New automatic search tool for impossible differentials and zero-correlation linear approximations T Cui, S Chen, K Jia, K Fu, M Wang Cryptology ePrint Archive, 2016 | 124 | 2016 |
Improved single-key attacks on 9-round AES-192/256 L Li, K Jia, X Wang International Workshop on Fast Software Encryption, 127-146, 2014 | 78 | 2014 |
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT B Zhao, X Dong, W Meier, K Jia, G Wang Designs, Codes and Cryptography 88 (6), 1103-1126, 2020 | 44 | 2020 |
Improved meet-in-the-middle attacks on AES-192 and PRINCE L Li, K Jia, X Wang Cryptology ePrint Archive, 2013 | 40 | 2013 |
Distinguishing and second-preimage attacks on CBC-like MACs K Jia, X Wang, Z Yuan, G Xu International Conference on Cryptology and Network Security, 349-361, 2009 | 38 | 2009 |
Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny L Qin, X Dong, X Wang, K Jia, Y Liu IACR Transactions on Symmetric Cryptology, 249-291, 2021 | 34 | 2021 |
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques N Wang, X Wang, K Jia, J Zhao Science China. Information Sciences 61 (9), 098103, 2018 | 34 | 2018 |
New related-tweakey boomerang and rectangle attacks on Deoxys-BC including BDT effect B Zhao, X Dong, K Jia IACR Transactions on Symmetric Cryptology, 121-151, 2019 | 33 | 2019 |
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia L Li, K Jia, X Wang, X Dong International Workshop on Fast Software Encryption, 48-70, 2015 | 32 | 2015 |
New impossible differential attacks of reduced-round Camellia-192 and Camellia-256 J Chen, K Jia, H Yu, X Wang Australasian Conference on Information Security and Privacy, 16-33, 2011 | 31 | 2011 |
New birthday attacks on some MACs based on block ciphers Z Yuan, W Wang, K Jia, G Xu, X Wang Annual International Cryptology Conference, 209-230, 2009 | 31 | 2009 |
Improved Differential Attacks on Reduced SIMON Versions. N Wang, X Wang, K Jia, J Zhao IACR Cryptol. ePrint Arch. 2014, 448, 2014 | 27 | 2014 |
Practical key-recovery attacks on round-reduced Ketje Jr, Xoodoo-AE and Xoodyak H Zhou, Z Li, X Dong, K Jia, W Meier The Computer Journal 63 (8), 1231-1246, 2020 | 23 | 2020 |
New conditional cube attack on Keccak keyed modes Z Li, X Dong, W Bi, K Jia, X Wang, W Meier IACR Transactions on Symmetric Cryptology, 94-124, 2019 | 22 | 2019 |
Improved attacks on reduced-round camellia-128/192/256 X Dong, L Li, K Jia, X Wang Cryptographers’ Track at the RSA Conference, 59-83, 2015 | 19 | 2015 |
New impossible differential cryptanalysis of reduced-round Camellia L Li, J Chen, K Jia International Conference on Cryptology and Network Security, 26-39, 2011 | 19 | 2011 |
Cryptanalysis of reduced NORX N Bagheri, T Huang, K Jia, F Mendel, Y Sasaki International Conference on Fast Software Encryption, 554-574, 2016 | 18 | 2016 |
Improved cryptanalysis of the block cipher KASUMI K Jia, L Li, C Rechberger, J Chen, X Wang Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013 | 18 | 2013 |
Near-collision attack on the step-reduced compression function of skein-256 H Yu, J Chen, X Wang Cryptology ePrint Archive, 2011 | 18 | 2011 |
Provably secure three-party password-based authenticated key exchange from RLWE C Liu, Z Zheng, K Jia, Q You Information Security Practice and Experience: 15th International Conference …, 2019 | 15 | 2019 |