default search action
Bin Zhang 0003
Person information
- affiliation: Chinese Academy of Sciences, Institute of Software, State Key Laboratory of Information Security, Beijing, China
- affiliation (former): University of Luxembourg
Other persons with the same name
- Bin Zhang — disambiguation page
- Bin Zhang 0001 — Northeastern University, School of Computer Science and Engineering, Shenyang, China
- Bin Zhang 0002 — Merck Research Labs, Departments of Human Genetics and Biostatistics, UCLA
- Bin Zhang 0004 — HP Labs Palo Alto, CA, USA
- Bin Zhang 0005 — Arkansas State University
- Bin Zhang 0006 — Lingnan College, Sun Yat-sen University (and 1 more)
- Bin Zhang 0007 — De Paul University
- Bin Zhang 0008 — University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA (and 4 more)
- Bin Zhang 0009 — University of Washington, Seattle, USA
- Bin Zhang 0010 — University of Southern California
- Bin Zhang 0011 — University of Texas at Austin
- Bin Zhang 0012 — East China University of Science and Technology
- Bin Zhang 0013 — IBM China Research Lab.
- Bin Zhang 0015 — Information Engineering University of PLA
- Bin Zhang 0016 — Tsinghua University, Network Research Center, Beijing, China
- Bin Zhang 0017 — Harvard University
- Bin Zhang 0018 — Institut für Nachrichtentechnik, RWTH Aachen, Germany
- Bin Zhang 0019 — University of New South Wales, Canberra, Australia
- Bin Zhang 0020 — Tsinghua University, School of Medicine, Department of Biomedical Engineering, Beijing, China
- Bin Zhang 0021 — The University of Sheffield, UK
- Bin Zhang 0022 — Xi'an Jiaotong University, School of Software Engineering, China
- Bin Zhang 0023 — Beihang University, Seventh Research Division, Beijing, China
- Bin Zhang 0024 — Wuhan University, Center of Traditional Chinese Cultural Studies, China
- Bin Zhang 0025 — Cincinnati Children's Hospital Medical Center, Division of Biostatistics and Epidemiology, OH, USA (and 1 more)
- Bin Zhang 0026 — Guangdong University of Technology, Guangzhou, China (and 1 more)
- Bin Zhang 0027 — Zhejiang University, State Key Lab of CAD&CG, Hangzhou, China
- Bin Zhang 0028 — Beijing University of Posts and Telecommunications, MOE Key Laboratory of Network and Information Attack & Defence Technology, China
- Bin Zhang 0029 — China Information Security Certification Center, Department of Information Security Service Certification, Beijing, China
- Bin Zhang 0030 — Northwestern Polytechnical University, School of Astronautics, Xi'an, China
- Bin Zhang 0031 — University of Arizona, Department of Management Information Systems, Tucson, AZ, USA (and 3 more)
- Bin Zhang 0032 — Zhejiang University, Laboratory of Applied Research on Electromagnetics, Hangzhou, China
- Bin Zhang 0033 — China University of Geosciences, Wuhan, China
- Bin Zhang 0034 — Central South University, School of Geosciences and Info-Physics, Changsha, China
- Bin Zhang 0035 — University of Science and Technology of China, Department of Automation, Hefei, China
- Bin Zhang 0036 — Kanagawa University, Department of Mechanical Engineering, Yokohama, Japan (and 1 more)
- Bin Zhang 0037 — University of Maryland, Cooperative Institute for Satellite Earth System Studies, College Park, MD, USA (and 2 more)
- Bin Zhang 0038 — George Washington University, Department of Mechanical and Aerospace Engineering, Washington, DC, USA
- Bin Zhang 0039 — Xi'an Jiaotong University, School of Energy and Power Engineering, China
- Bin Zhang 0040 — Sichuan University, College of Mathematics, Chengdu, China
- Bin Zhang 0041 — Massachusetts Institute of Technology, Department of Chemistry, Cambridge, MA, USA (and 2 more)
- Bin Zhang 0042 — National University of Singapore, Cancer Science Institute of Singapore, Singapore
- Bin Zhang 0043 — Academy of Military Sciences, Research Institute of War, Beijing, China (and 1 more)
- Bin Zhang 0044 — Wuhan University of Technology, Hubei Engineering Research Center of RF-Microwave Technology and Application, China (and 1 more)
- Bin Zhang 0045 — China University of Geosciences, School of Public Administration, Wuhan, China (and 1 more)
- Bin Zhang 0046 — Wuhan University, Department of Photogrammetry, School of Remote Sensing and Information Engineering, China
- Bin Zhang 0047 — University of Shanghai for Science and Technology, Department of Control Science and Engineering, China
- Bin Zhang 0048 — Peng Cheng Laboratory, Cyberspace Security Research Center, Shenzhen, China
- Bin Zhang 0049 — First Affiliated Hospital of Soochow University, Suzhou, China (and 1 more)
- Bin Zhang 0050 — Shandong Normal University, School of Information Science and Engineering, Jinan, China
- Bin Zhang 0051 — Beijing Institute of Technology, School of Information and Electronics, China
- Bin Zhang 0052 — Institute of Automation, Chinese Academy of Sciences, China
- Hongbin Zhang 0005 (aka: Bin Zhang 0053) — Nanjing University of Science and Technology, School of Electronic and Optical Engineering, Nanjing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j14]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V. Des. Codes Cryptogr. 90(10): 2449-2479 (2022) - [j13]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. IACR Trans. Symmetric Cryptol. 2022(2): 322-350 (2022) - 2021
- [j12]Xinxin Gong, Bin Zhang:
Resistance of SNOW-V against Fast Correlation Attacks. IACR Trans. Symmetric Cryptol. 2021(1): 378-410 (2021) - [j11]Xinxin Gong, Bin Zhang:
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks. IACR Trans. Symmetric Cryptol. 2021(2): 71-103 (2021) - [j10]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Trans. Symmetric Cryptol. 2021(4): 36-73 (2021) - [i11]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. IACR Cryptol. ePrint Arch. 2021: 1435 (2021) - [i10]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Cryptol. ePrint Arch. 2021: 1523 (2021) - [i9]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V. IACR Cryptol. ePrint Arch. 2021: 1607 (2021) - 2020
- [j9]Xinxin Gong, Bin Zhang:
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G. Des. Codes Cryptogr. 88(11): 2407-2431 (2020)
2010 – 2019
- 2018
- [j8]Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang:
Design and analysis of small-state grain-like stream ciphers. Cryptogr. Commun. 10(5): 803-834 (2018) - [j7]Bin Zhang, Chao Xu, Dengguo Feng:
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking. J. Cryptol. 31(2): 394-433 (2018) - [c35]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. CRYPTO (2) 2018: 129-159 - [c34]Bin Zhang, Chao Xu, Willi Meier:
Fast Near Collision Attack on the Grain v1 Stream Cipher. EUROCRYPT (2) 2018: 771-802 - [i8]Bin Zhang, Chao Xu, Willi Meier:
Fast Near Collision Attack on the Grain v1 Stream Cipher. IACR Cryptol. ePrint Arch. 2018: 145 (2018) - [i7]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. IACR Cryptol. ePrint Arch. 2018: 522 (2018) - 2017
- [j6]Bin Zhang, Xinxin Gong, Willi Meier:
Fast Correlation Attacks on Grain-like Small State Stream Ciphers. IACR Trans. Symmetric Cryptol. 2017(4): 58-81 (2017) - [i6]Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang:
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers. IACR Cryptol. ePrint Arch. 2017: 384 (2017) - [i5]Bin Zhang, Xinxin Gong:
New Algorithms for Solving LPN. IACR Cryptol. ePrint Arch. 2017: 780 (2017) - 2016
- [j5]Yuan Yao, Bin Zhang, Wenling Wu:
Utilizing Probabilistic Linear Equations in Cube Attacks. J. Comput. Sci. Technol. 31(2): 317-325 (2016) - [i4]Bin Zhang, Chao Xu, Willi Meier:
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0. IACR Cryptol. ePrint Arch. 2016: 311 (2016) - 2015
- [j4]Zhenqing Shi, Bin Zhang, Dengguo Feng:
Practical-time related-key attack on Hummingbird-2. IET Inf. Secur. 9(6): 321-327 (2015) - [c33]Bin Zhang, Xinxin Gong:
Another Tradeoff Attack on Sprout-Like Stream Ciphers. ASIACRYPT (2) 2015: 561-585 - [c32]Yuan Yao, Bin Zhang, Wenling Wu:
A Single Query Forgery Attack on Raviyoyla v1. AsiaCCS 2015: 671 - [c31]Bin Zhang, Chao Xu, Willi Meier:
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0. CRYPTO (1) 2015: 643-662 - [c30]Shaoyu Du, Bin Zhang, Zhenqi Li, Dongdai Lin:
Fault Attacks on Stream Cipher Scream. ISPEC 2015: 50-64 - [c29]Shaoyu Du, Zhenqi Li, Bin Zhang, Dongdai Lin:
Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI. ISPEC 2015: 235-249 - [c28]Yuan Yao, Bin Zhang, Wenling Wu:
Automatic Search for Linear Trails of the SPECK Family. ISC 2015: 158-176 - [i3]Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede:
A New Model for Error-Tolerant Side-Channel Cube Attacks. IACR Cryptol. ePrint Arch. 2015: 447 (2015) - 2014
- [j3]Xinxin Gong, Bin Zhang, Wenling Wu, Dengguo Feng:
Computing Walsh coefficients from the algebraic normal form of a Boolean function. Cryptogr. Commun. 6(4): 335-358 (2014) - [c27]Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu:
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter. ICICS 2014: 132-142 - [c26]Chao Xu, Bin Zhang, Dengguo Feng:
Linear Cryptanalysis of FASER128/256 and TriviA-ck. INDOCRYPT 2014: 237-254 - [c25]Zhenqi Li, Bin Zhang, Arnab Roy, Junfeng Fan:
Error-Tolerant Side-Channel Cube Attack Revisited. Selected Areas in Cryptography 2014: 261-277 - 2013
- [c24]Zhenqing Shi, Bin Zhang, Dengguo Feng:
Cryptanalysis of Helix and Phelix Revisited. ACISP 2013: 27-40 - [c23]Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede:
A New Model for Error-Tolerant Side-Channel Cube Attacks. CHES 2013: 453-470 - [c22]Xinxin Gong, Bin Zhang, Dengguo Feng, Tongjiang Yan:
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq. Inscrypt 2013: 86-98 - [c21]Bin Zhang, Chao Xu, Dengguo Feng:
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract). CRYPTO (1) 2013: 165-182 - [c20]Bin Zhang, Zhenqi Li, Dengguo Feng, Dongdai Lin:
Near Collision Attack on the Grain v1 Stream Cipher. FSE 2013: 518-538 - [c19]Jing Lv, Bin Zhang, Dongdai Lin:
Some New Weaknesses in the RC4 Stream Cipher. WISA 2013: 28-38 - [i2]Jing Lv, Bin Zhang, Dongdai Lin:
Distinguishing Attacks on RC4 and A New Improvement of the Cipher. IACR Cryptol. ePrint Arch. 2013: 176 (2013) - 2012
- [c18]Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin:
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack. ICICS 2012: 311-320 - [c17]Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, Dongdai Lin:
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack. ICICS 2012: 321-330 - [c16]Zhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin:
Cube Cryptanalysis of LBlock with Noisy Leakage. ICISC 2012: 141-155 - [c15]Zhenqing Shi, Bin Zhang, Dengguo Feng, Wenling Wu:
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. ICISC 2012: 337-351 - 2011
- [j2]Bin Zhang, Dengguo Feng:
Improved multi-pass fast correlation attacks with applications. Sci. China Inf. Sci. 54(8): 1635-1644 (2011) - [c14]Alex Biryukov, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. ACNS 2011: 91-109 - [i1]Alex Biryukov, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. IACR Cryptol. ePrint Arch. 2011: 707 (2011) - 2010
- [c13]Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . ACNS 2010: 139-153 - [c12]Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕. ICETE (Selected Papers) 2010: 147-157 - [c11]Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Analysis of SNOW 3G⊕ Resynchronization Mechanism. SECRYPT 2010: 327-333
2000 – 2009
- 2009
- [c10]Bin Zhang:
New Cryptanalysis of Irregularly Decimated Stream Ciphers. Selected Areas in Cryptography 2009: 449-465 - 2008
- [c9]Bin Zhang, Dengguo Feng:
An Improved Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2008: 214-227 - 2006
- [j1]Bin Zhang, Dengguo Feng:
Security analysis of a new stream cipher. Sci. China Ser. F Inf. Sci. 49(3): 286-301 (2006) - [c8]Bin Zhang, Dengguo Feng:
New Guess-and-Determine Attack on the Self-Shrinking Generator. ASIACRYPT 2006: 54-68 - [c7]Bin Zhang, Dengguo Feng:
A New Variant of the Self-Shrinking Generator. ISIT 2006: 1619-1622 - [c6]Bin Zhang, Dengguo Feng:
Multi-pass Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2006: 234-248 - 2005
- [c5]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86 - [c4]Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang:
Weaknesses of COSvd (2, 128) Stream Cipher. ICISC 2005: 270-283 - 2004
- [c3]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309 - [c2]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400 - [c1]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 01:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint