default search action
Qingju Wang 0001
Person information
- affiliation: Institut Polytechnique de Paris, France
- affiliation (2018 - 2023): University of Luxembourg, Esch-sur-Alzette, Luxembourg
- affiliation (2016 - 2018): Technical University of Denmark, Denmark
- affiliation (PhD 2016): KU Leuven, Belgium
- affiliation (former): Shanghai Jiao Tong University, China
Other persons with the same name
- Qingju Wang 0002 — KingFar International Inc., Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Xinxin Gong, Yonglin Hao, Qingju Wang:
Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW. Des. Codes Cryptogr. 92(6): 1663-1728 (2024) - [j18]Shaoxuan Zhang, Chun Guo, Qingju Wang:
Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations. IET Inf. Secur. 2024(1) (2024) - [j17]Shaoxuan Zhang, Chun Guo, Qingju Wang:
Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations. IET Inf. Secur. 2024(1) (2024) - [i25]Pierrick Méaux, Qingju Wang:
Extreme Algebraic Attacks. IACR Cryptol. ePrint Arch. 2024: 64 (2024) - [i24]Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang:
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? IACR Cryptol. ePrint Arch. 2024: 791 (2024) - 2023
- [c20]Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui:
Algebraic Attacks on Round-Reduced Rain and Full AIM-III. ASIACRYPT (3) 2023: 285-310 - [c19]Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. CANS 2023: 293-317 - [c18]Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang:
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. CRYPTO (3) 2023: 305-339 - [c17]Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. CRYPTO (3) 2023: 573-606 - [i23]Xinxin Gong, Yonglin Hao, Qingju Wang:
Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW. IACR Cryptol. ePrint Arch. 2023: 145 (2023) - [i22]Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong:
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE. IACR Cryptol. ePrint Arch. 2023: 299 (2023) - [i21]Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang:
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. IACR Cryptol. ePrint Arch. 2023: 822 (2023) - [i20]Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui:
Algebraic Attacks on Round-Reduced RAIN and Full AIM-III. IACR Cryptol. ePrint Arch. 2023: 1397 (2023) - [i19]Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. IACR Cryptol. ePrint Arch. 2023: 1571 (2023) - 2022
- [c16]Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang:
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. CT-RSA 2022: 223-246 - [i18]Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. IACR Cryptol. ePrint Arch. 2022: 403 (2022) - 2021
- [j16]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) - [c15]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. ASIACRYPT (1) 2021: 392-421 - [c14]Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. SAC 2021: 223-245 - [i17]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. IACR Cryptol. ePrint Arch. 2021: 1225 (2021) - [i16]Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. IACR Cryptol. ePrint Arch. 2021: 1310 (2021) - [i15]Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang:
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. IACR Cryptol. ePrint Arch. 2021: 1572 (2021) - 2020
- [j15]Zhiqiang Liu, Shuai Han, Qingju Wang, Wei Li, Ya Liu, Dawu Gu:
New insights on linear cryptanalysis. Sci. China Inf. Sci. 63(1): 112104 (2020) - [j14]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Links between Division Property and Other Cube Attack Variants. IACR Trans. Symmetric Cryptol. 2020(1): 363-395 (2020) - [j13]Kai Hu, Qingju Wang, Meiqin Wang:
Finding Bit-Based Division Property for Ciphers with Complex Linear Layers. IACR Trans. Symmetric Cryptol. 2020(1): 396-424 (2020) - [j12]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Trans. Symmetric Cryptol. 2020(S1): 208-261 (2020) - [c13]Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. ASIACRYPT (1) 2020: 446-476 - [c12]Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. ASIACRYPT (1) 2020: 477-506 - [c11]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX). CRYPTO (3) 2020: 419-448 - [c10]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. EUROCRYPT (1) 2020: 466-495 - [i14]Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. IACR Cryptol. ePrint Arch. 2020: 182 (2020) - [i13]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. IACR Cryptol. ePrint Arch. 2020: 441 (2020) - [i12]Kai Hu, Qingju Wang, Meiqin Wang:
