default search action
Tian Tian 0004
Person information
- affiliation: Information Engineering University, Zhengzhou, China
- affiliation: National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China
- affiliation (PhD 2010): Zhengzhou Information Science and Technology Institute, Department of Applied Mathematics, China
Other persons with the same name
- Tian Tian — disambiguation page
- Tian Tian 0001 — RealAI, Beijing, China (and 1 more)
- Tian Tian 0002 — New Jersey Institute of Technology, NJ, USA
- Tian Tian 0003 — Dongbei University of Finance and Economics, School of Management Science and Engineering, Dalian, China
- Tian Tian 0005 — University of Sorbonne Nouvelle Paris 3, LaTTiCe, France
Other persons with a similar name
- Tianyou Chai (aka: Tian-you Chai, Tian-You Chai) — Northeastern University, Key Laboratory of Process Industry Automation, Shenyang, China
- Tian He 0001 — Southeast University, School of Computer Science and Engineering, Nanjing, China (and 2 more)
- Tian Lan — disambiguation page
- Ye Tian — disambiguation page
- Yu Tian — disambiguation page
- Jie Tian 0001 — Chinese Academy of Sciences, Institute of Automation, Beijing, China (and 3 more)
- Qi Tian 0001 — Huawei Noah's Ark Lab (and 5 more)
- Yonghong Tian 0001 — Peking University, Beijing, School of Electronics Engineering and Computer Science, National Engineering Laboratory for Video Technology, China (and 2 more)
- Hui Tian 0003 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Tian Wang 0001 — Beijing Normal University, BNU-UIC Institute of Artificial Intelligence and Future Networks, Zhuhai, China (and 2 more)
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Cheng Che, Tian Tian:
Further Results on Affine Sub-Families of NFSR Sequences. Cryptogr. Commun. 16(2): 309-321 (2024) - [j47]Xiao-Juan Wang, Tian Tian, Wen-Feng Qi:
GL-S-NFSR: A new NFSR structure and its period properties. Cryptogr. Commun. 16(4): 679-698 (2024) - [j46]Yinuo Liu, Jing Yang, Tian Tian:
Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G. IACR Trans. Symmetric Cryptol. 2024(2): 141-165 (2024) - [j45]Chen Liu, Tian Tian:
Dynamic Cube Attacks against Grain-128AEAD. IACR Trans. Symmetric Cryptol. 2024(2): 190-221 (2024) - 2023
- [j44]Xiaofeng Xie, Tian Tian:
Structural evaluation of AES-like ciphers against mixture differential cryptanalysis. Des. Codes Cryptogr. 91(12): 3881-3899 (2023) - [j43]Xiaofeng Xie, Tian Tian:
A Low-Complexity Key-Recovery Attack on 6-Round Midori64. J. Syst. Sci. Complex. 36(4): 1738-1756 (2023) - [j42]Chen Liu, Tian Tian, Wenfeng Qi:
A New Method for Searching Cubes and Its Application to 815-Round Trivium. J. Syst. Sci. Complex. 36(5): 2234-2254 (2023) - [c6]Cheng Che, Tian Tian:
A New Correlation Cube Attack Based on Division Property. ACISP 2023: 53-71 - [c5]Xiaofeng Xie, Tian Tian:
The Triangle Differential Cryptanalysis. ACISP 2023: 72-88 - [i12]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023) - 2022
- [j41]Xiao-Juan Wang, Tian Tian, Wen-Feng Qi:
A generic method for investigating nonsingular Galois NFSRs. Des. Codes Cryptogr. 90(2): 387-408 (2022) - [j40]Xiao-Juan Wang, Tian Tian, Wen-Feng Qi:
A necessary and sufficient condition for a class of nonsingular Galois NFSRs. Finite Fields Their Appl. 77: 101952 (2022) - [c4]Cheng Che, Tian Tian:
An Experimentally Verified Attack on 820-Round Trivium. Inscrypt 2022: 357-369 - [i11]Xiaofeng Xie, Tian Tian:
Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2022: 1199 (2022) - [i10]Cheng Che, Tian Tian:
An Experimentally Verified Attack on 820-Round Trivium (Full Version). IACR Cryptol. ePrint Arch. 2022: 1518 (2022) - 2021
- [j39]Chen-Dong Ye, Tian Tian, Fan-Yang Zeng:
The MILP-aided conditional differential attack and its application to Trivium. Des. Codes Cryptogr. 89(2): 317-339 (2021) - [j38]Chen-Dong Ye, Tian Tian:
