
Baocang Wang
Articles
-
Mar 28, 2024 |
mdpi.com | Siyue Dong |Zhen Zhao |Baocang Wang |Wen Gao
All articles published by MDPI are made immediately available worldwide under an open access license. No specialpermission is required to reuse all or part of the article published by MDPI, including figures and tables. Forarticles published under an open access Creative Common CC BY license, any part of the article may be reused withoutpermission provided that the original article is clearly cited. For more information, please refer tohttps://www.mdpi.com/openaccess.
-
Oct 18, 2023 |
mdpi.com | Siyue Dong |Zhen Zhao |Baocang Wang |Wen Gao
This is an early access version, the complete PDF, HTML, and XML versions will be available soon. Open AccessArticleby 1,*,†,‡, 1,*,†,‡, 1, 2 and 3 1The State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China2School of Cyberspace Security, Xi’an University of Posts & Telecommunications, Xi’an 710121, China3School of Mathematics and Information Science, Baoji University of Arts and Science, Xi’an 721016, China*Authors to whom correspondence should be addressed.
-
May 2, 2023 |
eprint.iacr.org | Liu Jing Zhang |Zilong Wang |Jian Guo |Baocang Wang
Paper 2022/183 Improving Differential-Neural Cryptanalysis with Inception , Xidian University, Xidian University, Nanyang Technological University, Xidian UniversityAbstract In CRYPTO'19, Gohr proposed a new cryptanalysis method by building differential-neural distinguishers with neural networks. Gohr combined a differential-neural distinguisher with a classical differential path and achieved a 12-round (out of 22) key recovery attack on Speck32/64.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →