default search action
Siang Meng Sim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i20]Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim:
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes. IACR Cryptol. ePrint Arch. 2022: 561 (2022) - 2021
- [j7]Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:
DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 169-191 (2021) - [c11]Anubhab Baksi, Shivam Bhasin, Jakub Breier
, Mustafa Khairallah
, Thomas Peyrin
, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. ASIACRYPT (2) 2021: 124-156 - [i19]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. IACR Cryptol. ePrint Arch. 2021: 712 (2021) - 2020
- [j6]Shivam Bhasin, Jakub Breier
, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
:
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 95-122 (2020) - [j5]Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin
, Matthieu Rivain, Yu Sasaki, Siang Meng Sim
:
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. IACR Trans. Symmetric Cryptol. 2020(S1): 31-59 (2020) - [j4]Christof Beierle
, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin
, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [c10]Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim:
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings. INDOCRYPT 2020: 373-394 - [c9]Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition. IWSEC 2020: 3-22 - [i18]Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim:
SITM: See-In-The-Middle-Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 210 (2020) - [i17]Siang Meng Sim:
Differential Power Analysis on (Non-)Linear Feedback Shift Registers. IACR Cryptol. ePrint Arch. 2020: 349 (2020) - [i16]Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition. IACR Cryptol. ePrint Arch. 2020: 680 (2020) - [i15]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i14]Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim:
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings. IACR Cryptol. ePrint Arch. 2020: 959 (2020) - [i13]Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:
DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version). IACR Cryptol. ePrint Arch. 2020: 1241 (2020)
2010 – 2019
- 2018
- [c8]Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim
:
Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count. AFRICACRYPT 2018: 51-71 - 2017
- [j3]Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim
:
Human-readable Proof of the Related-Key Security of AES-128. IACR Trans. Symmetric Cryptol. 2017(2): 59-83 (2017) - [j2]Jérémy Jean, Thomas Peyrin, Siang Meng Sim
, Jade Tourteaux:
Optimizing Implementations of Lightweight Building Blocks. IACR Trans. Symmetric Cryptol. 2017(4): 130-168 (2017) - [c7]Ralph Ankele, Subhadeep Banik
, Avik Chakraborti, Eik List, Florian Mendel
, Siang Meng Sim
, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round Skinny. ACNS 2017: 208-228 - [c6]Subhadeep Banik
, Sumit Kumar Pandey, Thomas Peyrin
, Yu Sasaki, Siang Meng Sim
, Yosuke Todo
:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - [i12]Jérémy Jean, Thomas Peyrin, Siang Meng Sim:
Optimizing Implementations of Lightweight Building Blocks. IACR Cryptol. ePrint Arch. 2017: 101 (2017) - [i11]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. IACR Cryptol. ePrint Arch. 2017: 622 (2017) - [i10]Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim:
Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version). IACR Cryptol. ePrint Arch. 2017: 1084 (2017) - 2016
- [j1]Jian Guo
, Jérémy Jean, Ivica Nikolic
, Kexin Qiao, Yu Sasaki, Siang Meng Sim
:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Trans. Symmetric Cryptol. 2016(1): 33-56 (2016) - [c5]Sumanta Sarkar, Siang Meng Sim
:
A Deeper Understanding of the XOR Count Distribution in the Context of Lightweight Cryptography. AFRICACRYPT 2016: 167-182 - [c4]Christof Beierle
, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin
, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c3]Meicheng Liu, Siang Meng Sim
:
Lightweight MDS Generalized Circulant Matrices. FSE 2016: 101-120 - [i9]Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. IACR Cryptol. ePrint Arch. 2016: 25 (2016) - [i8]Meicheng Liu, Siang Meng Sim:
Lightweight MDS Generalized Circulant Matrices. IACR Cryptol. ePrint Arch. 2016: 186 (2016) - [i7]Sumanta Sarkar, Siang Meng Sim:
A deeper understanding of the XOR count distribution in the context of lightweight cryptography. IACR Cryptol. ePrint Arch. 2016: 422 (2016) - [i6]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - [i5]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Cryptol. ePrint Arch. 2016: 973 (2016) - [i4]Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. IACR Cryptol. ePrint Arch. 2016: 1127 (2016) - 2015
- [c2]Thomas Peyrin
, Siang Meng Sim
, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. FSE 2015: 264-281 - [c1]Siang Meng Sim
, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin
:
Lightweight MDS Involution Matrices. FSE 2015: 471-493 - [i3]Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. IACR Cryptol. ePrint Arch. 2015: 258 (2015) - [i2]Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Full Midori64. IACR Cryptol. ePrint Arch. 2015: 1189 (2015) - 2014
- [i1]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. IACR Cryptol. ePrint Arch. 2014: 931 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint