Follow
Qingju Wang
Qingju Wang
Telecom Paris, Institut Polytechnique de Paris
Verified email at telecom-paris.fr - Homepage
Title
Cited by
Cited by
Year
Differential and linear cryptanalysis using mixed-integer linear programming
N Mouha, Q Wang, D Gu, B Preneel
Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012
5402012
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
B Bilgin, A Bogdanov, M Knežević, F Mendel, Q Wang
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
1582013
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
1282014
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Annual Cryptology Conference 2018 - CRYPTO 2018 1, 275-305, 2018
1082018
Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead
Y Hao, G Leander, W Meier, Y Todo, Q Wang
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
104*2020
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H Alkhzaimi, C Li
Annual Cryptology Conference - CRYPTO 2015, 95-115, 2015
982015
Optimized interpolation attacks on LowMC
I Dinur, Y Liu, W Meier, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2015
922015
Automatic search of linear trails in ARX with applications to SPECK and Chaskey
Y Liu, Q Wang, V Rijmen
Applied Cryptography and Network Security: 14th International Conference …, 2016
842016
Schwaemm and Esch: Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family
C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ...
792019
Lightweight AEAD and hashing using the sparkle permutation family
C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ...
IACR Transactions on Symmetric Cryptology 2020 (S1), 208-261, 2020
752020
PRIMATEs v1. Submission to the CAESAR Competition (2014)
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
75*2014
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
K Hu, S Sun, M Wang, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2020
682020
An algebraic attack on ciphers with low-degree round functions: application to full MiMC
M Eichlseder, L Grassi, R Lüftenegger, M Øygarden, C Rechberger, ...
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
602020
Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX)
C Beierle, A Biryukov, L Cardoso dos Santos, J Großschädl, L Perrin, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
592020
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
L Grassi, Y Hao, C Rechberger, M Schofnegger, R Walch, Q Wang
Annual International Cryptology Conference, 573-606, 2023
512023
Design of lightweight linear diffusion layers from near-MDS matrices
C Li, Q Wang
Cryptology ePrint Archive, 2017
392017
Zero-sum partitions of PHOTON permutations
Q Wang, L Grassi, C Rechberger
Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018
352018
Massive superpoly recovery with nested monomial predictions
K Hu, S Sun, Y Todo, M Wang, Q Wang
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
332021
Finding bit-based division property for ciphers with complex linear layers
K Hu, Q Wang, M Wang
IACR Transactions on Symmetric Cryptology, 396-424, 2020
202020
Improved impossible differential attacks on large-block Rijndael
Q Wang, D Gu, V Rijmen, Y Liu, J Chen, A Bogdanov
International Conference on Information Security and Cryptology, 126-140, 2012
172012
The system can't perform the operation now. Try again later.
Articles 1–20