Follow
Qingju Wang (王庆菊)
Qingju Wang (王庆菊)
Postdoctoral Researcher, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
4482018
Differential and linear cryptanalysis using mixed-integer linear programming
N Mouha, Q Wang, D Gu, B Preneel
International Conference on Information Security and Cryptology, 57-76, 2011
3682011
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
B Bilgin, A Bogdanov, M Knežević, F Mendel, Q Wang
International Conference on Cryptographic Hardware and Embedded Systems, 142-158, 2013
1292013
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
International Conference on Cryptology in India, 143-160, 2014
1132014
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H Alkhzaimi, C Li
Annual Cryptology Conference - CRYPTO 2015, 95-115, 2015
742015
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Annual Cryptology Conference 2018 - CRYPTO 2018 1, 275-305, 2018
712018
Optimized interpolation attacks on LowMC
I Dinur, Y Liu, W Meier, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2015
692015
PRIMATEs v1. Submission to the CAESAR Competition (2014)
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
63*2014
Automatic search of linear trails in ARX with applications to SPECK and Chaskey
Y Liu, Q Wang, V Rijmen
International Conference on Applied Cryptography and Network Security, 485-499, 2016
472016
Modeling for three-subset division property without unknown subset
Y Hao, G Leander, W Meier, Y Todo, Q Wang
Annual International Conference on the Theory and Applications of …, 2020
452020
An algebraic formulation of the division property: Revisiting degree evaluations, cube attacks, and key-independent sums
K Hu, S Sun, M Wang, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2020
342020
Alzette: A 64-bit ARX-box
C Beierle, A Biryukov, L Cardoso dos Santos, J Großschädl, L Perrin, ...
Annual International Cryptology Conference, 419-448, 2020
302020
Schwaemm and Esch: Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family
C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ...
302019
Zero-sum partitions of PHOTON permutations
Q Wang, L Grassi, C Rechberger
Cryptographers’ Track at the RSA Conference, 279-299, 2018
282018
An algebraic attack on ciphers with low-degree round functions: application to full MiMC
M Eichlseder, L Grassi, R Lüftenegger, M Øygarden, C Rechberger, ...
International Conference on the Theory and Application of Cryptology and …, 2020
262020
Lightweight AEAD and hashing using the sparkle permutation family
C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ...
IACR Transactions on Symmetric Cryptology, 208-261, 2020
252020
Design of lightweight linear diffusion layers from near-MDS matrices
C Li, Q Wang
Cryptology ePrint Archive, 2017
202017
On the division property of S-boxes.
F Göloglu, V Rijmen, Q Wang
IACR Cryptol. ePrint Arch. 2016, 188, 2016
13*2016
Observations on the dynamic cube attack of 855-round TRIVIUM from Crypto'18
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
Cryptology ePrint Archive, 2018
122018
Improved impossible differential attacks on large-block Rijndael
Q Wang, D Gu, V Rijmen, Y Liu, J Chen, A Bogdanov
International Conference on Information Security and Cryptology, 126-140, 2012
122012
The system can't perform the operation now. Try again later.
Articles 1–20