Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xiaoshuang Ma is active.

Publication


Featured researches published by Xiaoshuang Ma.


international conference on the theory and application of cryptology and information security | 2014

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers

Siwei Sun; Lei Hu; Peng Wang; Kexin Qiao; Xiaoshuang Ma; Ling Song

We propose two systematic methods to describe the differential property of an S-box with linear inequalities based on logical condition modelling and computational geometry respectively. In one method, inequalities are generated according to some conditional differential properties of the S-box; in the other method, inequalities are extracted from the H-representation of the convex hull of all possible differential patterns of the S-box. For the second method, we develop a greedy algorithm for selecting a given number of inequalities from the convex hull. Using these inequalities combined with Mixed-integer Linear Programming (MILP) technique, we propose an automatic method for evaluating the security of bit-oriented block ciphers against the (related-key) differential attack with several techniques for obtaining tighter security bounds, and a new tool for finding (related-key) differential characteristics automatically for bit-oriented block ciphers.


international conference on information security | 2015

Improved Differential Analysis of Block Cipher PRIDE

Qianqian Yang; Lei Hu; Siwei Sun; Kexin Qiao; Ling Song; Jinyong Shan; Xiaoshuang Ma

In CRYPTO 2014 Albrecht et al. brought in a 20-round iterative lightweight block cipher PRIDE which is based on a good linear layer for achieving a tradeoff between security and efficiency. A recent analysis is presented by Zhao et al. Inspired by their work, we use an automatic search method to find out 56 iterative differential characteristics of PRIDE, containing 24 1-round iterative characteristics, based on three of them we construct a 15-round differential and perform a differential attack on the 19-round PRIDE, with data, time and memory complexity of 262, 263 and 271 respectively.


Science in China Series F: Information Sciences | 2017

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON

Danping Shi; Lei Hu; Siwei Sun; Ling Song; Kexin Qiao; Xiaoshuang Ma

摘要创新点密码算法的不同部件具有相同输入时的线性逼近的相关度计算不能应用堆积引理, 其计算是一个对线性分析结果有重要影响的难题。 充分考虑了 SIMON 分组密码算法不同运算的相关性, 通过化标准二次型的方法准确计算了轮函数线性逼近的相关度, 得到精确的线性分析结果。 基于混合整数线性规划建模, 找到了 SIMON 算法的多个版本的更好的线性迹和线性闭包, 给出了 SIMON 的更好的密钥恢复攻击结果。


international conference on information security | 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis

Siwei Sun; Lei Hu; Meiqin Wang; Qianqian Yang; Kexin Qiao; Xiaoshuang Ma; Ling Song; Jinyong Shan

We focus on extending the applicability of the mixed-integer programming MIP based method in differential cryptanalysis such that more work can be done automatically. Firstly, we show how to use the MIP-based technique to obtain almost all high probability 2-round iterative related-key differential characteristics of PRIDE a block cipher proposed in CRYPTO 2014 automatically by treating the


network and system security | 2014

Tighter Security Bound of MIBS Block Cipher against Differential Attack

Xiaoshuang Ma; Lei Hu; Siwei Sun; Kexin Qiao; Jinyong Shan


network and system security | 2015

Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher

Xiaoshuang Ma; Kexin Qiao

g_i^{j}\cdot


international workshop on security | 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s

Siwei Sun; Lei Hu; Kexin Qiao; Xiaoshuang Ma; Jinyong Shan; Ling Song


advanced industrial conference on telecommunications | 2015

Related-key rectangle cryptanalysis of reduced-round block cipher MIBS

Kexin Qiao; Lei Hu; Siwei Sun; Xiaoshuang Ma

giji¾ź function with a special kind of modulo addition operations in the key schedule algorithm of PRIDE as an


IACR Cryptology ePrint Archive | 2014

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON.

Danping Shi; Lei Hu; Siwei Sun; Ling Song; Kexin Qiao; Xiaoshuang Ma


IACR Cryptology ePrint Archive | 2014

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.

Siwei Sun; Lei Hu; Meiqin Wang; Peng Wang; Kexin Qiao; Xiaoshuang Ma; Danping Shi; Ling Song

8 \times 8

Collaboration


Dive into the Xiaoshuang Ma's collaboration.

Top Co-Authors

Avatar

Kexin Qiao

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Lei Hu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Siwei Sun

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Ling Song

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jinyong Shan

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Danping Shi

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Qianqian Yang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peng Wang

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge