Jiqiang Lu

From MaRDI portal
(Redirected from Person:499654)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Impossible differential cryptanalysis of the raindrop block cipher2025-01-10Paper
Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher2024-11-12Paper
Collision-based attacks on white-box implementations of the AES block cipher2024-10-16Paper
Rectangle attacks on reduced versions of the FBC block cipher2024-08-30Paper
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
Designs, Codes and Cryptography
2024-04-22Paper
Cryptanalysis of two white-box implementations of the SM4 block cipher2022-07-13Paper
On the security of the LAC authenticated encryption algorithm
Information Security and Privacy
2016-09-02Paper
Time-memory trade-off attack on the GSM A5/1 stream cipher using commodity GPGPU (extended abstract)
Applied Cryptography and Network Security
2016-03-10Paper
On lightweight security enforcement in cyber-physical systems
Lecture Notes in Computer Science
2016-02-22Paper
A methodology for differential-linear cryptanalysis and its applications
Designs, Codes and Cryptography
2015-09-30Paper
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
Lecture Notes in Computer Science
2014-08-20Paper
Differential attack on nine rounds of the SEED block cipher
Information Processing Letters
2014-04-14Paper
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
Theoretical Computer Science
2014-03-13Paper
Differential attack on five rounds of the SC2000 block cipher
Journal of Computer Science and Technology
2014-02-06Paper
Meet-in-the-middle attack on reduced versions of the Camellia block cipher
Advances in Information and Computer Security
2013-04-04Paper
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
A methodology for differential-linear cryptanalysis and its applications (extended abstract)
Fast Software Encryption
2013-01-08Paper
The (related-key) impossible boomerang attack and its application to the AES block cipher
Designs, Codes and Cryptography
2011-06-17Paper
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
Information Security Practice and Experience
2011-05-19Paper
Differential attack on five rounds of the SC2000 block cipher
Information Security and Cryptology
2010-11-23Paper
Principles on the security of AES against first and second-order differential power analysis
Applied Cryptography and Network Security
2010-07-06Paper
Security Weaknesses in Two Proxy Signature Schemes
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
New Impossible Differential Attacks on AES
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b
Lecture Notes in Computer Science
2008-11-27Paper
Related-Key Rectangle Attack on 42-Round SHACAL-2
Lecture Notes in Computer Science
2008-06-17Paper
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006
Lecture Notes in Computer Science
2008-05-06Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-1
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper


Research outcomes over time


This page was built for person: Jiqiang Lu