Siwei Sun

1.9k total citations
37 papers, 267 citations indexed

About

Siwei Sun is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Information Systems. According to data from OpenAlex, Siwei Sun has authored 37 papers receiving a total of 267 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Artificial Intelligence, 17 papers in Computer Vision and Pattern Recognition and 5 papers in Information Systems. Recurrent topics in Siwei Sun's work include Cryptographic Implementations and Security (30 papers), Coding theory and cryptography (21 papers) and Chaos-based Image/Signal Encryption (17 papers). Siwei Sun is often cited by papers focused on Cryptographic Implementations and Security (30 papers), Coding theory and cryptography (21 papers) and Chaos-based Image/Signal Encryption (17 papers). Siwei Sun collaborates with scholars based in China, Japan and France. Siwei Sun's co-authors include Lei Hu, Zhengbang Zha, Kexin Qiao, Chaoyun Li, Paweł Szałachowski, Ding‐Zhu Du, Siu-Wing Cheng, Danping Shi, Sumanta Sarkar and Kai Hu and has published in prestigious journals such as SHILAP Revista de lepidopterología, SIAM Journal on Computing and Science China Information Sciences.

In The Last Decade

Siwei Sun

30 papers receiving 252 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Siwei Sun China 10 227 97 87 34 25 37 267
Jérémy Jean France 10 208 0.9× 43 0.4× 100 1.1× 23 0.7× 17 0.7× 22 228
Paweł Morawiecki Poland 8 117 0.5× 29 0.3× 76 0.9× 31 0.9× 17 0.7× 24 174
Matthias J. Kannwischer Germany 6 181 0.8× 42 0.4× 50 0.6× 43 1.3× 20 0.8× 13 244
Benjamin Fuller United States 10 89 0.4× 38 0.4× 46 0.5× 60 1.8× 12 0.5× 23 217
Jean-Sébastien Coron Luxembourg 12 285 1.3× 38 0.4× 124 1.4× 69 2.0× 38 1.5× 30 333
Łukasz Chmielewski Netherlands 8 161 0.7× 24 0.2× 58 0.7× 75 2.2× 4 0.2× 16 180
Mohammad Dakhilalian Iran 9 197 0.9× 49 0.5× 84 1.0× 17 0.5× 5 0.2× 27 247
Marco Macchetti Switzerland 7 206 0.9× 38 0.4× 87 1.0× 108 3.2× 10 0.4× 12 246
Jan-Pieter D’Anvers Belgium 9 190 0.8× 27 0.3× 88 1.0× 44 1.3× 31 1.2× 14 233
Prasanna Ravi Singapore 9 208 0.9× 29 0.3× 85 1.0× 73 2.1× 19 0.8× 24 249

Countries citing papers authored by Siwei Sun

Since Specialization
Citations

This map shows the geographic impact of Siwei Sun's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Siwei Sun with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Siwei Sun more than expected).

Fields of papers citing papers by Siwei Sun

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Siwei Sun. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Siwei Sun. The network helps show where Siwei Sun may publish in the future.

Co-authorship network of co-authors of Siwei Sun

This figure shows the co-authorship network connecting the top 25 collaborators of Siwei Sun. A scholar is included among the top collaborators of Siwei Sun based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Siwei Sun. Siwei Sun is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Gaoli, et al.. (2024). A New (Related‐Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis. IET Information Security. 2024(1).
2.
Lin, Dongxin, et al.. (2024). A survey of the research on quantum circuit synthesis and optimization of symmetric-key cryptography. Zhongguo kexue. Wulixue Lixue Tianwenxue. 55(4). 240303–240303. 1 indexed citations
3.
Wang, Gaoli, et al.. (2024). Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis. IEICE Transactions on Information and Systems. E107.D(8). 1016–1028. 1 indexed citations
4.
Qiao, Kexin, Zhao‐Yang Wang, Heng Chang, et al.. (2024). A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM. Science China Information Sciences. 67(11). 1 indexed citations
5.
Qiao, Wenxiao, et al.. (2023). New cryptanalysis of LowMC with algebraic techniques. Designs Codes and Cryptography. 91(5). 2057–2075.
6.
Zhang, Zhe, et al.. (2023). Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR Transactions on Symmetric Cryptology. 224–252.
7.
Liu, Yunwen, et al.. (2022). Rotational Differential-Linear Cryptanalysis Revisited. Journal of Cryptology. 36(1). 1 indexed citations
8.
Zou, Jian, et al.. (2022). Some efficient quantum circuit implementations of Camellia. Quantum Information Processing. 21(4). 8 indexed citations
9.
Hu, Kai, et al.. (2021). Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. IACR Transactions on Symmetric Cryptology. 130–155. 18 indexed citations
10.
Saha, Dhiman, et al.. (2020). On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Transactions on Symmetric Cryptology. 152–174. 6 indexed citations
11.
Liu, Bowen, Siwei Sun, & Paweł Szałachowski. (2020). SMACS: Smart Contract Access Control Service. 221–232. 15 indexed citations
12.
Saha, Dhiman, et al.. (2020). On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. SHILAP Revista de lepidopterología.
13.
Sun, Siwei, et al.. (2019). Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits. SHILAP Revista de lepidopterología. 16 indexed citations
14.
Ge, Chunpeng, Siwei Sun, & Paweł Szałachowski. (2019). Permission less Block chains and Secure Logging. 56–60. 5 indexed citations
15.
Sun, Siwei, David Gérault, Pascal Lafourcade, et al.. (2017). Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Transactions on Symmetric Cryptology. 281–306. 27 indexed citations
16.
Hu, Lei, et al.. (2015). Security of LBlock-s against related-key differential attack. 2015 2nd International Conference on Electronics and Communication Systems (ICECS). 1278–1283.
17.
Qiao, Kexin, Lei Hu, Siwei Sun, Xiaoshuang Ma, & Haibin Kan. (2015). Improved MILP Modeling for Automatic Security Evaluation and Application to FOX. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E98.A(1). 72–80. 1 indexed citations
18.
Xu, Jun, et al.. (2014). Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET Communications. 8(12). 2142–2146. 1 indexed citations
19.
Zha, Zhengbang, Lei Hu, & Siwei Sun. (2013). Constructing new differentially 4-uniform permutations from the inverse function. Finite Fields and Their Applications. 25. 64–78. 48 indexed citations
20.
Du, Ding‐Zhu, et al.. (1994). Modifications of Competitive Group Testing. SIAM Journal on Computing. 23(1). 82–96. 23 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026