Meiqin Wang
Orcid: 0009-0004-2102-2206
According to our database1,
Meiqin Wang
authored at least 151 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations.
IACR Cryptol. ePrint Arch., 2024
Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium.
IACR Cryptol. ePrint Arch., 2024
On Constructing Pseudorandom Involutions: Feistel variants using a single round function.
IACR Cryptol. ePrint Arch., 2024
Eur. J. Comb., 2024
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation.
IACR Commun. Cryptol., 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations.
IACR Trans. Symmetric Cryptol., 2023
IACR Trans. Symmetric Cryptol., 2023
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Trans. Symmetric Cryptol., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper).
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities.
IACR Cryptol. ePrint Arch., 2023
Research on the Immune Microenvironment and Key Genes of Colorectal Cancer based on Transcriptome Data Mining.
Proceedings of the 15th International Conference on Computer Modeling and Simulation, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly 𝔽<sub>p</sub>-Based Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.
IACR Trans. Symmetric Cryptol., 2022
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs.
IACR Trans. Symmetric Cryptol., 2022
IACR Trans. Symmetric Cryptol., 2022
Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU.
IACR Trans. Symmetric Cryptol., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version).
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Des. Codes Cryptogr., 2022
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations.
Des. Codes Cryptogr., 2022
A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation.
Comput. Oper. Res., 2022
Sci. China Inf. Sci., 2022
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Progress in Cryptology, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
Accelerating the Search of Differential and Linear Characteristics with the SAT Method.
IACR Trans. Symmetric Cryptol., 2021
J. Comput. Sci. Technol., 2021
Inf. Process. Lett., 2021
IACR Cryptol. ePrint Arch., 2021
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Sci. China Inf. Sci., 2021
New automatic tool for finding impossible differentials and zero-correlation linear approximations.
Sci. China Inf. Sci., 2021
Cryptogr. Commun., 2021
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
Inf. Process. Lett., 2020
Optimised two-dimensional orthogonal matching pursuit algorithm via singular value decomposition.
IET Signal Process., 2020
MILP-aided bit-based division property for primitives with non-bit-permutation linear layers.
IET Inf. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Sci. China Inf. Sci., 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
2018
IACR Trans. Symmetric Cryptol., 2018
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version).
IACR Cryptol. ePrint Arch., 2018
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES.
IACR Cryptol. ePrint Arch., 2018
Zero-correlation attacks: statistical models independent of the number of approximations.
Des. Codes Cryptogr., 2018
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers.
Cryptogr. Commun., 2018
Proceedings of the 4th International Conference on Communication and Information Processing, 2018
2017
Secur. Commun. Networks, 2017
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property.
IACR Cryptol. ePrint Arch., 2017
Sci. China Inf. Sci., 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations.
IACR Cryptol. ePrint Arch., 2016
Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using χ<sup>2</sup>-method.
Des. Codes Cryptogr., 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
IACR Cryptol. ePrint Arch., 2015
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
J. Comput. Sci. Technol., 2014
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard.
Inf. Process. Lett., 2014
IACR Cryptol. ePrint Arch., 2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2014
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Sci. China Inf. Sci., 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
2005
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005