default search action
Meiqin Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang:
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation. IACR Commun. Cryptol. 1(1): 31 (2024) - [j52]Xinbu Cheng, Meiqin Wang, Zixiang Xu, Chi Hoi Yip:
Exact values and improved bounds on k-neighborly families of boxes. Eur. J. Comb. 118: 103926 (2024) - [j51]Jinliang Wang, Christina Boura, Patrick Derbez, Kai Hu, Muzhou Li, Meiqin Wang:
Cryptanalysis of Full-Round BipBip. IACR Trans. Symmetric Cryptol. 2024(2): 68-84 (2024) - [c74]Chen Wang, Jinliang Wang, Muzhou Li, Meiqin Wang:
New Strategy for Evaluating Differential Clustering Effect of uBlock. ACISP (2) 2024: 205-224 - [c73]Zheng Zhao, Qun Liu, Yanhong Fan, Meiqin Wang:
Construction of 4 ˟ 4 Lightweight Low-Latency Involutory MDS Matrices. ACNS Workshops (2) 2024: 119-140 - [c72]Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang:
Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits. ACNS Workshops (1) 2024: 319-339 - [c71]Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang:
Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations. CRYPTO (4) 2024: 73-104 - [c70]Jiahui He, Kai Hu, Hao Lei, Meiqin Wang:
Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium. EUROCRYPT (1) 2024: 368-397 - [i64]Wenhui Wu, Muzhou Li, Meiqin Wang:
Improved Linear Key Recovery Attacks on PRESENT. IACR Cryptol. ePrint Arch. 2024: 113 (2024) - [i63]Jiahui He, Kai Hu, Hao Lei, Meiqin Wang:
Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium. IACR Cryptol. ePrint Arch. 2024: 342 (2024) - [i62]Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang:
Integral Attack on the Full FUTURE Block Cipher. IACR Cryptol. ePrint Arch. 2024: 549 (2024) - [i61]Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang:
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation. IACR Cryptol. ePrint Arch. 2024: 620 (2024) - [i60]Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang:
Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations. IACR Cryptol. ePrint Arch. 2024: 857 (2024) - [i59]Chun Guo, Meiqin Wang, Weijia Wang:
On Constructing Pseudorandom Involutions: Feistel variants using a single round function. IACR Cryptol. ePrint Arch. 2024: 1634 (2024) - 2023
- [j50]Ling Sun, Meiqin Wang:
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations. IACR Trans. Symmetric Cryptol. 2023(1): 111-151 (2023) - [j49]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. IACR Trans. Symmetric Cryptol. 2023(2): 132-175 (2023) - [j48]Yimeng Sun, Jiamin Cui, Meiqin Wang:
Improved Attacks on LowMC with Algebraic Techniques. IACR Trans. Symmetric Cryptol. 2023(4): 143-165 (2023) - [c69]Zeyu Xu, Shiyao Chen, Meiqin Wang, Puwen Wei:
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly 𝔽p-Based Ciphers. ACISP 2023: 25-52 - [c68]Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. ACISP 2023: 124-156 - [c67]Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang:
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers. AFRICACRYPT 2023: 204-226 - [c66]Qun Liu, Bart Preneel, Zheng Zhao, Meiqin Wang:
Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits. ASIACRYPT (3) 2023: 67-98 - [c65]Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2. Inscrypt (2) 2023: 230-250 - [c64]Qun Liu, Zheng Zhao, Meiqin Wang:
Improved Heuristics for Low-Latency Implementations of Linear Layers. CT-RSA 2023: 524-550 - [c63]Meiqin Wang, Lingyu Wang, Ningning Li, Fengdong Sun:
Research on the Immune Microenvironment and Key Genes of Colorectal Cancer based on Transcriptome Data Mining. ICCMS 2023: 57-62 - [c62]Hao Lei, Jiahui He, Kai Hu, Meiqin Wang:
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities. SAC 2023: 3-21 - [c61]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. SAC 2023: 213-232 - [i58]Ling Sun, Meiqin Wang:
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper). IACR Cryptol. ePrint Arch. 2023: 109 (2023) - [i57]Qun Liu, Zheng Zhao, Meiqin Wang:
Improved Heuristics for Low-latency Implementations of Linear Layers. IACR Cryptol. ePrint Arch. 2023: 174 (2023) - [i56]Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. IACR Cryptol. ePrint Arch. 2023: 612 (2023) - [i55]Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang:
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 676 (2023) - [i54]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. IACR Cryptol. ePrint Arch. 2023: 748 (2023) - [i53]Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang:
An automated generation tool of hardware masked S-box: AGEMA+. IACR Cryptol. ePrint Arch. 2023: 831 (2023) - [i52]Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang:
An STP-based model toward designing S-boxes with good cryptographic properties. IACR Cryptol. ePrint Arch. 2023: 1023 (2023) - [i51]Hao Lei, Jiahui He, Kai Hu, Meiqin Wang:
More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities. IACR Cryptol. ePrint Arch. 2023: 1237 (2023) - [i50]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 1245 (2023) - [i49]Qun Liu, Bart Preneel, Zheng Zhao, Meiqin Wang:
Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits. IACR Cryptol. ePrint Arch. 2023: 1417 (2023) - [i48]Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version). IACR Cryptol. ePrint Arch. 2023: 1697 (2023) - [i47]Yimeng Sun, Jiamin Cui, Meiqin Wang:
Improved Attacks on LowMC with Algebraic Techniques. IACR Cryptol. ePrint Arch. 2023: 1718 (2023) - 2022
- [j47]Huicong Liang, Sihem Mesnager, Meiqin Wang:
Cryptanalysis of the AEAD and hash algorithm DryGASCON. Cryptogr. Commun. 14(3): 597-625 (2022) - [j46]Juan Du, Wei Wang, Muzhou Li, Meiqin Wang:
Related-tweakey impossible differential attack on QARMA-128. Sci. China Inf. Sci. 65(2) (2022) - [j45]Yongsen Zang, Meiqin Wang, Mingyao Qi:
A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation. Comput. Oper. Res. 137: 105527 (2022) - [j44]Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo:
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. Des. Codes Cryptogr. 90(1): 155-198 (2022) - [j43]Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang:
An STP-based model toward designing S-boxes with good cryptographic properties. Des. Codes Cryptogr. 90(5): 1179-1202 (2022) - [j42]Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang:
Towards Low-Latency Implementation of Linear Layers. IACR Trans. Symmetric Cryptol. 2022(1): 158-182 (2022) - [j41]Ling Sun, Wei Wang, Meiqin Wang:
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Trans. Symmetric Cryptol. 2022(1): 212-219 (2022) - [j40]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU. IACR Trans. Symmetric Cryptol. 2022(2): 161-200 (2022) - [j39]Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang:
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs. IACR Trans. Symmetric Cryptol. 2022(2): 351-378 (2022) - [c60]Muzhou Li, Ling Sun, Meiqin Wang:
Automated Key Recovery Attacks on Round-Reduced Orthros. AFRICACRYPT 2022: 189-213 - [c59]Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei:
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC. ASIACRYPT (3) 2022: 241-270 - [c58]Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang:
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies. ASIACRYPT (4) 2022: 537-566 - [c57]Xin Miao, Chun Guo, Meiqin Wang, Weijia Wang:
How Fast Can SM4 be in Software? Inscrypt 2022: 3-22 - [c56]Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang:
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. CT-RSA 2022: 223-246 - [c55]Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. CT-RSA 2022: 247-271 - [c54]Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang:
A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis. EUROCRYPT (3) 2022: 115-144 - [c53]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures. ICISC 2022: 41-60 - [c52]Chengcheng Chang, Meiqin Wang, Ling Sun, Wei Wang:
Improved Truncated Differential Distinguishers of AES with Concrete S-Box. INDOCRYPT 2022: 422-445 - [c51]Ling Sun, Wei Wang, Meiqin Wang:
Key-Recovery Attacks on CRAFT and WARP. SAC 2022: 77-95 - [c50]Kai Hu, Thomas Peyrin, Meiqin Wang:
Finding All Impossible Differentials When Considering the DDT. SAC 2022: 285-305 - [c49]Yanmin Zhao, Yang Wang, Siu Ming Yiu, Yu Liu, Meiqin Wang:
A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions. STM 2022: 24-51 - [i46]Ling Sun, Wei Wang, Meiqin Wang:
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Cryptol. ePrint Arch. 2022: 151 (2022) - [i45]Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang:
Towards Low-Latency Implementation of Linear Layers. IACR Cryptol. ePrint Arch. 2022: 231 (2022) - [i44]Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang:
A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis. IACR Cryptol. ePrint Arch. 2022: 243 (2022) - [i43]Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. IACR Cryptol. ePrint Arch. 2022: 299 (2022) - [i42]Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang:
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs. IACR Cryptol. ePrint Arch. 2022: 747 (2022) - [i41]Ling Sun, Wei Wang, Meiqin Wang:
Key-Recovery Attacks on CRAFT and WARP (Full Version). IACR Cryptol. ePrint Arch. 2022: 997 (2022) - [i40]Kai Hu, Thomas Peyrin, Meiqin Wang:
Finding All Impossible Differentials When Considering the DDT. IACR Cryptol. ePrint Arch. 2022: 1034 (2022) - [i39]Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei:
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version). IACR Cryptol. ePrint Arch. 2022: 1210 (2022) - [i38]Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang:
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies. IACR Cryptol. ePrint Arch. 2022: 1218 (2022) - 2021
- [j38]Yanhong Fan, Sihem Mesnager, Weijia Wang, Yongqing Li, Tingting Cui, Meiqin Wang:
Investigation for 8-bit SKINNY-like S-boxes, analysis and applications. Cryptogr. Commun. 13(5): 617-636 (2021) - [j37]Tingting Cui, Shiyao Chen, Kai Fu, Meiqin Wang, Keting Jia:
New automatic tool for finding impossible differentials and zero-correlation linear approximations. Sci. China Inf. Sci. 64(2) (2021) - [j36]Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang:
STP models of optimal differential and linear trail for S-box based ciphers. Sci. China Inf. Sci. 64(5) (2021) - [j35]Zishen Zhao, Shiyao Chen, Meiqin Wang, Wei Wang:
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC. Inf. Process. Lett. 171: 106124 (2021) - [j34]Yan-Hong Fan, Mei-Qin Wang, Yan-Bin Li, Kai Hu, Muzhou Li:
A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks. J. Comput. Sci. Technol. 36(2): 419-433 (2021) - [j33]Ling Sun, Wei Wang, Meiqin Wang:
Accelerating the Search of Differential and Linear Characteristics with the SAT Method. IACR Trans. Symmetric Cryptol. 2021(1): 269-315 (2021) - [j32]Ling Sun, Wei Wang, Meiqin Wang:
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Trans. Symmetric Cryptol. 2021(2): 199-221 (2021) - [c48]Yanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu, Siu-Ming Yiu, Meiqin Wang:
Forced Independent Optimized Implementation of 4-Bit S-Box. ACISP 2021: 151-170 - [c47]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. ASIACRYPT (1) 2021: 392-421 - [c46]Chao Niu, Muzhou Li, Siwei Sun, Meiqin Wang:
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys. CT-RSA 2021: 126-147 - [c45]Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang:
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes. INDOCRYPT 2021: 159-178 - [c44]Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. SAC 2021: 223-245 - [c43]Ling Sun, Wei Wang, Meiqin Wang:
Improved Attacks on GIFT-64. SAC 2021: 246-265 - [i37]Ling Sun, Wei Wang, Meiqin Wang:
Accelerating the Search of Differential and Linear Characteristics with the SAT Method. IACR Cryptol. ePrint Arch. 2021: 213 (2021) - [i36]Ling Sun, Wei Wang, Meiqin Wang:
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Cryptol. ePrint Arch. 2021: 661 (2021) - [i35]Ling Sun, Wei Wang, Meiqin Wang:
Improved Attacks on GIFT-64. IACR Cryptol. ePrint Arch. 2021: 1179 (2021) - [i34]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. IACR Cryptol. ePrint Arch. 2021: 1225 (2021) - [i33]Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. IACR Cryptol. ePrint Arch. 2021: 1310 (2021) - [i32]Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo:
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. IACR Cryptol. ePrint Arch. 2021: 1560 (2021) - [i31]Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang:
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. IACR Cryptol. ePrint Arch. 2021: 1572 (2021) - [i30]Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang:
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes. IACR Cryptol. ePrint Arch. 2021: 1644 (2021) - 2020
- [j31]Yanbin Li, Meiqin Wang, Wenqing Liu, Wei Wang:
Cryptanalysis of PRIMATEs. Sci. China Inf. Sci. 63(1): 112106 (2020) - [j30]Ling Sun, Wei Wang, Meiqin Wang:
MILP-aided bit-based division property for primitives with non-bit-permutation linear layers. IET Inf. Secur. 14(1): 12-20 (2020) - [j29]Cheng Zhang, Qianwen Chen, Meiqin Wang, Sui Wei:
Optimised two-dimensional orthogonal matching pursuit algorithm via singular value decomposition. IET Signal Process. 14(10): 717-724 (2020) - [j28]Tingting Cui, Wei Wang, Meiqin Wang:
Distinguisher on full-round compression function of GOST R. Inf. Process. Lett. 156: 105902 (2020) - [j27]Kai Hu, Qingju Wang, Meiqin Wang:
Finding Bit-Based Division Property for Ciphers with Complex Linear Layers. IACR Trans. Symmetric Cryptol. 2020(1): 396-424 (2020) - [j26]Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Trans. Symmetric Cryptol. 2020(3): 119-151 (2020) - [j25]Ling Sun, David Gérault, Wei Wang, Meiqin Wang:
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers. IACR Trans. Symmetric Cryptol. 2020(3): 262-287 (2020) - [j24]Yuan Gao, Chun Guo, Meiqin Wang, Weijia Wang, Jiejing Wen:
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks. IACR Trans. Symmetric Cryptol. 2020(3): 305-326 (2020) - [c42]Xin An, Kai Hu, Meiqin Wang:
MixColumns Coefficient Property and Security of the AES with A Secret S-Box. AFRICACRYPT 2020: 114-131 - [c41]Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. ASIACRYPT (1) 2020: 446-476 - [c40]Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack Against GCM-RUP. CT-RSA 2020: 15-34 - [i29]Guanlin Li, Chang Liu, Han Yu, Yanhong Fan, Libang Zhang, Zongyue Wang, Meiqin Wang:
SCNet: A Neural Network for Automated Side-Channel Attack. CoRR abs/2008.00476 (2020) - [i28]Xin An, Kai Hu, Meiqin Wang:
MixColumns Coefficient Property and Security of the AES with A Secret S-Box. IACR Cryptol. ePrint Arch. 2020: 546 (2020) - [i27]Kai Hu, Qingju Wang, Meiqin Wang:
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer. IACR Cryptol. ePrint Arch. 2020: 547 (2020) - [i26]Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. IACR Cryptol. ePrint Arch. 2020: 1048 (2020) - [i25]Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Cryptol. ePrint Arch. 2020: 1177 (2020)
2010 – 2019
- 2019
- [j23]Shiyao Chen, Ru Liu, Tingting Cui, Meiqin Wang:
Automatic search method for multiple differentials and its application on MANTIS. Sci. China Inf. Sci. 62(3): 32111:1-32111:15 (2019) - [j22]Yanbin Li, Meiqin Wang:
Cryptanalysis of MORUS. Des. Codes Cryptogr. 87(5): 1035-1058 (2019) - [j21]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
New Distinguisher on Reduced-Round Keccak Sponge Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 242-250 (2019) - [j20]Huicong Liang, Meiqin Wang:
Cryptanalysis of the Lightweight Block Cipher BORON. Secur. Commun. Networks 2019: 7862738:1-7862738:12 (2019) - [j19]Muzhou Li, Kai Hu, Meiqin Wang:
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. IACR Trans. Symmetric Cryptol. 2019(1): 236-263 (2019) - [c39]Kai Hu, Meiqin Wang:
Automatic Search for a Variant of Division Property Using Three Subsets. CT-RSA 2019: 412-432 - [i24]Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang:
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers. IACR Cryptol. ePrint Arch. 2019: 25 (2019) - [i23]Muzhou Li, Kai Hu, Meiqin Wang:
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. IACR Cryptol. ePrint Arch. 2019: 208 (2019) - [i22]Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack against GCM-RUP. IACR Cryptol. ePrint Arch. 2019: 1359 (2019) - 2018
- [j18]Tingting Cui, Huaifeng Chen, Long Wen, Meiqin Wang:
Statistical integral attack on CAST-256 and IDEA. Cryptogr. Commun. 10(1): 195-209 (2018) - [j17]Tingting Cui, Huaifeng Chen, Sihem Mesnager, Ling Sun, Meiqin Wang:
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers. Cryptogr. Commun. 10(5): 755-776 (2018) - [j16]Ling Sun, Wei Wang, Ru Liu, Meiqin Wang:
MILP-aided bit-based division property for ARX ciphers. Sci. China Inf. Sci. 61(11): 118102:1-118102:3 (2018) - [j15]Ling Sun, Huaifeng Chen, Meiqin Wang:
Zero-correlation attacks: statistical models independent of the number of approximations. Des. Codes Cryptogr. 86(9): 1923-1945 (2018) - [j14]Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018) - [j13]Ling Sun, Wei Wang, Meiqin Wang:
More Accurate Differential Properties of LED64 and Midori64. IACR Trans. Symmetric Cryptol. 2018(3): 93-123 (2018) - [c38]Cheng Zhang, Qianwen Chen, Meiqin Wang, Dong Wang, Sui Wei:
A SVD-based 2DOMP algorithm for compressed image sensing. ICCIP 2018: 77-80 - [c37]Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang:
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES. SAC 2018: 139-162 - [i21]Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang:
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES. IACR Cryptol. ePrint Arch. 2018: 726 (2018) - [i20]Kai Hu, Meiqin Wang:
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version). IACR Cryptol. ePrint Arch. 2018: 1187 (2018) - 2017
- [j12]Yanbin Li, Guoyan Zhang, Wei Wang, Meiqin Wang:
Cryptanalysis of round-reduced ASCON. Sci. China Inf. Sci. 60(3): 38102 (2017) - [j11]Ling Sun, Meiqin Wang:
Toward a further understanding of bit-based division property. Sci. China Inf. Sci. 60(12): 128101:1-128101:3 (2017) - [j10]Kai Fu, Ling Sun, Meiqin Wang:
New integral attacks on SIMON. IET Inf. Secur. 11(5): 277-286 (2017) - [j9]Yu Liu, Huicong Liang, Wei Wang, Meiqin Wang:
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4. Secur. Commun. Networks 2017: 1461520:1-1461520:10 (2017) - [c36]Tingting Cui, Ling Sun, Huaifeng Chen, Meiqin Wang:
Statistical Integral Distinguisher with Multi-structure and Its Application on AES. ACISP (1) 2017: 402-420 - [c35]Ling Sun, Wei Wang, Meiqin Wang:
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property. ASIACRYPT (1) 2017: 128-157 - [c34]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT (2) 2017: 259-288 - [c33]Xiang Tian, Rui Guo, Qingbin Wu, Meiqin Wang, Yunqin Su:
Leucorrhea-wet-film recognition based on coarse-to-fine CNN-SVM. SPAC 2017: 548-551 - [i19]Ling Sun, Wei Wang, Meiqin Wang:
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property. IACR Cryptol. ePrint Arch. 2017: 860 (2017) - 2016
- [j8]Huaifeng Chen, Tingting Cui, Meiqin Wang:
Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using χ2-method. Des. Codes Cryptogr. 81(3): 523-540 (2016) - [j7]Yu Liu, Kai Fu, Wei Wang, Ling Sun, Meiqin Wang:
Linear cryptanalysis of reduced-round SPECK. Inf. Process. Lett. 116(3): 259-266 (2016) - [c32]Shaomei Wang, Tingting Cui, Meiqin Wang:
Improved Differential Cryptanalysis of CAST-128 and CAST-256. Inscrypt 2016: 18-32 - [c31]Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. FSE 2016: 268-288 - [c30]Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. FSE 2016: 399-415 - [i18]Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. IACR Cryptol. ePrint Arch. 2016: 178 (2016) - [i17]Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu:
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or. IACR Cryptol. ePrint Arch. 2016: 338 (2016) - [i16]Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck. IACR Cryptol. ePrint Arch. 2016: 407 (2016) - [i15]Tingting Cui, Keting Jia, Kai Fu, Shiyao Chen, Meiqin Wang:
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations. IACR Cryptol. ePrint Arch. 2016: 689 (2016) - [i14]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2016: 790 (2016) - [i13]Ling Sun, Wei Wang, Meiqin Wang:
MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers. IACR Cryptol. ePrint Arch. 2016: 811 (2016) - [i12]Ling Sun, Wei Wang, Ru Liu, Meiqin Wang:
MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher. IACR Cryptol. ePrint Arch. 2016: 1101 (2016) - 2015
- [j6]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER Block Cipher Family. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(3): 843-852 (2015) - [c29]Ling Sun, Kai Fu, Meiqin Wang:
Improved Zero-Correlation Cryptanalysis on SIMON. Inscrypt 2015: 125-143 - [c28]Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan:
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. ISC 2015: 141-157 - [i11]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. IACR Cryptol. ePrint Arch. 2015: 75 (2015) - [i10]Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. IACR Cryptol. ePrint Arch. 2015: 122 (2015) - 2014
- [j5]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard. Inf. Process. Lett. 114(6): 322-330 (2014) - [j4]Long Wen, Meiqin Wang, Jingyuan Zhao:
Related-Key Impossible Differential Attack on Reduced-Round LBlock. J. Comput. Sci. Technol. 29(1): 165-176 (2014) - [j3]Jingyuan Zhao, Meiqin Wang, Long Wen:
Improved Linear Cryptanalysis of CAST-256. J. Comput. Sci. Technol. 29(6): 1134-1139 (2014) - [c27]Long Wen, Meiqin Wang:
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2. ACISP 2014: 454-461 - [c26]Céline Blondeau, Andrey Bogdanov, Meiqin Wang:
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. ACNS 2014: 271-288 - [c25]Long Wen, Meiqin Wang, Andrey Bogdanov:
Multidimensional Zero-Correlation Linear Cryptanalysis of E2. AFRICACRYPT 2014: 147-164 - [c24]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. FSE 2014: 571-590 - [c23]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256. INDOCRYPT 2014: 161-176 - [i9]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
Note of Multidimensional MITM Attack on 25-Round TWINE-128. IACR Cryptol. ePrint Arch. 2014: 425 (2014) - [i8]Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong:
Differential Analysis on Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 525 (2014) - [i7]Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song:
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications. IACR Cryptol. ePrint Arch. 2014: 747 (2014) - 2013
- [c22]Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen, Jingyuan Zhao:
Key Difference Invariant Bias in Block Ciphers. ASIACRYPT (1) 2013: 357-376 - [c21]Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard:
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. Selected Areas in Cryptography 2013: 306-323 - 2012
- [c20]Jiazhe Chen, Meiqin Wang, Bart Preneel:
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. AFRICACRYPT 2012: 117-137 - [c19]Yue Sun, Meiqin Wang, Shujia Jiang, Qiumei Sun:
Differential Cryptanalysis of Reduced-Round ICEBERG. AFRICACRYPT 2012: 155-171 - [c18]Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang:
Integral and Multidimensional Linear Distinguishers with Correlation Zero. ASIACRYPT 2012: 244-261 - [c17]Andrey Bogdanov, Meiqin Wang:
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. FSE 2012: 29-48 - [c16]Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel:
A Model for Structure Attacks, with Applications to PRESENT and Serpent. FSE 2012: 49-68 - [c15]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER + and SAFER + +. ICISC 2012: 170-183 - [c14]Yue Sun, Meiqin Wang:
Linear Cryptanalysis of Reduced-Round ICEBERG. ISPEC 2012: 381-392 - [i6]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER+ and SAFER++. IACR Cryptol. ePrint Arch. 2012: 715 (2012) - 2011
- [c13]Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel:
Algebraic Techniques in Differential Cryptanalysis Revisited. ACISP 2011: 120-141 - [c12]Yue Sun, Meiqin Wang, Qiumei Sun:
How to search linear approximation for large non-surjective S-box. AsiaCCS 2011: 459-465 - [c11]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical Attack on the Full MMB Block Cipher. Selected Areas in Cryptography 2011: 185-199 - [i5]Jiazhe Chen, Meiqin Wang, Bart Preneel:
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. IACR Cryptol. ePrint Arch. 2011: 616 (2011) - 2010
- [j2]Meiqin Wang, Xiaoyun Wang, Lucas Chi Kwong Hui:
Differential-algebraic cryptanalysis of reduced-round of Serpent-256. Sci. China Inf. Sci. 53(3): 546-556 (2010) - [j1]Meiqin Wang, Xiaoyun Wang, Kam-Pui Chow, Lucas Chi Kwong Hui:
New Differential Cryptanalytic Results for Reduced-Round CAST-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(12): 2744-2754 (2010) - [i4]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical-time Attack on the Full MMB Block Cipher. IACR Cryptol. ePrint Arch. 2010: 211 (2010) - [i3]Zhenli Dai, Meiqin Wang, Yue Sun:
Effect of the Dependent Paths in Linear Hull. IACR Cryptol. ePrint Arch. 2010: 325 (2010)
2000 – 2009
- 2009
- [c10]Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang:
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. CANS 2009: 58-75 - [c9]Lin Yang, Meiqin Wang, Siyuan Qiao:
Side Channel Cube Attack on PRESENT. CANS 2009: 379-391 - [c8]Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang:
New Distinguishing Attack on MAC Using Secret-Prefix Method. FSE 2009: 363-374 - [c7]Meiqin Wang, Jorge Nakahara Jr., Yue Sun:
Cryptanalysis of the Full MMB Block Cipher. Selected Areas in Cryptography 2009: 231-248 - [i2]Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang:
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256. IACR Cryptol. ePrint Arch. 2009: 484 (2009) - 2008
- [c6]Meiqin Wang:
Differential Cryptanalysis of Reduced-Round PRESENT. AFRICACRYPT 2008: 40-49 - [c5]Meiqin Wang, Xiaoyun Wang, Changhui Hu:
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256. Selected Areas in Cryptography 2008: 429-441 - 2007
- [c4]Ji-Zhi Wang, Yinglong Wang, Mei-Qin Wang:
Periodicity and Application for a kind of n-dimensional Arnold-type Transformation. ISI 2007: 375 - [c3]Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:
A Hybrid Approach for Authenticating MPEG-2 Streaming Data. MCAM 2007: 203-212 - [i1]Meiqin Wang:
Differential Cryptanalysis of PRESENT. IACR Cryptol. ePrint Arch. 2007: 408 (2007) - 2006
- [c2]Yinglong Wang, Ji-Zhi Wang, Mei-Qin Wang:
Security Analysis of Routing Protocol for MANET. CSCWD 2006: 920-923 - 2005
- [c1]Yinglong Wang, Ji-Zhi Wang, Mei-Qin Wang, Zhen-ming Gao:
A security analysis method for routing protocol in MANET. CSCWD (2) 2005: 755-760
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint