Follow
Kexin Qiao
Kexin Qiao
Chinese Academy of Sciences
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block ciphers
S Sun, L Hu, P Wang, K Qiao, X Ma, L Song
International Conference on the Theory and Application of Cryptology and …, 2014
3012014
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined …
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
Cryptology ePrint Archive, 2014
1102014
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology, 281-306, 2017
662017
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2016
512016
New collision attacks on round-reduced Keccak
K Qiao, L Song, M Liu, J Guo
Annual International Conference on the Theory and Applications of …, 2017
422017
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
D Shi, L Hu, S Sun, L Song, K Qiao, X Ma
Science China Information Sciences 60 (3), 1-3, 2017
392017
Differential analysis on simeck and simon with dynamic key-guessing techniques
K Qiao, L Hu, S Sun
International Conference on Information Systems Security and Privacy, 64-85, 2016
342016
Invariant subspace attack against full midori64
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2015
312015
Practical collision attacks against round-reduced SHA-3
J Guo, G Liao, G Liu, M Liu, K Qiao, L Song
Journal of Cryptology 33 (1), 228-270, 2020
292020
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song
IACR Cryptol. ePrint Arch. 2014, 747, 2014
202014
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.
K Qiao, L Hu, S Sun
IACR Cryptol. ePrint Arch. 2015, 902, 2015
192015
Improved differential analysis of block cipher PRIDE
Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma
International Conference on Information Security Practice and Experience …, 2015
172015
Constructing mixed-integer programming models whose feasible region is exactly the set of all valid differential characteristics of SIMON
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
Cryptology ePrint Archive, 2015
142015
Related-key rectangle attack on round-reduced Khudra block cipher
X Ma, K Qiao
International Conference on Network and System Security, 331-344, 2015
112015
Tighter security bound of MIBS block cipher against differential attack
X Ma, L Hu, S Sun, K Qiao, J Shan
International Conference on Network and System Security, 518-525, 2015
92015
Improved MILP modeling for automatic security evaluation and application to FOX
K Qiao, L Hu, S Sun, X Ma, H Kan
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015
82015
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
S Sun, L Hu, M Wang, Q Yang, K Qiao, X Ma, L Song, J Shan
International Conference on Information Security, 141-157, 2015
52015
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s
S Sun, L Hu, K Qiao, X Ma, J Shan, L Song
International Workshop on Security, 97-111, 2015
52015
SNR-centric power trace extractors for side-channel attacks
C Ou, SK Lam, D Sun, X Zhou, K Qiao, Q Wang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
22020
Leakage detection with Kolmogorov-smirnov test
X Zhou, K Qiao, C Ou
Cryptology ePrint Archive, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20