Meiqin Wang

From MaRDI portal
(Redirected from Person:324454)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved semi-free-start collision attacks on RIPEMD-160
 
2026-03-31Paper
Improved linear key recovery attacks on PRESENT
IEEE Transactions on Information Theory
2025-01-23Paper
Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations
 
2024-12-13Paper
Moment-based distributionally robust joint chance constrained optimization for service network design under demand uncertainty
Optimization and Engineering
2024-11-18Paper
Massive superpoly recovery with a meet-in-the-middle framework. Improved cube attacks on \textsc{Trivium} and Kreyvium
 
2024-11-12Paper
Key-recovery attacks on \texttt{CRAFT} and \texttt{WARP}
 
2024-10-16Paper
Finding all impossible differentials when considering the DDT
 
2024-10-16Paper
More balanced polynomials: cube attacks on 810- and 825-round Trivium with practical complexities
 
2024-10-16Paper
Probabilistic related-key statistical saturation cryptanalysis
 
2024-10-16Paper
Improved attacks on \texttt{GIFT-64}
 
2024-10-14Paper
Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}
 
2024-10-14Paper
Improved quantum circuits for AES: reducing the depth and the number of qubits
 
2024-08-30Paper
Full round distinguishing and key-recovery attacks on SAND-2
 
2024-07-19Paper
Exact values and improved bounds on \(k\)-neighborly families of boxes
European Journal of Combinatorics
2024-03-26Paper
From unbalanced to perfect: implementation of low energy stream ciphers
Progress in Cryptology - AFRICACRYPT 2023
2024-02-02Paper
Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers
 
2024-01-11Paper
Cryptanalysis of \texttt{SPEEDY}
 
2024-01-11Paper
Improved heuristics for low-latency implementations of linear layers
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Stretching cube attacks: improved methods to recover massive superpolies
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
How fast can SM4 be in software?
Information Security and Cryptology
2023-08-21Paper
Improved truncated differential distinguishers of AES with concrete S-box
Lecture Notes in Computer Science
2023-08-14Paper
Automated key recovery attacks on round-reduced Orthros
Progress in Cryptology - AFRICACRYPT 2022
2023-06-02Paper
Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes
Lecture Notes in Computer Science
2023-05-12Paper
Massive superpoly recovery with nested monomial predictions
Lecture Notes in Computer Science
2023-05-12Paper
Forced Independent Optimized Implementation of 4-Bit S-Box
 
2023-04-13Paper
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
 
2023-03-21Paper
MixColumns coefficient property and security of the AES with a secret S-Box
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Differential-algebraic cryptanalysis of reduced-round of Serpent-256
Science China Information Sciences
2022-10-28Paper
A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
 
2022-08-30Paper
Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
 
2022-07-06Paper
Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
 
2022-07-06Paper
Cryptanalysis of the AEAD and hash algorithm DryGASCON
Cryptography and Communications
2022-06-13Paper
An STP-based model toward designing S-boxes with good cryptographic properties
Designs, Codes and Cryptography
2022-04-28Paper
Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
Cryptography and Communications
2022-04-01Paper
A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation
Computers & Operations Research
2022-03-09Paper
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
Designs, Codes and Cryptography
2022-01-19Paper
Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
 
2021-12-20Paper
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
Information Processing Letters
2021-06-16Paper
Universal forgery attack against GCM-RUP
 
2020-08-05Paper
Distinguisher on full-round compression function of GOST R
Information Processing Letters
2020-02-11Paper
Automatic search for a variant of division property using three subsets
 
2020-01-28Paper
Cryptanalysis of MORUS
Designs, Codes and Cryptography
2019-05-17Paper
scientific article; zbMATH DE number 7028909 (Why is no real title available?)
 
2019-02-22Paper
Towards key-dependent integral and impossible differential distinguishers on 5-round AES
 
2019-02-20Paper
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
 
2018-10-18Paper
Zero-correlation attacks: statistical models independent of the number of approximations
Designs, Codes and Cryptography
2018-07-13Paper
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
Cryptography and Communications
2018-05-28Paper
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
Fast Software Encryption
2018-05-09Paper
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
Fast Software Encryption
2018-05-09Paper
Automatic search of bit-based division property for ARX ciphers and word-based division property
 
2018-04-06Paper
Statistical integral attack on CAST-256 and IDEA
Cryptography and Communications
2018-01-29Paper
Statistical integral distinguisher with multi-structure and its application on AES
 
2017-08-25Paper
Conditional cube attack on reduced-round Keccak sponge function
Lecture Notes in Computer Science
2017-06-13Paper
Improved Differential Cryptanalysis of CAST-128 and CAST-256
Information Security and Cryptology
2017-05-05Paper
Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method
Designs, Codes and Cryptography
2016-10-21Paper
Elasticity solutions for orthotropic functionally graded curved beams
European Journal of Mechanics. A. Solids
2016-10-17Paper
Improved Zero-Correlation Cryptanalysis on SIMON
Information Security and Cryptology
2016-07-25Paper
Linear cryptanalysis of reduced-round SPECK
Information Processing Letters
2016-01-05Paper
Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds
Fast Software Encryption
2015-09-18Paper
General application of FFT in cryptanalysis and improved attack on CAST-256
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2
Information Security and Privacy
2014-07-24Paper
On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers
Applied Cryptography and Network Security
2014-07-07Paper
Multidimensional zero-correlation linear cryptanalysis of E2
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
Information Processing Letters
2014-04-17Paper
Key difference invariant bias in block ciphers
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
New impossible differential attack on SAFER\(_{+}\) and SAFER\(_{++}\)
Lecture Notes in Computer Science
2013-06-04Paper
Integral and multidimensional linear distinguishers with correlation zero
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Zero correlation linear cryptanalysis with reduced data complexity
Fast Software Encryption
2013-01-08Paper
A model for structure attacks, with applications to PRESENT and Serpent
Fast Software Encryption
2013-01-08Paper
Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Differential cryptanalysis of reduced-round ICEBERG
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Linear cryptanalysis of reduced-round ICEBERG
Information Security Practice and Experience
2012-06-29Paper
Practical attack on the full MMB block cipher
Selected Areas in Cryptography
2012-06-08Paper
Algebraic techniques in differential cryptanalysis revisited
Information Security and Privacy
2011-07-07Paper
scientific article; zbMATH DE number 5830796 (Why is no real title available?)
 
2011-01-03Paper
Cryptanalysis of the full MMB block cipher
Selected Areas in Cryptography
2009-12-09Paper
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Cryptology and Network Security
2009-11-26Paper
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256
Selected Areas in Cryptography
2009-11-03Paper
New Distinguishing Attack on MAC Using Secret-Prefix Method
Fast Software Encryption
2009-08-11Paper
scientific article; zbMATH DE number 5582954 (Why is no real title available?)
 
2009-07-22Paper
Differential Cryptanalysis of Reduced-Round PRESENT
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
scientific article; zbMATH DE number 4143767 (Why is no real title available?)
 
1989-01-01Paper
scientific article; zbMATH DE number 3855693 (Why is no real title available?)
 
1984-01-01Paper
scientific article; zbMATH DE number 3826451 (Why is no real title available?)
 
1984-01-01Paper


Research outcomes over time


This page was built for person: Meiqin Wang