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer. IACR Cryptol. ePrint Arch. 2020: 547 (2020) - [i11]Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. IACR Cryptol. ePrint Arch. 2020: 1048 (2020)
2010 – 2019
- 2019
- [j11]Yonglin Hao, Takanori Isobe, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) - [i10]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-bit ARX-box. IACR Cryptol. ePrint Arch. 2019: 1378 (2019) - 2018
- [j10]Weizhi Meng, Elmar Tischhauser, Qingju Wang, Yu Wang, Jinguang Han:
When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access 6: 10179-10188 (2018) - [j9]Ya Liu, Liang Cheng, Zhiqiang Liu, Wei Li, Qingju Wang, Dawu Gu:
Improved meet-in-the-middle attacks on reduced-round Piccolo. Sci. China Inf. Sci. 61(3): 032108:1-032108:13 (2018) - [j8]Wei Li, Vincent Rijmen, Zhi Tao, Qingju Wang, Hua Chen, Yunwen Liu, Chaoyun Li, Ya Liu:
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs. Sci. China Inf. Sci. 61(3): 032110:1-032110:13 (2018) - [c9]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. CRYPTO (1) 2018: 275-305 - [c8]Qingju Wang, Lorenzo Grassi, Christian Rechberger:
Zero-Sum Partitions of PHOTON Permutations. CT-RSA 2018: 279-299 - [i9]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18. IACR Cryptol. ePrint Arch. 2018: 972 (2018) - 2017
- [j7]Chaoyun Li, Qingju Wang:
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices. IACR Trans. Symmetric Cryptol. 2017(1): 129-155 (2017) - [i8]Chaoyun Li, Qingju Wang:
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices. IACR Cryptol. ePrint Arch. 2017: 195 (2017) - [i7]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IACR Cryptol. ePrint Arch. 2017: 1063 (2017) - [i6]Qingju Wang, Lorenzo Grassi, Christian Rechberger:
Zero-Sum Partitions of PHOTON Permutations. IACR Cryptol. ePrint Arch. 2017: 1211 (2017) - 2016
- [b1]Qingju Wang:
Design and Cryptanalysis of Symmetric Key Primitives ; Ontwerp en cryptanalyse van symmetrische-sleutel primitieven. Katholieke Universiteit Leuven, Belgium, 2016 - [j6]Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu:
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys. IET Inf. Secur. 10(2): 95-103 (2016) - [j5]Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu:
Improved impossible differential attack on reduced version of Camellia with FL/FL -1 functions. IET Inf. Secur. 10(6): 425-432 (2016) - [c7]Yunwen Liu, Qingju Wang, Vincent Rijmen:
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. ACNS 2016: 485-499 - [i5]Faruk Göloglu, Vincent Rijmen, Qingju Wang:
On the division property of S-boxes. IACR Cryptol. ePrint Arch. 2016: 188 (2016) - 2015
- [j4]Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, Dawu Gu:
Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192. IET Inf. Secur. 9(5): 266-276 (2015) - [j3]Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu, Wei Li:
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. Secur. Commun. Networks 8(4): 672-681 (2015) - [c6]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. ASIACRYPT (2) 2015: 535-560 - [c5]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. CRYPTO (1) 2015: 95-115 - [i4]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 181 (2015) - [i3]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. IACR Cryptol. ePrint Arch. 2015: 418 (2015) - [i2]Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. IACR Cryptol. ePrint Arch. 2015: 424 (2015) - 2014
- [c4]Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-Round SIMON32 and SIMON48. INDOCRYPT 2014: 143-160 - [i1]Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-round SIMON32 and SIMON48. IACR Cryptol. ePrint Arch. 2014: 761 (2014) - 2013
- [c3]Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. CHES 2013: 142-158 - 2012
- [j2]Wei Li, Dawu Gu, Xiaoling Xia, Chen Zhao, Zhiqiang Liu, Ya Liu, Qingju Wang:
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network. Int. J. Comput. Intell. Syst. 5(5): 896-904 (2012) - [j1]Qingju Wang, Andrey Bogdanov:
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers. Inf. Process. Lett. 112(11): 427-432 (2012) - [c2]Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov:
Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012: 126-140 - 2011
- [c1]Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel:
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. Inscrypt 2011: 57-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint