Automatic differential analysis of ARX block ciphers with application to SPECK and LEA L Song, Z Huang, Q Yang Australasian Conference on Information Security and Privacy, 379-394, 2016 | 133 | 2016 |
Analysis of AES, SKINNY, and others with constraint programming S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017 | 100 | 2017 |
Improved differential analysis of block cipher PRIDE Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma Information Security Practice and Experience: 11th International Conference …, 2015 | 24 | 2015 |
Optimizing rectangle attacks: a unified and generic framework for key recovery L Song, N Zhang, Q Yang, D Shi, J Zhao, L Hu, J Weng International Conference on the Theory and Application of Cryptology and …, 2022 | 16 | 2022 |
Related-Key Impossible Differential Analysis of Full Khudra Q Yang, L Hu, S Sun, L Song International Workshop on Security, 135-146, 2016 | 16 | 2016 |
Extension of meet-in-the-middle technique for truncated differential and its application to RoadRunneR Q Yang, L Hu, S Sun, L Song Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016 | 10 | 2016 |
Exploiting non-full key additions: full-fledged automatic Demirci-Selcuk meet-in-the-middle cryptanalysis of skinny D Shi, S Sun, L Song, L Hu, Q Yang Annual International Conference on the Theory and Applications of …, 2023 | 9 | 2023 |
New properties of the double boomerang connectivity table Q Yang, L Song, S Sun, D Shi, L Hu IACR Transactions on Symmetric Cryptology, 208-242, 2022 | 7 | 2022 |
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis S Sun, L Hu, M Wang, Q Yang, K Qiao, X Ma, L Song, J Shan Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 6 | 2015 |
Improved differential cryptanalysis on SPECK using plaintext structures Z Feng, Y Luo, C Wang, Q Yang, Z Liu, L Song Australasian Conference on Information Security and Privacy, 3-24, 2023 | 4 | 2023 |
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT H Guo, Z Zhang, Q Yang, L Hu, Y Luo The Computer Journal 66 (5), 1069-1082, 2023 | 4 | 2023 |
Revisiting the differential meet-in-the-middle cryptanalysis L Song, Q Yang, H Liu Cryptology ePrint Archive, 2023 | 4 | 2023 |
Mixed integer programming models for finite automaton and its application to additive differential patterns of exclusive-or S Sun, L Hu, P Wang, M Wang, D Shi, X Ma, Q Yang, K Fu Cryptology ePrint Archive, 2016 | 2 | 2016 |
Revisiting the shuffle of generalized Feistel structure Y Chen, Y Guo, X Liang, L Song, Q Yang Cybersecurity 7 (1), 31, 2024 | 1 | 2024 |
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond L Song, Q Yang, Y Chen, L Hu, J Weng Annual International Conference on the Theory and Applications of …, 2024 | 1 | 2024 |
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery Q Yang, L Song, N Zhang, D Shi, L Wang, J Zhao, L Hu, J Weng Journal of Cryptology 37 (2), 1-62, 2024 | 1 | 2024 |
Generic Differential Key Recovery Attacks and Beyond L Song, H Liu, Q Yang, Y Chen, L Hu, J Weng Cryptology ePrint Archive, 2024 | 1 | 2024 |
On the complexity of impossible differential cryptanalysis Q Yang, L Hu, D Shi, Y Todo, S Sun Security and Communication Networks 2018 (1), 7393401, 2018 | 1 | 2018 |
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY L Song, Q Fu, Q Yang, Y Lv, L Hu Cryptology ePrint Archive, 2024 | | 2024 |
Improving the Rectangle Attack on GIFT-64 Q Yang, Z Fengl Selected Areas in Cryptography--SAC 2023: 30th International Conference …, 2024 | | 2024 |