Follow
Tao Huang
Title
Cited by
Cited by
Year
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1942018
A security analysis of Deoxys and its internal tweakable block ciphers
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
IACR Transactions on Symmetric Cryptology, 73-107, 2017
572017
The authenticated cipher MORUS (v2)
H Wu, T Huang
CAESAR submission, 2014
542014
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
462012
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
S Wu, H Wu, T Huang, M Wang, W Wu
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
422013
JAMBU lightweight authenticated encryption mode and AES-JAMBU
H Wu, T Huang
CAESAR competition proposal, 2014
272014
Differential-linear cryptanalysis of ICEPOLE
T Huang, I Tjuawinata, H Wu
International Workshop on Fast Software Encryption, 243-263, 2015
262015
The JAMBU lightweight authentication encryption mode (v2. 1)
H Wu, T Huang
CAESAR submissions, 2016
242016
Cryptanalysis of reduced NORX
N Bagheri, T Huang, K Jia, F Mendel, Y Sasaki
International Conference on Fast Software Encryption, 554-574, 2016
182016
Improved differential cryptanalysis on generalized Feistel schemes
I Tjuawinata, T Huang, H Wu
Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017
62017
Distinguishing attack on NORX permutation
T Huang, H Wu
IACR Transactions on Symmetric Cryptology, 57-73, 2018
22018
Cryptanalysis of simpira v2
I Tjuawinata, T Huang, H Wu
Australasian Conference on Information Security and Privacy, 384-401, 2017
22017
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
I Tjuawinata, T Huang, H Wu
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
22016
On the weakness of constant blinding PRNG in flash player
C Wang, T Huang, H Wu
Information and Communications Security: 20th International Conference …, 2018
12018
Practical State Recovery Attack on ICEPOLE
T Huang, H Wu, I Tjuawinata
1
Analysis and design of authenticated ciphers
T Huang
2016
The system can't perform the operation now. Try again later.
Articles 1–16