Meiqin Wang

Orcid: 0009-0004-2102-2206

According to our database1, Meiqin Wang authored at least 151 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cryptanalysis of Full-Round BipBip.
IACR Trans. Symmetric Cryptol., 2024

Integral Attack on the Full FUTURE Block Cipher.
IACR Cryptol. ePrint Arch., 2024

Improved Linear Key Recovery Attacks on PRESENT.
IACR Cryptol. ePrint Arch., 2024

Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations.
IACR Cryptol. ePrint Arch., 2024

Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium.
IACR Cryptol. ePrint Arch., 2024

On Constructing Pseudorandom Involutions: Feistel variants using a single round function.
IACR Cryptol. ePrint Arch., 2024

Exact values and improved bounds on k-neighborly families of boxes.
Eur. J. Comb., 2024

New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation.
IACR Commun. Cryptol., 2024

Construction of 4 ˟ 4 Lightweight Low-Latency Involutory MDS Matrices.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

New Strategy for Evaluating Differential Clustering Effect of uBlock.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations.
IACR Trans. Symmetric Cryptol., 2023

Improved Attacks on LowMC with Algebraic Techniques.
IACR Trans. Symmetric Cryptol., 2023

Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Trans. Symmetric Cryptol., 2023

Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version).
IACR Cryptol. ePrint Arch., 2023

An automated generation tool of hardware masked S-box: AGEMA<sup>+</sup>.
IACR Cryptol. ePrint Arch., 2023

Cryptanalysis of SPEEDY.
IACR Cryptol. ePrint Arch., 2023

SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper).
IACR Cryptol. ePrint Arch., 2023

Improved Heuristics for Low-latency Implementations of Linear Layers.
IACR Cryptol. ePrint Arch., 2023

Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits.
IACR Cryptol. ePrint Arch., 2023

From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers.
IACR Cryptol. ePrint Arch., 2023

Probabilistic Related-Key Statistical Saturation Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities.
IACR Cryptol. ePrint Arch., 2023

Research on the Immune Microenvironment and Key Genes of Colorectal Cancer based on Transcriptome Data Mining.
Proceedings of the 15th International Conference on Computer Modeling and Simulation, 2023

Full Round Distinguishing and Key-Recovery Attacks on SAND-2.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly 𝔽<sub>p</sub>-Based Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.
IACR Trans. Symmetric Cryptol., 2022

More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs.
IACR Trans. Symmetric Cryptol., 2022

Towards Low-Latency Implementation of Linear Layers.
IACR Trans. Symmetric Cryptol., 2022

Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU.
IACR Trans. Symmetric Cryptol., 2022

A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis.
IACR Cryptol. ePrint Arch., 2022

Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies.
IACR Cryptol. ePrint Arch., 2022

Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3.
IACR Cryptol. ePrint Arch., 2022

On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version).
IACR Cryptol. ePrint Arch., 2022

Finding All Impossible Differentials When Considering the DDT.
IACR Cryptol. ePrint Arch., 2022

Key-Recovery Attacks on CRAFT and WARP (Full Version).
IACR Cryptol. ePrint Arch., 2022

An STP-based model toward designing S-boxes with good cryptographic properties.
Des. Codes Cryptogr., 2022

SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations.
Des. Codes Cryptogr., 2022

A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation.
Comput. Oper. Res., 2022

Related-tweakey impossible differential attack on QARMA-128.
Sci. China Inf. Sci., 2022

Cryptanalysis of the AEAD and hash algorithm DryGASCON.
Cryptogr. Commun., 2022

A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

Key-Recovery Attacks on CRAFT and WARP.
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022

Improved Truncated Differential Distinguishers of AES with Concrete S-Box.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

How Fast Can SM4 be in Software?
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Automated Key Recovery Attacks on Round-Reduced Orthros.
Proceedings of the Progress in Cryptology, 2022

2021
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.
IACR Trans. Symmetric Cryptol., 2021

Accelerating the Search of Differential and Linear Characteristics with the SAT Method.
IACR Trans. Symmetric Cryptol., 2021

A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks.
J. Comput. Sci. Technol., 2021

Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC.
Inf. Process. Lett., 2021

Improved Attacks on GIFT-64.
IACR Cryptol. ePrint Arch., 2021

Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES.
IACR Cryptol. ePrint Arch., 2021

Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.
IACR Cryptol. ePrint Arch., 2021

Massive Superpoly Recovery with Nested Monomial Predictions.
IACR Cryptol. ePrint Arch., 2021

Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128.
IACR Cryptol. ePrint Arch., 2021

STP models of optimal differential and linear trail for S-box based ciphers.
Sci. China Inf. Sci., 2021

New automatic tool for finding impossible differentials and zero-correlation linear approximations.
Sci. China Inf. Sci., 2021

Investigation for 8-bit SKINNY-like S-boxes, analysis and applications.
Cryptogr. Commun., 2021

Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Forced Independent Optimized Implementation of 4-Bit S-Box.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers.
IACR Trans. Symmetric Cryptol., 2020

Finding Bit-Based Division Property for Ciphers with Complex Linear Layers.
IACR Trans. Symmetric Cryptol., 2020

Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions.
IACR Trans. Symmetric Cryptol., 2020

Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks.
IACR Trans. Symmetric Cryptol., 2020

Distinguisher on full-round compression function of GOST R.
Inf. Process. Lett., 2020

Optimised two-dimensional orthogonal matching pursuit algorithm via singular value decomposition.
IET Signal Process., 2020

MILP-aided bit-based division property for primitives with non-bit-permutation linear layers.
IET Inf. Secur., 2020

Finding Bit-Based Division Property for Ciphers with Complex Linear Layer.
IACR Cryptol. ePrint Arch., 2020

