Yongqiang Li
Orcid: 0000-0002-2551-2737Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
According to our database1,
Yongqiang Li
authored at least 42 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, May, 2024
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA.
IET Inf. Secur., 2024
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods.
IACR Cryptol. ePrint Arch., 2024
2023
Cybersecur., December, 2023
Des. Codes Cryptogr., May, 2023
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Adv. Math. Commun., 2023
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
On the upper bound of squared correlation of SIMON-like functions and its applications.
IET Inf. Secur., 2022
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.
IACR Cryptol. ePrint Arch., 2022
New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes.
Comput. J., 2022
2021
IEEE Trans. Inf. Theory, 2021
2020
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version).
IACR Cryptol. ePrint Arch., 2020
Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9.
Finite Fields Their Appl., 2020
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9.
IACR Cryptol. ePrint Arch., 2019
2018
Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
Finite Fields Their Appl., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Sci. China Inf. Sci., 2016
2015
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions.
IACR Cryptol. ePrint Arch., 2015
2014
Des. Codes Cryptogr., 2014
Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1).
Des. Codes Cryptogr., 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
2013
IEEE Trans. Inf. Theory, 2013
Constructing Differentially 4-uniform Permutations over GF(2<sup>2k</sup>) from the Inverse Function Revisited.
IACR Cryptol. ePrint Arch., 2013
2012
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Constructing differentially 4-uniform permutations over 2<sup>2m</sup> from quadratic APN permutations over 2<sup>2m+1</sup>.
IACR Cryptol. ePrint Arch., 2011
Des. Codes Cryptogr., 2011
Permutation polynomials EA-equivalent to the inverse function over GF (2<sup><i>n</i></sup>).
Cryptogr. Commun., 2011
2010
On permutation polynomials EA-equivalent to the inverse function over GF(2<sup>n</sup>).
IACR Cryptol. ePrint Arch., 2010