Qianqian Yang

Orcid: 0000-0002-2062-1344

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering / Data Assurance and Communication Security Research Center, Beijing, China


According to our database1, Qianqian Yang authored at least 23 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revisiting the shuffle of generalized Feistel structure.
Cybersecur., December, 2024

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
J. Cryptol., June, 2024

Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
IACR Cryptol. ePrint Arch., 2024

Generic Differential Key Recovery Attacks and Beyond.
IACR Cryptol. ePrint Arch., 2024

Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY.
IACR Cryptol. ePrint Arch., 2024

2023
Revisiting the Differential Meet-In-The-Middle Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY.
IACR Cryptol. ePrint Arch., 2023

Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies.
IACR Cryptol. ePrint Arch., 2023

Improved Differential Cryptanalysis on SPECK Using Plaintext Structures.
IACR Cryptol. ePrint Arch., 2023

Improving the Rectangle Attack on GIFT-64.
IACR Cryptol. ePrint Arch., 2023

Improved Boomerang Attacks on Deoxys-BC.
Proceedings of the Advances in Information and Computer Security, 2023

Improved Related-Key Rectangle Attack Against the Full AES-192.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
New Properties of the Double Boomerang Connectivity Table.
IACR Trans. Symmetric Cryptol., 2022

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
IACR Cryptol. ePrint Arch., 2022

2018
On the Complexity of Impossible Differential Cryptanalysis.
Secur. Commun. Networks, 2018

2017
Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Trans. Symmetric Cryptol., 2017

2016
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA.
IACR Cryptol. ePrint Arch., 2016

Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Related-key Impossible Differential Analysis of Full Khudra.
IACR Cryptol. ePrint Arch., 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

2014
Improved Differential Analysis of Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014


  Loading...