An improved degree evaluation method of NFSR-based cryptosystems. Des. Codes Cryptogr. 89(12): 2787-2806 (2021) - [c3]Chen-Dong Ye, Tian Tian:
A Practical Key-Recovery Attack on 805-Round Trivium. ASIACRYPT (1) 2021: 187-213 - [i9]Xiao-Juan Wang, Tian Tian, Wen-Feng Qi:
A Generic Method for Investigating Nonsingular Galois NFSRs. IACR Cryptol. ePrint Arch. 2021: 504 (2021) - 2020
- [j37]Xiaofeng Xie, Tian Tian:
Improved distinguisher search techniques based on parity sets. Sci. China Inf. Sci. 63(3) (2020) - [j36]Chen-Dong Ye, Tian Tian:
Algebraic method to recover superpolies in cube attacks. IET Inf. Secur. 14(4): 430-441 (2020) - [j35]Zhongxiao Wang, Xiangyu Wang, Tian Tian:
Constructing de Bruijn Sequences Based on a New Necessary Condition. Int. J. Found. Comput. Sci. 31(3): 301-312 (2020) - [i8]Chen-Dong Ye, Tian Tian, Fan-Yang Zeng:
The MILP-Aided Conditional Differential Attack and Its Application to Trivium. IACR Cryptol. ePrint Arch. 2020: 89 (2020) - [i7]Chen-Dong Ye, Tian Tian:
A Practical Key-Recovery Attack on 805-Round Trivium. IACR Cryptol. ePrint Arch. 2020: 1404 (2020)
2010 – 2019
- 2019
- [j34]Xiao-Xin Zhao, Tian Tian, Wen-Feng Qi:
An interleaved method for constructing de Bruijn sequences. Discret. Appl. Math. 254: 234-245 (2019) - [j33]Tian Tian, Jia-Min Zhang, Wen-Feng Qi:
On the uniqueness of a type of cascade connection representations for NFSRs. Des. Codes Cryptogr. 87(10): 2267-2294 (2019) - [j32]Yu-Jie Dong, Tian Tian, Wen-Feng Qi, Zhongxiao Wang:
New results on the minimal polynomials of modified de Bruijn sequences. Finite Fields Their Appl. 60 (2019) - [j31]Lin-Lin Zhou, Tian Tian, Wen-Feng Qi, Zhongxiao Wang:
Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR. Finite Fields Their Appl. 60 (2019) - [j30]Zhen Ma, Tian Tian, Wenfeng Qi:
A New Distinguishing Attack on Grain-V1 with 111 Initialization Rounds. J. Syst. Sci. Complex. 32(3): 970-984 (2019) - [j29]Jia-Min Zhang, Tian Tian, Wen-Feng Qi, Qun-Xiong Zheng:
A New Method for Finding Affine Sub-Families of NFSR Sequences. IEEE Trans. Inf. Theory 65(2): 1249-1257 (2019) - [j28]Chen-Dong Ye, Tian Tian:
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks? IACR Trans. Symmetric Cryptol. 2019(3): 81-102 (2019) - 2018
- [j27]Xiao-Xin Zhao, Tian Tian, Wen-Feng Qi:
A ring-like cascade connection and a class of NFSRs with the same cycle structures. Des. Codes Cryptogr. 86(12): 2775-2790 (2018) - [j26]Yu-Jie Dong, Tian Tian, Wen-Feng Qi, Zhen Ma:
The adjacency graphs of FSRs with a class of affine characteristic functions. Finite Fields Their Appl. 53: 21-35 (2018) - [j25]Jia-Min Zhang, Tian Tian, Wen-Feng Qi, Qun-Xiong Zheng:
On the Affine Sub-Families of Quadratic NFSRs. IEEE Trans. Inf. Theory 64(4): 2932-2940 (2018) - [c2]Chen-Dong Ye, Tian Tian:
A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers. ACISP 2018: 172-187 - [i6]Chen-Dong Ye, Tian Tian:
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC. IACR Cryptol. ePrint Arch. 2018: 59 (2018) - [i5]Chen-Dong Ye, Tian Tian:
A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers. IACR Cryptol. ePrint Arch. 2018: 174 (2018) - [i4]Xiaofeng Xie, Tian Tian:
Improved Distinguisher Search Techniques Based on Parity Sets. IACR Cryptol. ePrint Arch. 2018: 447 (2018) - [i3]Chen-Dong Ye, Tian Tian:
Deterministic Cube Attacks: A New Method to Recover Superpolies in Practice. IACR Cryptol. ePrint Arch. 2018: 1082 (2018) - 2017
- [j24]Zhen Ma, Tian Tian, Wen-Feng Qi:
Improved conditional differential attacks on Grain v1. IET Inf. Secur. 11(1): 46-53 (2017) - [j23]Zhen Ma, Tian Tian, Wen-Feng Qi:
Conditional differential attacks on Grain-128a stream cipher. IET Inf. Secur. 11(3): 139-145 (2017) - [j22]Dong Yang, Wen-Feng Qi, Tian Tian:
