Author of the publication

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.

, , , , , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 141-157. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Qiao, Kexin
add a person with the name Qiao, Kexin
 

Other publications of authors with the same name

Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs., , , , , and . IACR Trans. Symmetric Cryptol., 2016 (1): 33-56 (2016)Practical Collision Attacks against Round-Reduced SHA-3., , , , , and . IACR Cryptology ePrint Archive, (2019)Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON., , , , , and . IACR Cryptology ePrint Archive, (2014)Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques., , and . IACR Cryptology ePrint Archive, (2015)Invariant Subspace Attack Against Full Midori64., , , , , and . IACR Cryptology ePrint Archive, (2015)Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications., , , , , , , and . IACR Cryptology ePrint Archive, (2014)New Collision Attacks on Round-Reduced Keccak., , , and . EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science, page 216-243. (2017)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis., , , , , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 141-157. Springer, (2015)Improved Differential Analysis of Block Cipher PRIDE., , , , , , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 209-219. Springer, (2015)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s., , , , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 97-111. Springer, (2015)