Keting Jia
Orcid: 0000-0002-6396-8882
According to our database1,
Keting Jia
authored at least 50 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
2023
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny.
IACR Trans. Symmetric Cryptol., 2021
IACR Trans. Symmetric Cryptol., 2021
Comput. J., 2021
Sci. China Inf. Sci., 2021
New automatic tool for finding impossible differentials and zero-correlation linear approximations.
Sci. China Inf. Sci., 2021
2020
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128.
IACR Cryptol. ePrint Arch., 2020
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT.
Des. Codes Cryptogr., 2020
Comput. J., 2020
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers.
Sci. China Inf. Sci., 2020
2019
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect.
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version).
IACR Cryptol. ePrint Arch., 2019
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version).
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Provable Security, 2019
Proceedings of the Information Security Practice and Experience, 2019
2018
Sci. China Inf. Sci., 2018
2016
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008