All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers. IET Inf. Secur. 11(5): 230-234 (2017) - [j21]Zhen Ma, Tian Tian, Wen-Feng Qi:
Internal state recovery of Grain v1 employing guess-and-determine attack. IET Inf. Secur. 11(6): 363-368 (2017) - 2015
- [j20]Zhen Ma, Wen-Feng Qi, Tian Tian:
On affine sub-families of the NFSR in Grain. Des. Codes Cryptogr. 75(2): 199-212 (2015) - [j19]Zhongxiao Wang, Wenfeng Qi, Tian Tian:
A note on determine the greatest common subfamily of two NFSRs by Gröbner basis. J. Syst. Sci. Complex. 28(5): 1231-1242 (2015) - [j18]Jia-Min Zhang, Wen-Feng Qi, Tian Tian, Zhongxiao Wang:
Further Results on the Decomposition of an NFSR Into the Cascade Connection of an NFSR Into an LFSR. IEEE Trans. Inf. Theory 61(1): 645-654 (2015) - 2014
- [j17]Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the distinctness of modular reductions of primitive sequences over Z/(232-1). Des. Codes Cryptogr. 70(3): 359-368 (2014) - [j16]Tian Tian, Wen-Feng Qi:
On the largest affine sub-families of a family of NFSR sequences. Des. Codes Cryptogr. 71(1): 163-181 (2014) - [i2]Tian Tian, Wen-Feng Qi:
On Decomposition of an NFSR into a Cascade Connection of Two Smaller. IACR Cryptol. ePrint Arch. 2014: 536 (2014) - 2013
- [j15]Huajin Chen, Tian Tian, Wenfeng Qi:
On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity. Des. Codes Cryptogr. 67(2): 175-185 (2013) - [j14]Zhen Ma, Wen-Feng Qi, Tian Tian:
On the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. J. Complex. 29(2): 173-181 (2013) - [j13]Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the Distinctness of Binary Sequences Derived From Primitive Sequences Modulo Square-Free Odd Integers. IEEE Trans. Inf. Theory 59(1): 680-690 (2013) - [j12]Tian Tian, Wen-Feng Qi:
On the Density of Irreducible NFSRs. IEEE Trans. Inf. Theory 59(6): 4006-4012 (2013) - [j11]Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
Further Result on Distribution Properties of Compressing Sequences Derived From Primitive Sequences Over Z/(pe). IEEE Trans. Inf. Theory 59(8): 5016-5022 (2013) - 2012
- [j10]Qunxiong Zheng, Wenfeng Qi, Tian Tian:
On the distinctness of modular reductions of primitive sequences modulo square-free odd integers. Inf. Process. Lett. 112(22): 872-875 (2012) - [i1]Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers. IACR Cryptol. ePrint Arch. 2012: 3 (2012) - 2010
- [j9]Tian Tian, Wen-Feng Qi:
Expected values for the rational complexity of finite binary sequences. Des. Codes Cryptogr. 55(1): 65-79 (2010) - [j8]Tian Tian, Wen-Feng Qi:
2-adic complexity of binary m-sequences. IEEE Trans. Inf. Theory 56(1): 450-454 (2010)
2000 – 2009
- 2009
- [j7]Tian Tian, Wen-Feng Qi:
A note on the crosscorrelation of maximal length FCSR sequences. Des. Codes Cryptogr. 51(1): 1-8 (2009) - [j6]Tian Tian, Wen-Feng Qi:
Linearity properties of binary FCSR sequences. Des. Codes Cryptogr. 52(3): 249-262 (2009) - [j5]Tian Tian, Wen-Feng Qi:
Periods of termwise exclusive ors of maximal length FCSR sequences. Finite Fields Their Appl. 15(2): 214-235 (2009) - [j4]Tian Tian, Wen-Feng Qi:
Typical primitive polynomials over integer residue rings. Finite Fields Their Appl. 15(6): 796-807 (2009) - [j3]Tian Tian, Wen-Feng Qi:
Autocorrelation and Distinctness of Decimations of l-Sequences. SIAM J. Discret. Math. 23(2): 805-821 (2009) - 2007
- [j2]Tian Tian, Wen-Feng Qi:
Injectivity of Compressing Maps on Primitive Sequences Over BBZ/(pe). IEEE Trans. Inf. Theory 53(8): 2960-2966 (2007) - [j1]Tian Tian, Wen-Feng Qi:
Period and Complementarity Properties of FCSR Memory Sequences. IEEE Trans. Inf. Theory 53(8): 2966-2970 (2007) - 2006
- [c1]Tian Tian, Wen-Feng Qi:
On FCSR Memory Sequences. SETA 2006: 323-333
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint