default search action
Muzhou Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Jinliang Wang, Christina Boura, Patrick Derbez, Kai Hu, Muzhou Li, Meiqin Wang:
Cryptanalysis of Full-Round BipBip. IACR Trans. Symmetric Cryptol. 2024(2): 68-84 (2024) - [c9]Chen Wang, Jinliang Wang, Muzhou Li, Meiqin Wang:
New Strategy for Evaluating Differential Clustering Effect of uBlock. ACISP (2) 2024: 205-224 - [i7]Wenhui Wu, Muzhou Li, Meiqin Wang:
Improved Linear Key Recovery Attacks on PRESENT. IACR Cryptol. ePrint Arch. 2024: 113 (2024) - 2023
- [c8]Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. ACISP 2023: 124-156 - [c7]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. SAC 2023: 213-232 - [i6]Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. IACR Cryptol. ePrint Arch. 2023: 612 (2023) - [i5]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 1245 (2023) - 2022
- [j5]Juan Du, Wei Wang, Muzhou Li, Meiqin Wang:
Related-tweakey impossible differential attack on QARMA-128. Sci. China Inf. Sci. 65(2) (2022) - [j4]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU. IACR Trans. Symmetric Cryptol. 2022(2): 161-200 (2022) - [c6]Muzhou Li, Ling Sun, Meiqin Wang:
Automated Key Recovery Attacks on Round-Reduced Orthros. AFRICACRYPT 2022: 189-213 - [c5]Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. CT-RSA 2022: 247-271 - [i4]Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. IACR Cryptol. ePrint Arch. 2022: 299 (2022) - 2021
- [j3]Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang:
STP models of optimal differential and linear trail for S-box based ciphers. Sci. China Inf. Sci. 64(5) (2021) - [j2]Yan-Hong Fan, Mei-Qin Wang, Yan-Bin Li, Kai Hu, Muzhou Li:
A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks. J. Comput. Sci. Technol. 36(2): 419-433 (2021) - [c4]Minxuan Zhou, Lingxi Wu, Muzhou Li, Niema Moshiri, Kevin Skadron, Tajana Rosing:
Ultra Efficient Acceleration for De Novo Genome Assembly via Near-Memory Computing. PACT 2021: 199-212 - [c3]Chao Niu, Muzhou Li, Siwei Sun, Meiqin Wang:
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys. CT-RSA 2021: 126-147 - [c2]Minxuan Zhou, Muzhou Li, Mohsen Imani, Tajana Rosing:
HyGraph: Accelerating Graph Processing with Hybrid Memory-centric Computing. DATE 2021: 330-335 - [c1]Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. SAC 2021: 223-245 - [i3]Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. IACR Cryptol. ePrint Arch. 2021: 1310 (2021)
2010 – 2019
- 2019
- [j1]Muzhou Li, Kai Hu, Meiqin Wang:
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. IACR Trans. Symmetric Cryptol. 2019(1): 236-263 (2019) - [i2]Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang:
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers. IACR Cryptol. ePrint Arch. 2019: 25 (2019) - [i1]Muzhou Li, Kai Hu, Meiqin Wang:
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. IACR Cryptol. ePrint Arch. 2019: 208 (2019)
Coauthor Index
aka: Mei-Qin Wang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint