Yunwen Liu
Yunwen Liu
Affiliation inconnue
Aucune adresse e-mail validée
Citée par
Citée par
Optimized interpolation attacks on LowMC
I Dinur, Y Liu, W Meier, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2015
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
Y Liu, Q Wang, V Rijmen
Applied Cryptography and Network Security 9696 (Lecture Notes in Computer …, 2016
Rotational cryptanalysis in the presence of constants
T Ashur, Y Liu
IACR Transactions on Symmetric Cryptology, 57-70, 2016
Rotational-XOR cryptanalysis of reduced-round SPECK
Y Liu, G De Witte, A Ranea, T Ashur
IACR Transactions on Symmetric Cryptology, 24-36, 2017
Related-key boomerang attacks on GIFT with automated trail search including BCT effect
Y Liu, Y Sasaki
Australasian Conference on Information Security and Privacy, 555-572, 2019
Nonlinear diffusion layers
Y Liu, V Rijmen, G Leander
Designs, Codes and Cryptography, 1-16, 2018
An Easy-To-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers
A Ranea, Y Liu, T Ashur
Proceedings of the Romanian Academy, Series A 18 (3), 307-316, 2017
Improved cryptanalysis on SipHash
W Xin, Y Liu, B Sun, C Li
International Conference on Cryptology and Network Security, 61-79, 2019
Improved fault analysis on SIMON block cipher family
H Chen, J Feng, V Rijmen, Y Liu, L Fan, W Li
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 16-24, 2016
Cryptanalysis of reduced sliscp permutation in sponge-hash and duplex-AE modes
Y Liu, Y Sasaki, L Song, G Wang
International Conference on Selected Areas in Cryptography, 92-114, 2018
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
W Li, V Rijmen, Z Tao, Q Wang, H Chen, Y Liu, C Li, Y Liu
Science China Information Sciences 61 (3), 1-13, 2018
New observations on invariant subspace attack
Y Liu, V Rijmen
Information Processing Letters 138, 27-30, 2018
An automated tool for Rotational-XOR cryptanalysis of ARX-based primitives
G De Witte, T Ashur, Y Liu
38th Symposium on Information Theory in the Benelux, 2017
Techniques for Block Cipher Cryptanalysis
Y Liu
New constructions of systematic authentication codes from three classes of cyclic codes
Y Liu, L Qu, C Li
Advances in Mathematics of Communications 12 (1), 1, 2018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–15