RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms W Zhang, Z Bao, D Lin, V Rijmen, B Yang, I Verbauwhede Cryptology ePrint Archive, 2014 | 521 | 2014 |
Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers Z Xiang, W Zhang, Z Bao, D Lin Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 340 | 2016 |
PHOTON-beetle authenticated encryption and hash family Z Bao, A Chakraborti, N Datta, J Guo, M Nandi, T Peyrin, K Yasuda NIST Lightweight Compet. Round 1, 115, 2019 | 62 | 2019 |
Optimizing implementations of linear layers Z Xiang, X Zeng, D Lin, Z Bao, S Zhang IACR Transactions on Symmetric Cryptology, 2020 | 60 | 2020 |
WARP: Revisiting GFN for lightweight 128-bit block cipher S Banik, Z Bao, T Isobe, H Kubo, F Liu, K Minematsu, K Sakamoto, ... Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021 | 52 | 2021 |
PEIGEN–a platform for evaluation, implementation, and generation of S-boxes Y Sasaki, S Ling, J Guo, Z Bao | 50 | 2019 |
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT W Zhang, Z Bao, V Rijmen, M Liu Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015 | 49 | 2015 |
Conditional Differential-Neural Cryptanalysis. Z Bao, J Guo, M Liu, L Ma, Y Tu IACR Cryptol. ePrint Arch. 2021, 719, 2021 | 38* | 2021 |
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 38 | 2021 |
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing Z Bao, J Guo, D Shi, Y Tu Annual International Cryptology Conference, 64-93, 2022 | 24* | 2022 |
ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption Z Bao, J Guo, T Iwata, K Minematsu IACR Transactions on Symmetric Cryptology, 1-54, 2019 | 23 | 2019 |
TNT: how to tweak a block cipher Z Bao, C Guo, J Guo, L Song Annual International Conference on the Theory and Applications of …, 2020 | 22 | 2020 |
KNOT: algorithm specifications and supporting document W Zhang, T Ding, B Yang, Z Bao, Z Xiang, F Ji, X Zhao Submission to NIST lightweight cryptography project, 2019 | 19 | 2019 |
Speeding up the search algorithm for the best differential and best linear trails Z Bao, W Zhang, D Lin International Conference on Information Security and Cryptology, 259-285, 2014 | 19 | 2014 |
Bitsliced implementations of the PRINCE, LED and RECTANGLE block ciphers on AVR 8-bit microcontrollers Z Bao, P Luo, D Lin Information and Communications Security: 17th International Conference …, 2016 | 18 | 2016 |
Improved meet-in-the-middle preimage attacks against AES hashing modes Z Bao, L Ding, J Guo, H Wang, W Zhang IACR Transactions on Symmetric Cryptology, 318-347, 2019 | 15 | 2019 |
Extended truncated-differential distinguishers on round-reduced AES Z Bao, J Guo, E List Cryptology ePrint Archive, 2019 | 14 | 2019 |
Functional graph revisited: Updates on (second) preimage attacks on hash combiners Z Bao, L Wang, J Guo, D Gu Annual International Cryptology Conference, 404-427, 2017 | 12 | 2017 |
Generic attacks on hash combiners Z Bao, I Dinur, J Guo, G Leurent, L Wang Journal of Cryptology 33 (3), 742-823, 2020 | 10 | 2020 |
Functional graphs and their applications in generic attacks on iterated hash constructions Z Bao, J Guo, L Wang Cryptology ePrint Archive, 2018 | 7 | 2018 |