Meiqin Wang

From MaRDI portal
Person:324454

Available identifiers

zbMath Open wang.meiqinMaRDI QIDQ324454

List of research outcomes





PublicationDate of PublicationType
Improved linear key recovery attacks on PRESENT2025-01-23Paper
Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations2024-12-13Paper
Moment-based distributionally robust joint chance constrained optimization for service network design under demand uncertainty2024-11-18Paper
Massive superpoly recovery with a meet-in-the-middle framework. Improved cube attacks on \textsc{Trivium} and Kreyvium2024-11-12Paper
Key-recovery attacks on \texttt{CRAFT} and \texttt{WARP}2024-10-16Paper
Finding all impossible differentials when considering the DDT2024-10-16Paper
More balanced polynomials: cube attacks on 810- and 825-round Trivium with practical complexities2024-10-16Paper
Probabilistic related-key statistical saturation cryptanalysis2024-10-16Paper
Improved attacks on \texttt{GIFT-64}2024-10-14Paper
Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}2024-10-14Paper
Improved quantum circuits for AES: reducing the depth and the number of qubits2024-08-30Paper
Full round distinguishing and key-recovery attacks on SAND-22024-07-19Paper
Exact values and improved bounds on \(k\)-neighborly families of boxes2024-03-26Paper
From unbalanced to perfect: implementation of low energy stream ciphers2024-02-02Paper
Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers2024-01-11Paper
Cryptanalysis of \texttt{SPEEDY}2024-01-11Paper
Improved heuristics for low-latency implementations of linear layers2023-10-04Paper
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC2023-08-25Paper
Stretching cube attacks: improved methods to recover massive superpolies2023-08-21Paper
How fast can SM4 be in software?2023-08-21Paper
Improved truncated differential distinguishers of AES with concrete S-box2023-08-14Paper
Automated key recovery attacks on round-reduced Orthros2023-06-02Paper
Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes2023-05-12Paper
Massive superpoly recovery with nested monomial predictions2023-05-12Paper
Forced Independent Optimized Implementation of 4-Bit S-Box2023-04-13Paper
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums2023-03-21Paper
MixColumns Coefficient Property and Security of the AES with A Secret S-Box2022-11-09Paper
Differential-algebraic cryptanalysis of reduced-round of Serpent-2562022-10-28Paper
A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis2022-08-30Paper
Integral attacks on Pyjamask-96 and round-reduced Pyjamask-1282022-07-06Paper
Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M32022-07-06Paper
Cryptanalysis of the AEAD and hash algorithm DryGASCON2022-06-13Paper
An STP-based model toward designing S-boxes with good cryptographic properties2022-04-28Paper
Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications2022-04-01Paper
A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation2022-03-09Paper
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations2022-01-19Paper
Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys2021-12-20Paper
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC2021-06-16Paper
Universal forgery attack against GCM-RUP2020-08-05Paper
Distinguisher on full-round compression function of GOST R2020-02-11Paper
Automatic search for a variant of division property using three subsets2020-01-28Paper
Cryptanalysis of MORUS2019-05-17Paper
https://portal.mardi4nfdi.de/entity/Q46246952019-02-22Paper
Towards key-dependent integral and impossible differential distinguishers on 5-round AES2019-02-20Paper
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis2018-10-18Paper
Zero-correlation attacks: statistical models independent of the number of approximations2018-07-13Paper
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers2018-05-28Paper
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants2018-05-09Paper
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck2018-05-09Paper
Automatic search of bit-based division property for ARX ciphers and word-based division property2018-04-06Paper
Statistical integral attack on CAST-256 and IDEA2018-01-29Paper
Statistical integral distinguisher with multi-structure and its application on AES2017-08-25Paper
Conditional Cube Attack on Reduced-Round Keccak Sponge Function2017-06-13Paper
Improved Differential Cryptanalysis of CAST-128 and CAST-2562017-05-05Paper
Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method2016-10-21Paper
Elasticity solutions for orthotropic functionally graded curved beams2016-10-17Paper
Improved Zero-Correlation Cryptanalysis on SIMON2016-07-25Paper
Linear cryptanalysis of reduced-round SPECK2016-01-05Paper
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA2015-10-01Paper
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds2015-09-18Paper
General Application of FFT in Cryptanalysis and Improved Attack on CAST-2562015-09-10Paper
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-22014-07-24Paper
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers2014-07-07Paper
Multidimensional Zero-Correlation Linear Cryptanalysis of E22014-06-24Paper
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard2014-04-17Paper
Key Difference Invariant Bias in Block Ciphers2013-12-10Paper
New Impossible Differential Attack on SAFER +  and SAFER + +2013-06-04Paper
Integral and Multidimensional Linear Distinguishers with Correlation Zero2013-03-19Paper
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity2013-01-08Paper
A Model for Structure Attacks, with Applications to PRESENT and Serpent2013-01-08Paper
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT2012-07-23Paper
Differential Cryptanalysis of Reduced-Round ICEBERG2012-07-23Paper
Linear Cryptanalysis of Reduced-Round ICEBERG2012-06-29Paper
Practical Attack on the Full MMB Block Cipher2012-06-08Paper
Algebraic Techniques in Differential Cryptanalysis Revisited2011-07-07Paper
https://portal.mardi4nfdi.de/entity/Q30635612011-01-03Paper
Cryptanalysis of the full MMB block cipher2009-12-09Paper
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT2009-11-26Paper
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-2562009-11-03Paper
New Distinguishing Attack on MAC Using Secret-Prefix Method2009-08-11Paper
https://portal.mardi4nfdi.de/entity/Q53216302009-07-22Paper
Differential Cryptanalysis of Reduced-Round PRESENT2008-06-13Paper
https://portal.mardi4nfdi.de/entity/Q34751221989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33244211984-01-01Paper
https://portal.mardi4nfdi.de/entity/Q36724371984-01-01Paper

Research outcomes over time

This page was built for person: Meiqin Wang