yan, X Lai, Y Zhong, Y Jia The Computer Journal 61 (12), 1783-1790, 2018 | 8 | 2018 |
Secure key-alternating Feistel ciphers without key schedule Y Shen, H Yan, L Wang, X Lai Science China Information Sciences 64, 1-3, 2021 | 5 | 2021 |
New observation on the key schedule of RECTANGLE H Yan, Y Luo, M Chen, X Lai Science China Information Sciences 62, 1-13, 2019 | 5 | 2019 |
Optimal Symmetric Ratcheting for Secure Communication H Yan, S Vaudenay, D Collins, A Caforio The Computer Journal 66 (4), 987-1016, 2023 | 2 | 2023 |
Tweaking Key-Alternating Feistel Block Ciphers H Yan, L Wang, Y Shen, X Lai International Conference on Applied Cryptography and Network Security, 69-88, 2020 | 2 | 2020 |
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks Z Xu, L Wang, Y Luo, Y Long, K Zhang, H Yan, K Chen IEEE Internet of Things Journal, 2023 | 1 | 2023 |
Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud T Wu, X Ma, H Yan Electronics 12 (23), 4798, 2023 | 1 | 2023 |
New cryptanalysis of LowMC with algebraic techniques W Qiao, H Yan, S Sun, L Hu, J Jing Designs, Codes and Cryptography 91 (5), 2057-2075, 2023 | 1 | 2023 |
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3 S Sun, T Liu, Z Guan, Y He, J Jing, L Hu, Z Zhang, H Yan Cryptology ePrint Archive, 2022 | 1 | 2022 |
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3 S Sun, T Liu, Z Guan, Y He, J Jing, L Hu, Z Zhang, H Yan Cryptology ePrint Archive, 2022 | 1 | 2022 |
Several methods for constructing white-box solutions T Lin, H Yan, X Lai, W Qiu Journal of Physics: Conference Series 1288 (1), 012005, 2019 | 1 | 2019 |
Revisit and Cryptanalysis of a CAST Cipher X Zhou, J Li, X Lai, H Yan DEStech Transactions on Computer Science and Engineering, 0 | 1 | |
General Results of Linear Approximations over Finite Abelian Groups Z Niu, S Sun, H Yan, Q Wang Cryptology ePrint Archive, 2023 | | 2023 |
New Observation on Division Property: Simplifying Models of Basic Operations and Modeling Modular Multiplication Operation Y Xing, H Yan, X Lai Proceedings of the 2nd International Conference on Computer Science and …, 2018 | | 2018 |
Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher X Zhang, Y Shen, H Yan, Y Zou, M Wan, Z Wu, L Wang Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018 | | 2018 |