Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block ciphers S Sun, L Hu, P Wang, K Qiao, X Ma, L Song Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 473 | 2014 |
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined … S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu Cryptology ePrint Archive, 2014 | 153 | 2014 |
Analysis of AES, SKINNY, and others with constraint programming S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017 | 99 | 2017 |
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim Cryptology ePrint Archive, 2016 | 70 | 2016 |
New collision attacks on round-reduced Keccak K Qiao, L Song, M Liu, J Guo Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 57 | 2017 |
Practical collision attacks against round-reduced SHA-3 J Guo, G Liao, G Liu, M Liu, K Qiao, L Song Journal of Cryptology 33, 228-270, 2020 | 54 | 2020 |
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON D Shi, L Hu, S Sun, L Song, K Qiao, X Ma Cryptology ePrint Archive, 2014 | 41 | 2014 |
Differential analysis on simeck and simon with dynamic key-guessing techniques K Qiao, L Hu, S Sun Information Systems Security and Privacy: Second International Conference …, 2017 | 40 | 2017 |
Invariant subspace attack against full midori64 J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim Cryptology ePrint Archive, 2015 | 33 | 2015 |
Differential security evaluation of simeck with dynamic key-guessing techniques. K Qiao, L Hu, S Sun IACR Cryptol. ePrint Arch. 2015, 902, 2015 | 25 | 2015 |
Improved differential analysis of block cipher PRIDE Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma Information Security Practice and Experience: 11th International Conference …, 2015 | 24 | 2015 |
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications. S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song IACR Cryptol. ePrint Arch. 2014, 747, 2014 | 24 | 2014 |
Constructing mixed-integer programming models whose feasible region is exactly the set of all valid differential characteristics of SIMON S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu Cryptology ePrint Archive, 2015 | 18 | 2015 |
Related-key rectangle attack on round-reduced Khudra block cipher X Ma, K Qiao International Conference on Network and System Security, 331-344, 2015 | 11 | 2015 |
Improved MILP modeling for automatic security evaluation and application to FOX K Qiao, L Hu, S Sun, X Ma, H Kan IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015 | 9 | 2015 |
Tighter security bound of MIBS block cipher against differential attack X Ma, L Hu, S Sun, K Qiao, J Shan Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 9 | 2014 |
Vgg-based side channel attack on rsa implementation Q Lei, C Li, K Qiao, Z Ma, B Yang 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 7 | 2020 |
Leakage detection with Kolmogorov-smirnov test X Zhou, K Qiao, C Ou Cryptology ePrint Archive, 2019 | 7 | 2019 |
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis S Sun, L Hu, M Wang, Q Yang, K Qiao, X Ma, L Song, J Shan Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 6 | 2015 |
The exchange attack and the mixture differential attack revisited: From the perspective of automatic evaluation K Qiao, Z Zhang, Z Niu, L Zhu, J Ma Chinese Journal of Electronics 33 (1), 19-29, 2024 | 5* | 2024 |