Suivre
Qianqian Yang
Qianqian Yang
Adresse e-mail validée de iie.ac.cn
Titre
Citée par
Citée par
Année
Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
L Song, Z Huang, Q Yang
Australasian Conference on Information Security and Privacy, 379-394, 2016
1332016
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
1002017
Improved differential analysis of block cipher PRIDE
Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma
Information Security Practice and Experience: 11th International Conference …, 2015
242015
Optimizing rectangle attacks: a unified and generic framework for key recovery
L Song, N Zhang, Q Yang, D Shi, J Zhao, L Hu, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
162022
Related-Key Impossible Differential Analysis of Full Khudra
Q Yang, L Hu, S Sun, L Song
International Workshop on Security, 135-146, 2016
162016
Extension of meet-in-the-middle technique for truncated differential and its application to RoadRunneR
Q Yang, L Hu, S Sun, L Song
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
102016
Exploiting non-full key additions: full-fledged automatic Demirci-Selcuk meet-in-the-middle cryptanalysis of skinny
D Shi, S Sun, L Song, L Hu, Q Yang
Annual International Conference on the Theory and Applications of …, 2023
92023
New properties of the double boomerang connectivity table
Q Yang, L Song, S Sun, D Shi, L Hu
IACR Transactions on Symmetric Cryptology, 208-242, 2022
72022
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
S Sun, L Hu, M Wang, Q Yang, K Qiao, X Ma, L Song, J Shan
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
62015
Improved differential cryptanalysis on SPECK using plaintext structures
Z Feng, Y Luo, C Wang, Q Yang, Z Liu, L Song
Australasian Conference on Information Security and Privacy, 3-24, 2023
42023
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT
H Guo, Z Zhang, Q Yang, L Hu, Y Luo
The Computer Journal 66 (5), 1069-1082, 2023
42023
Revisiting the differential meet-in-the-middle cryptanalysis
L Song, Q Yang, H Liu
Cryptology ePrint Archive, 2023
42023
Mixed integer programming models for finite automaton and its application to additive differential patterns of exclusive-or
S Sun, L Hu, P Wang, M Wang, D Shi, X Ma, Q Yang, K Fu
Cryptology ePrint Archive, 2016
22016
Revisiting the shuffle of generalized Feistel structure
Y Chen, Y Guo, X Liang, L Song, Q Yang
Cybersecurity 7 (1), 31, 2024
12024
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
L Song, Q Yang, Y Chen, L Hu, J Weng
Annual International Conference on the Theory and Applications of …, 2024
12024
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Q Yang, L Song, N Zhang, D Shi, L Wang, J Zhao, L Hu, J Weng
Journal of Cryptology 37 (2), 1-62, 2024
12024
Generic Differential Key Recovery Attacks and Beyond
L Song, H Liu, Q Yang, Y Chen, L Hu, J Weng
Cryptology ePrint Archive, 2024
12024
On the complexity of impossible differential cryptanalysis
Q Yang, L Hu, D Shi, Y Todo, S Sun
Security and Communication Networks 2018 (1), 7393401, 2018
12018
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY
L Song, Q Fu, Q Yang, Y Lv, L Hu
Cryptology ePrint Archive, 2024
2024
Improving the Rectangle Attack on GIFT-64
Q Yang, Z Fengl
Selected Areas in Cryptography--SAC 2023: 30th International Conference …, 2024
2024
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20