Calculated based on number of publications stored in Pure and citations from Scopus
20142024

Research activity per year

Filter
Conference contribution

Search results

  • 2023

    Improved Graph-Based Model for Recovering Superpoly on Trivium

    Cheng, J. & Qiao, K., 2023, Topics in Cryptology – CT-RSA 2023 - Cryptographers’ Track at the RSA Conference 2023, Proceedings. Rosulek, M. (ed.). Springer Science and Business Media Deutschland GmbH, p. 225-251 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13871 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK

    Zhang, Y., Lyu, L., Qiao, K., Zhang, Z., Sun, S. & Hu, L., 2021, Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Proceedings. Deng, R., Bao, F., Wang, G., Shen, J., Ryan, M., Meng, W. & Wang, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 147-167 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Citation (Scopus)
  • 2020

    VGG-based side channel attack on RSA implementation

    Lei, Q., Li, C., Qiao, K., Ma, Z. & Yang, B., Dec 2020, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020. Wang, G., Ko, R., Bhuiyan, M. Z. A. & Pan, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1157-1161 5 p. 9343196. (Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • 2017

    Differential analysis on simeck and SIMON with dynamic key-guessing techniques

    Qiao, K., Hu, L. & Sun, S., 2017, Information Systems Security and Privacy - 2nd International Conference, ICISSP 2016, Revised Selected Papers. Mori, P., Furnell, S. & Camp, O. (eds.). Springer Verlag, p. 64-85 22 p. (Communications in Computer and Information Science; vol. 691).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Citations (Scopus)
  • New collision attacks on round-reduced KECCAK

    Qiao, K., Song, L., Liu, M. & Guo, J., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 216-243 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10212 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Citations (Scopus)
  • 2016

    Differential security evaluation of simeck with dynamic key-guebing techniques

    Qiao, K., Hu, L. & Sun, S., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Furnell, S., Camp, O. & Mori, P. (eds.). SciTePress, p. 74-84 11 p. (ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • 2015

    Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis

    Sun, S., Hu, L., Wang, M., Yang, Q., Qiao, K., Ma, X., Song, L. & Shan, J., 2015, Information Security - 18th International Conference, ISC 2015, Proceedings. Lopez, J. & Mitchell, C. J. (eds.). Springer Verlag, p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9290).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Improved differential analysis of block cipher PRIDE

    Yang, Q., Hu, L., Sun, S., Qiao, K., Song, L., Shan, J. & Ma, X., 2015, Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Proceedings. Lopez, J. & Wu, Y. (eds.). Springer Verlag, p. 209-219 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9065).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s

    Sun, S., Hu, L., Qiao, K., Ma, X., Shan, J. & Song, L., 2015, Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Tanaka, K. & Suga, Y. (eds.). Springer Verlag, p. 97-111 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9241).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Related-key rectangle attack on round-reduced khudra block cipher

    Ma, X. & Qiao, K., 2015, Network and System Security - 9th International Conference, NSS 2015, Proceedings. Xu, S., Qiu, M., Zhang, H. & Yung, M. (eds.). Springer Verlag, p. 331-344 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • Related-key rectangle cryptanalysis of reduced-round block cipher MIBS

    Qiao, K., Hu, L., Sun, S. & Ma, X., 25 Nov 2015, 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 216-220 5 p. 7338549. (9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2014

    Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers

    Sun, S., Hu, L., Wang, P., Qiao, K., Ma, X. & Song, L., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer Verlag, p. 158-178 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    313 Citations (Scopus)
  • Tighter security bound of MIBS block cipher against differential attack

    Ma, X., Hu, L., Sun, S., Qiao, K. & Shan, J., 2014, Network and System Security - 8th International Conference, NSS 2014, Proceedings. Au, M. H., Carminati, B. & Kuo, C.-C. J. (eds.). Springer Verlag, p. 518-525 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8792).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)