default search action
Bing Sun 0001
Person information
- affiliation: National University of Defense Technology, Department of Mathematics, Changsha, China
Other persons with the same name
- Bing Sun — disambiguation page
- Bing Sun 0002 — Beihang University, School of Electronic and Information Engineering, Beijing, China
- Bing Sun 0003 — Shanghai Maritime University, Laboratory of Underwater Vehicles and Intelligent Systems, Shanghai, China
- Bing Sun 0004 — National University of Defense Technology, College of Electronic Engineering, Hefei, China
- Bing Sun 0005 — Harbin Engineering University, School of Economics and Management, Harbin, China
- Bing Sun 0006 — Beijing Institute of Technology, School of Mathematics and Statistics, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu:
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. Comput. J. 67(2): 537-547 (2024) - [j26]Zejun Xiang, Xiaoyu Wang, Bo Yu, Bing Sun, Shasha Zhang, Xiangyong Zeng, Xuan Shen, Nian Li:
Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2024(2): 296-321 (2024) - [c19]Bing Sun, Zejun Xiang, Zhengyi Dai, Guoqiang Liu, Xuan Shen, Longjiang Qu, Shaojing Fu:
Feistel-Like Structures Revisited: Classification and Cryptanalysis. CRYPTO (4) 2024: 275-304 - 2023
- [j25]Tailin Niu, Kangquan Li, Longjiang Qu, Bing Sun:
More constructions of n-cycle permutations. Finite Fields Their Appl. 88: 102187 (2023) - [j24]Da Lin, Bing Sun, Zejun Xiang, Jian Zou, Yunyu Guo:
Further insights on constructing quantum circuits for Camellia block cipher. Quantum Inf. Process. 22(12): 455 (2023) - [j23]Jiajie Liu, Bing Sun, Guoqiang Liu, Xinfeng Dong, Li Liu, Hua Zhang, Chao Li:
New Wine Old Bottles: Feistel Structure Revised. IEEE Trans. Inf. Theory 69(3): 2000-2008 (2023) - 2022
- [j22]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved rotational-XOR cryptanalysis of Simon-like block ciphers. IET Inf. Secur. 16(4): 282-300 (2022) - [j21]Xuan Shen, Guoqiang Liu, Xiaofeng Wang, Bing Sun, Jun He:
Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(5): 390-400 (2022) - [i20]Jinyu Lu, Guoqiang Liu, Yunwen Liu, Bing Sun, Chao Li, Li Liu:
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK. CoRR abs/2201.03767 (2022) - [i19]Tailin Niu, Kangquan Li, Longjiang Qu, Bing Sun:
More constructions of n-cycle permutations. CoRR abs/2207.10491 (2022) - [i18]Jinyu Lu, Guoqiang Liu, Yunwen Liu, Bing Sun, Chao Li, Li Liu:
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK. IACR Cryptol. ePrint Arch. 2022: 30 (2022) - [i17]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. IACR Cryptol. ePrint Arch. 2022: 402 (2022) - 2021
- [j20]Xuan Shen, Lei Cheng, Bing Sun, Jun He:
Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures. Secur. Commun. Networks 2021: 5582711:1-5582711:10 (2021) - [j19]Bing Sun:
Provable Security Evaluation of Block Ciphers Against Demirci-Selçuk's Meet-in-the-Middle Attack. IEEE Trans. Inf. Theory 67(7): 4838-4844 (2021) - [j18]Bing Sun, Kangquan Li, Jian Guo, Longjiang Qu:
New Constructions of Complete Permutations. IEEE Trans. Inf. Theory 67(11): 7561-7567 (2021) - [c18]Yunxiao Yang, Xuan Shen, Bing Sun:
Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix. ISPEC 2021: 69-89 - 2020
- [j17]Yunwen Liu, Wenying Zhang, Bing Sun, Vincent Rijmen, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. Des. Codes Cryptogr. 88(11): 2289-2311 (2020) - [c17]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers. ACISP 2020: 105-124 - [i16]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 486 (2020)
2010 – 2019
- 2019
- [j16]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results About the Boomerang Uniformity of Permutation Polynomials. IEEE Trans. Inf. Theory 65(11): 7542-7553 (2019) - [c16]Wenqian Xin, Yunwen Liu, Bing Sun, Chao Li:
Improved Cryptanalysis on SipHash. CANS 2019: 61-79 - [i15]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. CoRR abs/1901.10999 (2019) - [i14]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. IACR Cryptol. ePrint Arch. 2019: 79 (2019) - 2018
- [c15]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. ASIACRYPT (2) 2018: 3-34 - [i13]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. IACR Cryptol. ePrint Arch. 2018: 813 (2018) - 2017
- [j15]Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang:
New observation on division property. Sci. China Inf. Sci. 60(9): 98102 (2017) - [j14]Lei Cheng, Bing Sun, Chao Li:
Revised cryptanalysis for SMS4. Sci. China Inf. Sci. 60(12): 122101 (2017) - [c14]Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao:
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers. ISPEC 2017: 237-255 - 2016
- [j13]Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu:
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys. IET Inf. Secur. 10(2): 95-103 (2016) - [c13]Xuan Shen, Guoqiang Liu, Bing Sun, Chao Li:
Impossible Differentials of SPN Ciphers. Inscrypt 2016: 47-63 - [c12]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-Like SPN Ciphers. CRYPTO (1) 2016: 605-624 - [c11]Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis. EUROCRYPT (1) 2016: 196-213 - [i12]Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2016: 96 (2016) - [i11]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-like SPN Ciphers. IACR Cryptol. ePrint Arch. 2016: 533 (2016) - 2015
- [j12]Guangyao Zhao, Ruilin Li, Lei Cheng, Chao Li, Bing Sun:
Differential fault analysis on LED using Super-Sbox. IET Inf. Secur. 9(4): 209-218 (2015) - [j11]Guangyao Zhao, Bing Sun, Chao Li, Jinshu Su:
Truncated differential cryptanalysis of PRINCE. Secur. Commun. Networks 8(16): 2875-2887 (2015) - [c10]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. CRYPTO (1) 2015: 95-115 - [i10]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 181 (2015) - [i9]Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang:
New Observation on Division Property. IACR Cryptol. ePrint Arch. 2015: 459 (2015) - 2013
- [j10]Ruilin Li, Chao Li, Jinshu Su, Bing Sun:
Security evaluation of MISTY structure with SPN round function. Comput. Math. Appl. 65(9): 1264-1279 (2013) - [j9]Ruilin Li, Jianxiong You, Bing Sun, Chao Li:
Fault analysis study of the block cipher FOX64. Multim. Tools Appl. 63(3): 691-708 (2013) - [c9]Ruilin Li, Heng Li, Chao Li, Bing Sun:
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones. FSE 2013: 485-501 - 2012
- [j8]Ruilin Li, Bing Sun, Chao Li, Shaojing Fu:
On Algebraic Property of T-Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 267-269 (2012) - 2011
- [j7]Shaojing Fu, Longjiang Qu, Chao Li, Bing Sun:
Balanced rotation symmetric boolean functions with maximum algebraic immunity. IET Inf. Secur. 5(2): 93-99 (2011) - [j6]Ruilin Li, Bing Sun, Chao Li:
Impossible differential cryptanalysis of SPN ciphers. IET Inf. Secur. 5(2): 111-120 (2011) - [j5]Ruilin Li, Bing Sun, Chao Li, Jianxiong You:
Differential Fault Analysis on SMS4 using a single fault. Inf. Process. Lett. 111(4): 156-163 (2011) - [j4]Shaojing Fu, Bing Sun, Chao Li, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. J. Inf. Sci. Eng. 27(6): 1931-1942 (2011) - [j3]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
Impossible differential cryptanalysis of 13-round CLEFIA-128. J. Syst. Softw. 84(7): 1191-1196 (2011) - [j2]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li, Juhua Yin:
A meet-in-the-middle attack on reduced-round ARIA. J. Syst. Softw. 84(10): 1685-1692 (2011) - [c8]Yuechuan Wei, Chao Li, Bing Sun:
Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0. WorldCIS 2011: 227-232 - 2010
- [j1]Bing Sun, Ruilin Li, Longjiang Qu, Chao Li:
SQUARE attack on block ciphers with low algebraic degree. Sci. China Inf. Sci. 53(10): 1988-1995 (2010) - [c7]Ruilin Li, Bing Sun, Chao Li, Longjiang Qu:
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. ACISP 2010: 1-18 - [c6]Yuechuan Wei, Ping Li, Bing Sun, Chao Li:
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. ACNS 2010: 105-122 - [i8]Ruilin Li, Bing Sun, Chao Li, Jianxiong You:
Differential Fault Analysis on SMS4 Using a Single Fault. IACR Cryptol. ePrint Arch. 2010: 63 (2010) - [i7]Jianxiong You, Ruilin Li, Bing Sun, Chao Li:
Improved Fault Attack on FOX. IACR Cryptol. ePrint Arch. 2010: 166 (2010) - [i6]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
A Meet-in-the-Middle Attack on ARIA. IACR Cryptol. ePrint Arch. 2010: 168 (2010) - [i5]Ruilin Li, Bing Sun, Chao Li:
Impossible Differential Cryptanalysis of SPN Ciphers. IACR Cryptol. ePrint Arch. 2010: 307 (2010) - [i4]Ruilin Li, Bing Sun, Chao Li:
Some Observations on MISTY Structure with SPN Round Function. IACR Cryptol. ePrint Arch. 2010: 661 (2010)
2000 – 2009
- 2009
- [c5]Peng Zhang, Bing Sun, Chao Li:
Saturation Attack on the Block Cipher HIGHT. CANS 2009: 76-86 - [c4]Ping Li, Bing Sun, Chao Li:
Integral Cryptanalysis of ARIA. Inscrypt 2009: 1-14 - [c3]Bing Sun, Longjiang Qu, Chao Li:
New Cryptanalysis of Block Ciphers with Low Algebraic Degree. FSE 2009: 180-192 - [i3]Ruilin Li, Bing Sun, Chao Li:
Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network. IACR Cryptol. ePrint Arch. 2009: 360 (2009) - [i2]Yuechuan Wei, Bing Sun, Chao Li:
New Integral Distinguisher for Rijndael-256. IACR Cryptol. ePrint Arch. 2009: 559 (2009) - 2008
- [c2]Chao Li, Shaojing Fu, Bing Sun:
Construction of Resilient Functions with Multiple Cryptographic Criteria. CANS 2008: 268-277 - [c1]Shaojing Fu, Chao Li, Bing Sun:
Enumeration of Homogeneous Rotation Symmetric Functions over Fp. CANS 2008: 278-284 - [i1]Ruilin Li, Bing Sun, Peng Zhang, Chao Li:
New Impossible Differential Cryptanalysis of ARIA. IACR Cryptol. ePrint Arch. 2008: 227 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint