Jiqiang Lu 吕继强
Jiqiang Lu 吕继强
Institute for Infocomm Research (I2R), A*STAR
Verified email at i2r.a-star.edu.sg - Homepage
Title
Cited by
Cited by
Year
New impossible differential attacks on AES
J Lu, O Dunkelman, N Keller, J Kim
INDOCRYPT 2008 --- The 9th International Conference on Cryptology in India …, 2008
1632008
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
J Lu, J Kim, N Keller, O Dunkelman
CT-RSA 2008 --- Cryptographers' Track at the RSA Conference 2008, 370--386, 2008
1202008
Related-key rectangle attack on 36 rounds of the XTEA block cipher
J Lu
International Journal of Information Security 8 (1), 1-11, 2009
952009
Attacking reduced-round versions of the SMS4 block cipher in the Chinese WAPI standard
J Lu
ICICS 2007 --- The 9th International Conference on Information and …, 2007
612007
Practical convertible authenticated encryption schemes using self-certified public keys
J Lv, X Wang, K Kim
Applied Mathematics and Computation 169 (2), 1285-1297, 2005
452005
Verifiable ring signature
J Lv, X Wang
CANS 2003 --- The 3rd International Workshop on Cryptology and Network …, 2003
432003
Related-key rectangle attack on 42-round SHACAL-2
J Lu, J Kim, N Keller, O Dunkelman
ISC 2006 --- The 9th International Conference on Information Security, 85-100, 2006
392006
Cryptanalysis of Block Ciphers
J Lu
PhD Thesis, 2008
382008
Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006
J Lu
ICISC 2007 --- The 9th International Conference on Information Security and …, 2007
312007
You cannot hide behind the mask: Power analysis on a provably secure s-box implementation
J Pan, JI den Hartog, J Lu
WISA 2009 --- The 10th International Workshop on Information Security …, 2009
292009
On Lightweight Security Enforcement in Cyber-Physical Systems
Y Yang, J Lu, KKR Choo, JK Liu
LightSec 2015 --- The Fourth International Workshop on Lightweight …, 2016
282016
Cryptanalysis of reduced versions of the Camellia block cipher
J Lu, Y Wei, PA Fouque, J Kim
IET Information Security 6 (3), 228-238, 2012
262012
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
Y Wei, J Lu, Y Hu
ISPEC 2011 --- The 7th Information Security Practice and Experience …, 2011
242011
Differential and rectangle attacks on reduced-round SHACAL-1
J Lu, J Kim, N Keller, O Dunkelman
INDOCRYPT 2006 --- The 7th International Conference on Cryptology in India …, 2006
242006
Attacking 44 rounds of the SHACAL-2 block cipher using related-key rectangle cryptanalysis
J Lu, J Kim
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
232008
Related-key attacks on the full-round Cobra-F64a and Cobra-F64b
J Lu, C Lee, J Kim
SCN 2006 --- The 5th International Conference on Security and Cryptography …, 2006
232006
Enhanced DES implementation secure against high-order differential power analysis in smartcards
J Lv, Y Han
ACISP 2005 --- The 10th Australasian Conference on Information Security and …, 2005
232005
The ring authenticated encryption scheme–How to provide a clue wisely
J Lv, K Ren, X Chen, K Kim
Information Sciences 179 (1), 161-168, 2009
18*2009
A methodology for differential-linear cryptanalysis and its applications
J Lu
Designs, Codes and Cryptography 77 (1), 11--48, 2015
172015
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
JL Lu, J Wei, Yongzhuang, Kim, E Pasalic
Theoretical Computer Science 527, 102--122, 2014
172014
The system can't perform the operation now. Try again later.
Articles 1–20