Follow
Kexin Qiao
Kexin Qiao
Chinese Academy of Sciences
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block ciphers
S Sun, L Hu, P Wang, K Qiao, X Ma, L Song
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
4332014
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined …
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
Cryptology ePrint Archive, 2014
1412014
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
912017
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2016
642016
New collision attacks on round-reduced Keccak
K Qiao, L Song, M Liu, J Guo
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
542017
Practical collision attacks against round-reduced SHA-3
J Guo, G Liao, G Liu, M Liu, K Qiao, L Song
Journal of Cryptology 33, 228-270, 2020
492020
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
D Shi, L Hu, S Sun, L Song, K Qiao, X Ma
Cryptology ePrint Archive, 2014
402014
Differential analysis on simeck and simon with dynamic key-guessing techniques
K Qiao, L Hu, S Sun
Information Systems Security and Privacy: Second International Conference …, 2017
392017
Invariant subspace attack against full midori64
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2015
322015
Improved differential analysis of block cipher PRIDE
Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma
Information Security Practice and Experience: 11th International Conference …, 2015
242015
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song
IACR Cryptol. ePrint Arch. 2014, 747, 2014
242014
Differential security evaluation of simeck with dynamic key-guessing techniques.
K Qiao, L Hu, S Sun
IACR Cryptol. ePrint Arch. 2015, 902, 2015
222015
Constructing mixed-integer programming models whose feasible region is exactly the set of all valid differential characteristics of SIMON
S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu
Cryptology ePrint Archive, 2015
162015
Related-key rectangle attack on round-reduced Khudra block cipher
X Ma, K Qiao
International Conference on Network and System Security, 331-344, 2015
112015
Improved MILP modeling for automatic security evaluation and application to FOX
K Qiao, L Hu, S Sun, X Ma, H Kan
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015
92015
Tighter security bound of MIBS block cipher against differential attack
X Ma, L Hu, S Sun, K Qiao, J Shan
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
92014
Leakage detection with Kolmogorov-Smirnov test
X Zhou, K Qiao, C Ou
Cryptology ePrint Archive, 2019
72019
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
S Sun, L Hu, M Wang, Q Yang, K Qiao, X Ma, L Song, J Shan
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
62015
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s
S Sun, L Hu, K Qiao, X Ma, J Shan, L Song
Advances in Information and Computer Security: 10th International Workshop …, 2015
52015
SNR-centric power trace extractors for side-channel attacks
C Ou, SK Lam, D Sun, X Zhou, K Qiao, Q Wang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20