The following pages link to Keting Jia (Q2169916):
Displaying 18 items.
- Provably secure three-party password-based authenticated key exchange from RLWE (Q2169918) (← links)
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 (Q2179384) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- Identity-concealed authenticated encryption from ring learning with errors (Q2283596) (← links)
- Improved Attacks on Reduced-Round Camellia-128/192/256 (Q2790031) (← links)
- Improved Impossible Differential Attack on Reduced-Round LBlock (Q2806767) (← links)
- Impossible Differential Cryptanalysis of 14-Round Camellia-192 (Q2817824) (← links)
- Practical Attack on the Full MMB Block Cipher (Q2889870) (← links)
- New Impossible Differential Cryptanalysis of Reduced-Round Camellia (Q2901351) (← links)
- Improved Single-Key Attacks on 9-Round AES-192/256 (Q2946906) (← links)
- Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia (Q2946934) (← links)
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256 (Q3012973) (← links)
- Pseudo-Cryptanalysis of Luffa (Q3019925) (← links)
- New Birthday Attacks on Some MACs Based on Block Ciphers (Q3183566) (← links)
- Impossible Differential Attack on Reduced-Round TWINE (Q3193258) (← links)
- New Distinguishing Attack on MAC Using Secret-Prefix Method (Q3391582) (← links)
- Improved Cryptanalysis of the Block Cipher KASUMI (Q3455501) (← links)
- Cryptanalysis of Reduced NORX (Q4639498) (← links)