Suivre
Qianqian Yang
Qianqian Yang
Adresse e-mail validée de iie.ac.cn
Titre
Citée par
Citée par
Année
Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
L Song, Z Huang, Q Yang
Australasian Conference on Information Security and Privacy, 379-394, 2016
1232016
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
932017
Improved differential analysis of block cipher PRIDE
Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma
Information Security Practice and Experience: 11th International Conference …, 2015
252015
Related-Key Impossible Differential Analysis of Full Khudra
Q Yang, L Hu, S Sun, L Song
International Workshop on Security, 135-146, 2016
152016
Optimizing rectangle attacks: a unified and generic framework for key recovery
L Song, N Zhang, Q Yang, D Shi, J Zhao, L Hu, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
122022
Extension of meet-in-the-middle technique for truncated differential and its application to RoadRunneR
Q Yang, L Hu, S Sun, L Song
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
92016
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
S Sun, L Hu, M Wang, Q Yang, K Qiao, X Ma, L Song, J Shan
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
62015
Exploiting non-full key additions: full-fledged automatic Demirci-Selcuk meet-in-the-middle cryptanalysis of skinny
D Shi, S Sun, L Song, L Hu, Q Yang
Annual International Conference on the Theory and Applications of …, 2023
52023
New properties of the double boomerang connectivity table
Q Yang, L Song, S Sun, D Shi, L Hu
IACR Transactions on Symmetric Cryptology, 208-242, 2022
52022
Improved differential cryptanalysis on speck using plaintext structures
Z Feng, Y Luo, C Wang, Q Yang, Z Liu, L Song
Australasian Conference on Information Security and Privacy, 3-24, 2023
32023
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT
H Guo, Z Zhang, Q Yang, L Hu, Y Luo
The Computer Journal 66 (5), 1069-1082, 2023
22023
Revisiting the Differential Meet-In-The-Middle Cryptanalysis
L Song, Q Yang, H Liu
Cryptology ePrint Archive, 2023
22023
Mixed integer programming models for finite automaton and its application to additive differential patterns of exclusive-or
S Sun, L Hu, P Wang, M Wang, D Shi, X Ma, Q Yang, K Fu
Cryptology ePrint Archive, 2016
22016
On the complexity of impossible differential cryptanalysis
Q Yang, L Hu, D Shi, Y Todo, S Sun
Security and Communication Networks 2018, 2018
12018
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Q Yang, L Song, N Zhang, D Shi, L Wang, J Zhao, L Hu, J Weng
Journal of Cryptology 37 (2), 1-62, 2024
2024
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
L Song, Q Yang, Y Chen, L Hu, J Weng
Cryptology ePrint Archive, 2024
2024
Improved Related-Key Rectangle Attack Against the Full AES-192
X Liang, Y Chen, L Song, Q Yang, Z Feng, T Huang
International Conference on Information and Communications Security, 19-34, 2023
2023
Improved Boomerang Attacks on Deoxys-BC
J Zhao, N Zhang, Q Yang, L Song, L Hu
International Workshop on Security, 59-76, 2023
2023
Improving the Rectangle Attack on GIFT-64
Y Chen, N Zhang, X Liang, L Song, Q Yang, Z Feng
International Conference on Selected Areas in Cryptography, 43-61, 2023
2023
Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies
Q Fu, Y Luo, Q Yang, L Song
Cryptology ePrint Archive, 2023
2023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20