Boomerang connectivity table: a new cryptanalysis tool C Cid, T Huang, T Peyrin, Y Sasaki, L Song Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 194 | 2018 |
A security analysis of Deoxys and its internal tweakable block ciphers C Cid, T Huang, T Peyrin, Y Sasaki, L Song IACR Transactions on Symmetric Cryptology, 73-107, 2017 | 57 | 2017 |
The authenticated cipher MORUS (v2) H Wu, T Huang CAESAR submission, 2014 | 54 | 2014 |
Differential attacks against stream cipher ZUC H Wu, T Huang, PH Nguyen, H Wang, S Ling International Conference on the Theory and Application of Cryptology and …, 2012 | 46 | 2012 |
Leaked-state-forgery attack against the authenticated encryption algorithm ALE S Wu, H Wu, T Huang, M Wang, W Wu Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 42 | 2013 |
JAMBU lightweight authenticated encryption mode and AES-JAMBU H Wu, T Huang CAESAR competition proposal, 2014 | 27 | 2014 |
Differential-linear cryptanalysis of ICEPOLE T Huang, I Tjuawinata, H Wu International Workshop on Fast Software Encryption, 243-263, 2015 | 26 | 2015 |
The JAMBU lightweight authentication encryption mode (v2. 1) H Wu, T Huang CAESAR submissions, 2016 | 24 | 2016 |
Cryptanalysis of reduced NORX N Bagheri, T Huang, K Jia, F Mendel, Y Sasaki International Conference on Fast Software Encryption, 554-574, 2016 | 18 | 2016 |
Improved differential cryptanalysis on generalized Feistel schemes I Tjuawinata, T Huang, H Wu Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017 | 6 | 2017 |
Distinguishing attack on NORX permutation T Huang, H Wu IACR Transactions on Symmetric Cryptology, 57-73, 2018 | 2 | 2018 |
Cryptanalysis of simpira v2 I Tjuawinata, T Huang, H Wu Australasian Conference on Information Security and Privacy, 384-401, 2017 | 2 | 2017 |
Cryptanalysis of the Authenticated Encryption Algorithm COFFE I Tjuawinata, T Huang, H Wu Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016 | 2 | 2016 |
On the weakness of constant blinding PRNG in flash player C Wang, T Huang, H Wu Information and Communications Security: 20th International Conference …, 2018 | 1 | 2018 |
Practical State Recovery Attack on ICEPOLE T Huang, H Wu, I Tjuawinata | 1 | |
Analysis and design of authenticated ciphers T Huang | | 2016 |