Jiqiang Lu

From MaRDI portal
Person:499654

Available identifiers

zbMath Open lu.jiqiangMaRDI QIDQ499654

List of research outcomes





PublicationDate of PublicationType
Impossible differential cryptanalysis of the raindrop block cipher2025-01-10Paper
Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher2024-11-12Paper
Collision-based attacks on white-box implementations of the AES block cipher2024-10-16Paper
Rectangle attacks on reduced versions of the FBC block cipher2024-08-30Paper
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher2024-04-22Paper
Cryptanalysis of two white-box implementations of the SM4 block cipher2022-07-13Paper
On the Security of the LAC Authenticated Encryption Algorithm2016-09-02Paper
Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU2016-03-10Paper
On Lightweight Security Enforcement in Cyber-Physical Systems2016-02-22Paper
A methodology for differential-linear cryptanalysis and its applications2015-09-30Paper
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher2014-08-20Paper
Differential attack on nine rounds of the SEED block cipher2014-04-14Paper
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher2014-03-13Paper
Differential attack on five rounds of the SC2000 block cipher2014-02-06Paper
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher2013-04-04Paper
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis2013-03-18Paper
A Methodology for Differential-Linear Cryptanalysis and Its Applications2013-01-08Paper
The (related-key) impossible boomerang attack and its application to the AES block cipher2011-06-17Paper
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits2011-05-19Paper
Differential Attack on Five Rounds of the SC2000 Block Cipher2010-11-23Paper
Principles on the Security of AES against First and Second-Order Differential Power Analysis2010-07-06Paper
Security Weaknesses in Two Proxy Signature Schemes2009-02-10Paper
New Impossible Differential Attacks on AES2009-01-22Paper
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b2008-11-27Paper
Related-Key Rectangle Attack on 42-Round SHACAL-22008-06-17Paper
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 20062008-05-06Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY12008-04-24Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-12008-04-11Paper

Research outcomes over time

This page was built for person: Jiqiang Lu