Follow
Jiqiang Lu 吕继强
Jiqiang Lu 吕继强
Institute for Infocomm Research (I2R), A*STAR
Verified email at i2r.a-star.edu.sg - Homepage
Title
Cited by
Cited by
Year
New impossible differential attacks on AES
J Lu, O Dunkelman, N Keller, J Kim
INDOCRYPT 2008 --- The 9th International Conference on Cryptology in India …, 2008
2142008
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
J Lu, J Kim, N Keller, O Dunkelman
CT-RSA 2008 --- Cryptographers' Track at the RSA Conference 2008, 370--386, 2008
1432008
Related-key rectangle attack on 36 rounds of the XTEA block cipher
J Lu
International Journal of Information Security 8 (1), 1-11, 2009
1302009
Attacking reduced-round versions of the SMS4 block cipher in the Chinese WAPI standard
J Lu
ICICS 2007 --- The 9th International Conference on Information and …, 2007
692007
Verifiable ring signature
J Lv, X Wang
CANS 2003 --- The 3rd International Workshop on Cryptology and Network …, 2003
522003
Practical convertible authenticated encryption schemes using self-certified public keys
J Lv, X Wang, K Kim
Applied Mathematics and Computation 169 (2), 1285-1297, 2005
482005
Cryptanalysis of Block Ciphers
J Lu
PhD Thesis, 2008
442008
Related-key rectangle attack on 42-round SHACAL-2
J Lu, J Kim, N Keller, O Dunkelman
ISC 2006 --- The 9th International Conference on Information Security, 85-100, 2006
442006
A methodology for differential-linear cryptanalysis and its applications
J Lu
Designs, Codes and Cryptography 77 (1), 11--48, 2015
432015
Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006
J Lu
ICISC 2007 --- The 9th International Conference on Information Security and …, 2007
342007
On Lightweight Security Enforcement in Cyber-Physical Systems
Y Yang, J Lu, KKR Choo, JK Liu
LightSec 2015 --- The Fourth International Workshop on Lightweight …, 2016
332016
You cannot hide behind the mask: Power analysis on a provably secure s-box implementation
J Pan, JI den Hartog, J Lu
WISA 2009 --- The 10th International Workshop on Information Security …, 2009
312009
Attacking 44 rounds of the SHACAL-2 block cipher using related-key rectangle cryptanalysis
J Lu, J Kim
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
292008
Cryptanalysis of reduced versions of the Camellia block cipher
J Lu, Y Wei, PA Fouque, J Kim
IET Information Security 6 (3), 228-238, 2012
282012
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
Y Wei, J Lu, Y Hu
ISPEC 2011 --- The 7th Information Security Practice and Experience …, 2011
282011
Enhanced DES implementation secure against high-order differential power analysis in smartcards
J Lv, Y Han
ACISP 2005 --- The 10th Australasian Conference on Information Security and …, 2005
282005
Principles on the security of AES against first and second-order differential power analysis
J Lu, J Pan, J den Hartog
ACNS 2010 --- The 8th International Conference on Applied Cryptography and …, 2010
262010
Related-key attacks on the full-round Cobra-F64a and Cobra-F64b
J Lu, C Lee, J Kim
SCN 2006 --- The 5th International Conference on Security and Cryptography …, 2006
242006
Differential and rectangle attacks on reduced-round SHACAL-1
J Lu, J Kim, N Keller, O Dunkelman
INDOCRYPT 2006 --- The 7th International Conference on Cryptology in India …, 2006
232006
Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms
J Lu
ASIACCS 2017 --- The 12th ACM Asia Conference on Computer and Communications …, 2017
21*2017
The system can't perform the operation now. Try again later.
Articles 1–20