Kexin Qiao

Orcid: 0000-0002-3624-9364

According to our database1, Kexin Qiao authored at least 29 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bitwise Mixture Differential Cryptanalysis and Its Application to SIMON.
IEEE Internet Things J., July, 2024

Security Evaluation of Lightweight Block Ciphers Against Mixture Differential Cryptanalysis.
IEEE Internet Things J., June, 2024

Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks.
IACR Cryptol. ePrint Arch., 2024

A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2024

2023
CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

Improved Graph-Based Model for Recovering Superpoly on Trivium.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

2021
SNR-Centric Power Trace Extractors for Side-Channel Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2021

Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
Practical Collision Attacks against Round-Reduced SHA-3.
J. Cryptol., 2020

VGG-based side channel attack on RSA implementation.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Leakage Detection with Kolmogorov-Smirnov Test.
IACR Cryptol. ePrint Arch., 2019

2017
Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Trans. Symmetric Cryptol., 2017

New Collision Attacks on Round-Reduced Keccak.
IACR Cryptol. ePrint Arch., 2017

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.
Sci. China Inf. Sci., 2017

2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016

Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques.
Proceedings of the Information Systems Security and Privacy, 2016

2015
Improved MILP Modeling for Automatic Security Evaluation and Application to FOX.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015

Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.
IACR Cryptol. ePrint Arch., 2015

Related-Key Rectangle Attack on Round-reduced <i>Khudra</i> Block Cipher.
IACR Cryptol. ePrint Arch., 2015

Invariant Subspace Attack Against Full Midori64.
IACR Cryptol. ePrint Arch., 2015

Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher.
Proceedings of the Network and System Security - 9th International Conference, 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

2014
Improved Differential Analysis of Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014

Tighter Security Bound of MIBS Block Cipher against Differential Attack.
Proceedings of the Network and System Security - 8th International Conference, 2014

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014


  Loading...