[1] Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, and Yi Tu. Enhancing Differential-Neural Cryptanalysis. In ASIACRYPT, 2022.
[2] Zhenzhen Bao, Jian Guo, Danping Shi, and Yi Tu. Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing. In CRYPTO, 2022.
[3] Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, and Xiaoyun Wang. Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. In EUROCRYPT, 2021.
[4] Zejun Xiang, Xiangyoung Zeng, Da Lin, Zhenzhen Bao, and Shasha Zhang. Optimizing Implementations of Linear Layers. ToSC/FSE, 2020(2):120–145, 2020.
[5] Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, and Maki Shigeri. WARP: Revisiting GFN for Lightweight 128-bit Block Cipher. In SAC, 2020.
[6] Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, and Lei Wang. Generic Attacks on Hash Combiners. Journal of Cryptology, 33(3):742–823, 2020.
[7] Zhenzhen Bao, Chun Guo, Jian Guo, and Ling Song. TNT: How to Tweak a Block Cipher. In EUROCRYPT, 2020.
[8] Zhenzhen Bao, Jian Guo, and Eik List. Extended Truncated-Differential Distinguishers on Round-Reduced AES. In ToSC/FSE, 2020(3):197–261, 2020.
[9] Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, and Wenying Zhang. Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. In ToSC/FSE, 2019(4), 2019.
[10] Zhenzhen Bao, Jian Guo, Tetsu Iwata, and Kazuhiko Minematsu. ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. In ToSC/FSE, 2019(2):1–54, 2019.
[11] Zhenzhen Bao, Jian Guo, San Ling, and Yu Sasaki. PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes. In ToSC/FSE, 2019(1):330–394, 2019.
[12] Zhenzhen Bao, Jian Guo, and Lei Wang. Functional Graphs and Their Applications
in Generic Attacks on Iterated Hash Constructions. In ToSC/FSE, 2018(1):201–253, 2018.
[13] Zhenzhen Bao, Lei Wang, Jian Guo, and Dawu Gu. Functional Graph Revisited:
Updates on (Second) Preimage Attacks on Hash Combiners. In CRYPTO 2017.
[14] Zejun Xiang, Wentao Zhang, Zhenzhen Bao, and Dongdai Lin. Applying MILP Method
to Searching Integral Distinguishers Based on Division Property for 6 Lightweight
Block Ciphers. In ASIACRYPT 2016.
[15] Wenlun Pan, Zhenzhen Bao, Dongdai Lin, and Feng Liu. The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n-Periodic Binary Sequences with Fixed Hamming Weight. In ICICS 2016.
[16] Wenlun Pan, Zhenzhen Bao, Dongdai Lin, and Feng Liu. The Distribution of 2^n-Periodic Binary Sequences with Fixed k-Error Linear Complexity. In ISPEC 2016.
[17] Zhenzhen Bao, Peng Luo, and Dongdai Lin. Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers. In ICICS 2015.
[18] Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, and Meicheng Liu. A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. In FSE 2015.
[19] Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, and Ingrid Verbauwhede. RECTANGLE: a Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms. SCIENCE CHINA Information Sciences, 58(12):1–15, 2015.
[20] Zhenzhen Bao, Wentao Zhang, and Dongdai Lin. Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails. In Inscrypt 2014.