default search action
Zejun Xiang 0001
Person information
- affiliation: Hubei University, Wuhan, China
- affiliation (former): State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Other persons with the same name
- Zejun Xiang 0002 — Chongqing University, Chongqing, China (and 1 more)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Ruolin Zhang, Zejun Xiang, Shasha Zhang, Xiangyong Zeng, Min Song:
Optimized SM4 Hardware Implementations for Low Area Consumption. IET Inf. Secur. 2024(1) (2024) - [j11]Zejun Xiang, Xiaoyu Wang, Bo Yu, Bing Sun, Shasha Zhang, Xiangyong Zeng, Xuan Shen, Nian Li:
Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2024(2): 296-321 (2024) - [c12]Mei Yan, Siwei Chen, Zejun Xiang, Shasha Zhang, Xiangyong Zeng:
A Novel Method for Finding Differential-Linear Distinguishers: Application to sfMidori64, sfCRAFT, and sfSkinny64. CANS (2) 2024: 215-239 - [c11]Bing Sun, Zejun Xiang, Zhengyi Dai, Guoqiang Liu, Xuan Shen, Longjiang Qu, Shaojing Fu:
Feistel-Like Structures Revisited: Classification and Cryptanalysis. CRYPTO (4) 2024: 275-304 - [c10]Yong Liu, Zejun Xiang, Shasha Zhang, Xiangyong Zeng:
MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128. ISC (1) 2024: 47-66 - [i12]Siwei Chen, Zejun Xiang, Xiangyong Zeng, Guangxue Qin:
Enhancing the MILP/MIQCP-based Automatic Search for Differential-Linear Distinguishers of Simon-Like Ciphers. CoRR abs/2408.01052 (2024) - [i11]Shengyuan Xu, Siwei Chen, Xiutao Feng, Zejun Xiang, Xiangyong Zeng:
Cryptanalysis of BAKSHEESH Block Cipher. IACR Cryptol. ePrint Arch. 2024: 1926 (2024) - 2023
- [j10]Da Lin, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang:
Quantum circuit implementations of SM4 block cipher based on different gate sets. Quantum Inf. Process. 22(7): 282 (2023) - [j9]Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, Xiangyong Zeng:
Optimized quantum implementation of AES. Quantum Inf. Process. 22(9): 352 (2023) - [j8]Da Lin, Bing Sun, Zejun Xiang, Jian Zou, Yunyu Guo:
Further insights on constructing quantum circuits for Camellia block cipher. Quantum Inf. Process. 22(12): 455 (2023) - [c9]Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng:
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials. ACNS (1) 2023: 119-148 - [c8]Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang:
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-Like Ciphers. CT-RSA 2023: 305-330 - [i10]Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng:
On the second-order zero differential spectra of some power functions over finite fields. CoRR abs/2310.18568 (2023) - [i9]Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, Xiangyong Zeng:
Optimized Quantum Implementation of AES. IACR Cryptol. ePrint Arch. 2023: 146 (2023) - [i8]Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang:
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers. IACR Cryptol. ePrint Arch. 2023: 178 (2023) - [i7]Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng:
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials. IACR Cryptol. ePrint Arch. 2023: 227 (2023) - 2022
- [j7]Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
Cube attacks on round-reduced MORUS and Gimli. Sci. China Inf. Sci. 65(1) (2022) - [j6]Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
On the bit-based division property of S-boxes. Sci. China Inf. Sci. 65(4) (2022) - [j5]Runqing Xu, Zejun Xiang, Da Lin, Shasha Zhang, Debiao He, Xiangyong Zeng:
High-throughput block cipher implementations with SIMD. J. Inf. Secur. Appl. 70: 103333 (2022) - [c7]Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
Conditional Cube Attacks on Full Members of KNOT-AEAD Family. ICICS 2022: 89-108 - 2021
- [j4]Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang:
Quantum implementation and resource estimates for Rectangle and Knot. Quantum Inf. Process. 20(12): 395 (2021) - [j3]Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
On the Relationships between Different Methods for Degree Evaluation. IACR Trans. Symmetric Cryptol. 2021(1): 411-442 (2021) - [c6]Chunlei Hong, Shasha Zhang, Siwei Chen, Da Lin, Zejun Xiang:
More Accurate Division Property Propagations Based on Optimized Implementations of Linear Layers. Inscrypt 2021: 212-232 - [c5]Da Lin, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
A Framework to Optimize Implementations of Matrices. CT-RSA 2021: 609-632 - [i6]Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
On the Relationships between Different Methods for Degree Evaluation (Full Version). IACR Cryptol. ePrint Arch. 2021: 175 (2021) - [i5]Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang:
Quantum Implementation and Resource Estimates for RECTANGLE and KNOT. IACR Cryptol. ePrint Arch. 2021: 982 (2021) - 2020
- [j2]Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang:
Optimizing Implementations of Linear Layers. IACR Trans. Symmetric Cryptol. 2020(2): 120-145 (2020) - [i4]Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang:
Optimizing Implementations of Linear Layers. IACR Cryptol. ePrint Arch. 2020: 903 (2020)
2010 – 2019
- 2019
- [j1]Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach. IACR Trans. Symmetric Cryptol. 2019(4): 438-469 (2019) - [i3]Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach. IACR Cryptol. ePrint Arch. 2019: 19 (2019) - 2018
- [c4]Shi Wang, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
Improved Integral Attacks on PRESENT-80. Inscrypt 2018: 163-182 - 2016
- [c3]Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. ASIACRYPT (1) 2016: 648-678 - [c2]Zejun Xiang, Wentao Zhang, Dongdai Lin:
On the Division Property of Simon48 and Simon64. IWSEC 2016: 147-163 - [i2]Zejun Xiang, Wentao Zhang, Dongdai Lin:
On the Division Property of SIMON48 and SIMON64. IACR Cryptol. ePrint Arch. 2016: 839 (2016) - [i1]Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2016: 857 (2016) - 2015
- [c1]Ling Cheng, Wentao Zhang, Zejun Xiang:
A New Cryptographic Analysis of 4-bit S-Boxes. Inscrypt 2015: 144-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint