Jin, Chenhui
577  results:
Search for persons X
?
 
?
3

Congruent Differential Cluster for Binary SPN Ciphers:

Cui, Ting ; Mao, Yiming ; Yang, Yang...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 2385-2397 , 2024
 
?
4

Correlation Attacks on SNOW-V-Like Stream Ciphers Based on ..:

Ma, Sudong ; Jin, Chenhui ; Shi, Zhen..
IEEE Transactions on Information Theory.  70 (2024)  6 - p. 4478-4491 , 2024
 
?
5

Impact of Refractive Status on Presbyopia Progression among..:

Qiu, Dongrong ; Liao, Youfen ; Wang, Ying...
Graefe's Archive for Clinical and Experimental Ophthalmology.  , 2024
 
?
6

Differential-Invariant Subspace Cryptanalysis—A Real-Time A..:

Cui, Ting ; Zhang, Yi ; Zhang, Jiyan..
IEEE Internet of Things Journal.  11 (2024)  10 - p. 17642-17650 , 2024
 
?
8

Pancreatic giant malignancy simulating a gastrointestinal s..:

Liu, Ben-Jie ; Jin, Chen-Hui ; Guo, Yan-Lun...
Hepatobiliary & Pancreatic Diseases International.  23 (2024)  4 - p. 431-433 , 2024
 
?
9

Remediation of vanadium contaminated soils in a waste smelt..:

Yang, Jie ; Jin, Chenhui ; Li, Jian...
Environmental Technology & Innovation.  32 (2023)  - p. 103291 , 2023
 
?
10

A General Correlation Evaluation Model on LFSR-Based Stream..:

Shi, Zhen ; Jin, Chenhui ; Zhang, Jiyan...
IEEE Transactions on Information Theory.  69 (2023)  10 - p. 6682-6699 , 2023
 
?
 
?
12

Fast Correlation Attacks on K2 Stream Cipher:

Ma, Sudong ; Jin, Chenhui ; Guan, Jie
IEEE Transactions on Information Theory.  69 (2023)  8 - p. 5426-5439 , 2023
 
?
14

A Correlation Attack on Full SNOW-V and SNOW-Vi:

, In: Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science,
Shi, Zhen ; Jin, Chenhui ; Zhang, Jiyan... - p. 34-56 , 2022
 
?
15

Multiple Impossible Differential Attacks for ForkAES:

Jiang, Zilong ; Jin, Chenhui ; Byun, Jin Wook
Security and Communication Networks.  2022 (2022)  - p. 1-11 , 2022
 
1-15