Folgen
Kexin Qiao
Kexin Qiao
Chinese Academy of Sciences
Bestätigte E-Mail-Adresse bei iie.ac.cn
Titel
Zitiert von
Zitiert von
Jahr
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block ciphers
S Sun, L Hu, P Wang, K Qiao, X Ma, L Song
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
4882014
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined …
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
Cryptology ePrint Archive, 2014
1582014
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
1002017
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2016
712016
New collision attacks on round-reduced Keccak
K Qiao, L Song, M Liu, J Guo
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
582017
Practical collision attacks against round-reduced SHA-3
J Guo, G Liao, G Liu, M Liu, K Qiao, L Song
Journal of Cryptology 33, 228-270, 2020
542020
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
D Shi, L Hu, S Sun, L Song, K Qiao, X Ma
Cryptology ePrint Archive, 2014
412014
Differential analysis on simeck and simon with dynamic key-guessing techniques
K Qiao, L Hu, S Sun
Information Systems Security and Privacy: Second International Conference …, 2017
402017
Invariant subspace attack against full midori64
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2015
342015
Differential security evaluation of simeck with dynamic key-guessing techniques.
K Qiao, L Hu, S Sun
IACR Cryptol. ePrint Arch. 2015, 902, 2015
252015
Improved differential analysis of block cipher PRIDE
Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma
Information Security Practice and Experience: 11th International Conference …, 2015
242015
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song
IACR Cryptol. ePrint Arch. 2014, 747, 2014
242014
Constructing mixed-integer programming models whose feasible region is exactly the set of all valid differential characteristics of SIMON
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
Cryptology ePrint Archive, 2015
182015
Related-key rectangle attack on round-reduced Khudra block cipher
X Ma, K Qiao
International Conference on Network and System Security, 331-344, 2015
112015
Improved MILP modeling for automatic security evaluation and application to FOX
K Qiao, L Hu, S Sun, X Ma, H Kan
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015
92015
Tighter security bound of MIBS block cipher against differential attack
X Ma, L Hu, S Sun, K Qiao, J Shan
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
92014
Leakage detection with Kolmogorov-smirnov test
X Zhou, K Qiao, C Ou
Cryptology ePrint Archive, 2019
82019
Vgg-based side channel attack on rsa implementation
Q Lei, C Li, K Qiao, Z Ma, B Yang
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
72020
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
S Sun, L Hu, M Wang, Q Yang, K Qiao, X Ma, L Song, J Shan
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
62015
The exchange attack and the mixture differential attack revisited: From the perspective of automatic evaluation
K Qiao, Z Zhang, Z Niu, L Zhu, J Ma
Chinese Journal of Electronics 33 (1), 19-29, 2024
5*2024
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20