An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
IACR Cryptol. ePrint Arch., 2020

MixColumns Coefficient Property and Security of the AES with A Secret S-Box.
IACR Cryptol. ePrint Arch., 2020

SCNet: A Neural Network for Automated Side-Channel Attack.
CoRR, 2020

Cryptanalysis of PRIMATEs.
Sci. China Inf. Sci., 2020

2019
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.
IACR Trans. Symmetric Cryptol., 2019

Cryptanalysis of the Lightweight Block Cipher BORON.
Secur. Commun. Networks, 2019

New Distinguisher on Reduced-Round Keccak Sponge Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Universal Forgery Attack against GCM-RUP.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of MORUS.
Des. Codes Cryptogr., 2019

Automatic search method for multiple differentials and its application on MANTIS.
Sci. China Inf. Sci., 2019

Automatic Search for a Variant of Division Property Using Three Subsets.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
More Accurate Differential Properties of LED64 and Midori64.
IACR Trans. Symmetric Cryptol., 2018

Cryptanalysis of AES-PRF and Its Dual.
IACR Trans. Symmetric Cryptol., 2018

Automatic Search for A Variant of Division Property Using Three Subsets (Full Version).
IACR Cryptol. ePrint Arch., 2018

Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES.
IACR Cryptol. ePrint Arch., 2018

Zero-correlation attacks: statistical models independent of the number of approximations.
Des. Codes Cryptogr., 2018

MILP-aided bit-based division property for ARX ciphers.
Sci. China Inf. Sci., 2018

Statistical integral attack on CAST-256 and IDEA.
Cryptogr. Commun., 2018

Statistical integral distinguisher with multi-structure and its application on AES-like ciphers.
Cryptogr. Commun., 2018

A SVD-based 2DOMP algorithm for compressed image sensing.
Proceedings of the 4th International Conference on Communication and Information Processing, 2018

2017
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4.
Secur. Commun. Networks, 2017

New integral attacks on SIMON.
IET Inf. Secur., 2017

Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property.
IACR Cryptol. ePrint Arch., 2017

Toward a further understanding of bit-based division property.
Sci. China Inf. Sci., 2017

Cryptanalysis of round-reduced ASCON.
Sci. China Inf. Sci., 2017

Leucorrhea-wet-film recognition based on coarse-to-fine CNN-SVM.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Statistical Integral Distinguisher with Multi-structure and Its Application on AES.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Linear cryptanalysis of reduced-round SPECK.
Inf. Process. Lett., 2016

Integrals go Statistical: Cryptanalysis of Full Skipjack Variants.
IACR Cryptol. ePrint Arch., 2016

MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016

Conditional Cube Attack on Reduced-Round Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2016

MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016

New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations.
IACR Cryptol. ePrint Arch., 2016

Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using χ<sup>2</sup>-method.
Des. Codes Cryptogr., 2016

MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Improved Differential Cryptanalysis of CAST-128 and CAST-256.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
New Impossible Differential Attack on SAFER Block Cipher Family.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015

Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
IACR Cryptol. ePrint Arch., 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

Improved Zero-Correlation Cryptanalysis on SIMON.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Improved Linear Cryptanalysis of CAST-256.
J. Comput. Sci. Technol., 2014

Related-Key Impossible Differential Attack on Reduced-Round LBlock.
J. Comput. Sci. Technol., 2014

Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard.
Inf. Process. Lett., 2014

Differential Analysis on Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014

Note of Multidimensional MITM Attack on 25-Round TWINE-128.
IACR Cryptol. ePrint Arch., 2014

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014

General Application of FFT in Cryptanalysis and Improved Attack on CAST-256.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Multidimensional Zero-Correlation Linear Cryptanalysis of E2.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2014

Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Key Difference Invariant Bias in Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
New Impossible Differential Attack on SAFER<sub>+</sub> and SAFER<sub>++</sub>.
IACR Cryptol. ePrint Arch., 2012

Linear Cryptanalysis of Reduced-Round ICEBERG.
Proceedings of the Information Security Practice and Experience, 2012

New Impossible Differential Attack on SAFER + and SAFER + +.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

A Model for Structure Attacks, with Applications to PRESENT and Serpent.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Zero Correlation Linear Cryptanalysis with Reduced Data Complexity.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Integral and Multidimensional Linear Distinguishers with Correlation Zero.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Differential Cryptanalysis of Reduced-Round ICEBERG.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT.
IACR Cryptol. ePrint Arch., 2011

Practical Attack on the Full MMB Block Cipher.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

How to search linear approximation for large non-surjective S-box.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Algebraic Techniques in Differential Cryptanalysis Revisited.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
New Differential Cryptanalytic Results for Reduced-Round CAST-128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Practical-time Attack on the Full MMB Block Cipher.
IACR Cryptol. ePrint Arch., 2010

Effect of the Dependent Paths in Linear Hull.
IACR Cryptol. ePrint Arch., 2010

Differential-algebraic cryptanalysis of reduced-round of Serpent-256.
Sci. China Inf. Sci., 2010

2009
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of the Full MMB Block Cipher.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

New Distinguishing Attack on MAC Using Secret-Prefix Method.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Side Channel Cube Attack on PRESENT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Differential Cryptanalysis of Reduced-Round PRESENT.
Proceedings of the Progress in Cryptology, 2008

2007
Differential Cryptanalysis of PRESENT.
IACR Cryptol. ePrint Arch., 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Periodicity and Application for a kind of n-dimensional Arnold-type Transformation.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

2006
Security Analysis of Routing Protocol for MANET.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
A security analysis method for routing protocol in MANET.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005


  Loading...