default search action
Chao Li 0002
Person information
- affiliation: National University of Defense Technology, Changsha, China
Other persons with the same name
- Chao Li — disambiguation page
- Chao Li 0001 — Beihang University, School of Computer Science and Engineering, Beijing, China
- Chao Li 0003 — Google Inc., Mountain View, CA, USA (and 1 more)
- Chao Li 0004 — North Carolina State University, Department of Electrical and Computer Engineering, Raleigh, NC, USA
- Chao Li 0005 — University of Burgundy, France
- Chao Li 0006 — Peking University, Department of Ecology, Beijing, China
- Chao Li 0007 — Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China
- Chao Li 0008 — Zhejiang University, College of Computer Science and Technology, Hangzhou, China
- Chao Li 0009 — Shanghai Jiao Tong University, Department of Computer Science and Engineering, China (and 1 more)
- Chao Li 0010 — The University of Electro-Communications, Tokyo, Japan
- Chao Li 0011 — Tianjin University of Technology, Key Laboratory of Intelligence Computing and Novel Software Technology, China
- Chao Li 0012 — Tsinghua University, Research Institute of Information Technology, Beijing, China
- Chao Li 0013 — Harbin Engineering University, College of Information and Communication Engineering, China (and 1 more)
- Chao Li 0014 — National University of Defense Technology, State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, Changsha, China
- Chao Li 0015 — Taiyuan Normal University, Higher Education Key Laboratory of Engineering and Scientific Computing in Shanxi Province, Jinzhong, China
- Chao Li 0016 — China University of Petroleum, State Key Laboratory of Petroleum Resource and Prospecting, Beijing, China
- Chao Li 0017 — Zhejiang University, State Key Laboratory of Fluid Power and Mechatronic Systems, Hangzhou, China
- Chao Li 0018 — Southwest University, College of Computer and Information Science, Chongqing, China
- Chao Li 0019 — South China University of Technology, School of Computer Science and Engineering, China (and 1 more)
- Chao Li 0020 — Harbin Engineering University, College of Automation, China
- Chao Li 0021 — University of Texas at Dallas, Department of Computer Science, Richardson, TX, USA
- Chao Li 0022 — Shandong University of Science and Technology, Shandong Province Key Laboratory of Wisdom Mine Information Technology, Qingdao, China (and 1 more)
- Chao Li 0023 — Beijing Jiaotong University, School of Computer and Information Technology, China (and 1 more)
- Chao Li 0024 — Chinese Academy of Sciences, Institute of Automation, State Key Laboratory of Management and Control for Complex Systems, Beijing, China
- Chao Li 0025 — Simon Fraser University, Burnaby, BC, Canada
- Chao Li 0026 — Beijing University of Posts and Telecommunications, China
- Chao Li 0027 — Guangzhou University, Cyberspace Institute of Advanced Technology, China
- Chao Li 0028 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
- Chao Li 0029 — Beijing Institute of Technology, School of Automation, China
- Chao Li 0030 — Yunnan University, School of Information Science and Engineering, Kunming, China
- Chao Li 0031 — University of Cambridge, Department of Clinical Neuroscience, Department of Applied Mathematics and Theoretical Physics, UK (and 1 more)
- Chao Li 0032 — Tokyo Institute of Technology, Nano Sensing Unit, Institute of Innovative Research, Japan
- Chao Li 0033 — Xidian University, School of Electronic Engineering, Xi'an, China
- Chao Li 0034 — Baidu Inc., Department of Computer Vision, Beijing, China (and 1 more)
- Chao Li 0035 — Chinese Academy of Medical Sciences and Peking Union Medical College, Beijing, China
- Chao Li 0036 — Tsinghua University, Department of Automotive Engineering, Beijing, China
- Chao Li 0037 — Northwestern Polytechnical University, State Key Laboratory of Solidification Processing, Xi'an, China
- Chao Li 0038 — University of Jinan, School of Physics and Technology, China (and 1 more)
- Chao Li 0039 — Hangzhou Dianzi University, College of Life Information Science and Instrument Engineering, China
- Chao Li 0040 — Henan Normal University, College of Mathematics and Information Science, China
- Chao Li 0041 — Beijing Research Center for Information Technology in Agriculture, China (and 1 more)
- Chao Li 0042 — Dalian Maritime University, Navigation College, China
- Chao Li 0043 — Beijing Jiaotong University, School of Electronics and Information Engineering, China
- Chao Li 0044 — Chengdu University of Technology, China
- Chao Li 0045 — Shanghai Radio Equipment Institute, China
- Chao Li 0046 — Chinese Academy of Sciences, Innovation Academy for Precision Measurement Science and Technology, Beijing, China
- Chao Li 0047 — Cangzhou Central Hospital, Department of Ultrasound, China
- Chao Li 0048 — Beijing Jiaotong University, Beijing Municipal Commission of Education, China
- Chao Li 0049 — Qingdao University of Science and Technology, College of Automation and Electronic Engineering, China
- Chao Li 0050 — Zhejiang University of Technology, Hangzhou, China (and 1 more)
- Chao Li 0051 — Arizona State University, Tempe, AZ, USA
- Chao Li 0052 — Tianjin University, School of Computer Science and Technology, Tianjin Key Laboratory of Cognitive Computing and Application, China
- Chao Li 0053 — University of Electronic Science and Technology of China, School of Information and Software Engineering, Chengdu, China
- Chao Li 0054 — Shandong University of Science and Technology, College of Electronic and Information Engineering, Qingdao, China
- Chao Li 0055 — Nanjing University of Science and Technology, Institute of Launch Dynamics, China
- Chao Li 0056 — University of Manchester, UK
- Chao Li 0057 — Nanjing Forestry University, Co-Innovation Center for Sustainable Forestry in Southern China, China
- Chao Li 0058 — Hubei University of Technology, School of Computer, Wuhan, China
- Chao Li 0059 — North China University of Technology, Key Laboratory of Field Bus Technology and Automation of Beijing, China
- Chao Li 0060 — Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China
- Chao Li 0061 — Beijing University of Posts and Telecommunications, State Key Laboratory of Information Photonics and Optical Communications, China
- Chao Li 0062 — Zhejiang University, College of Control Science and Engineering, Hangzhou, China
- Chao Li 0063 — Tencent Cloud Xiaowei, China
- Chao Li 0064 — Hikvision Research Institute, Hangzhou, China
- Chao Li 0065 — Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China
- Chao Li 0066 — Northeast Forestry University, College of Computer and Control Engineering, Harbin, China (and 1 more)
- Chao Li 0067 — Tencent Inc., Security Product Department, Shenzhen, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j83]Jiali Shi, Chao Li, Guoqiang Liu:
Differential Attack With Constants On μ2 Block Cipher. Comput. J. 67(1): 195-209 (2024) - [j82]Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu:
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. Comput. J. 67(2): 537-547 (2024) - [j81]Jiao Du, Ziwei Zhao, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-Correlation Immune Rotation Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1241-1246 (2024) - [j80]Jiali Shi, Guoqiang Liu, Chao Li, Ting Fan:
Improved (related-key) differential cryptanalysis on LBlock. J. Inf. Secur. Appl. 82: 103737 (2024) - [j79]Jiao Du, Lin Li, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-resilient rotation symmetric Boolean functions with odd number of variables. Theor. Comput. Sci. 991: 114429 (2024) - [c30]Jiali Shi, Guoqiang Liu, Chao Li, Yingxin Li:
Automated-Based Rebound Attacks on ACE Permutation. CT-RSA 2024: 78-111 - 2023
- [j78]Tailin Niu, Kangquan Li, Longjiang Qu, Chao Li:
Characterizations and constructions of n-to-1 mappings over finite fields. Finite Fields Their Appl. 85: 102126 (2023) - [j77]Jiali Shi, Guoqiang Liu, Chao Li:
SAT-Based Security Evaluation for WARP against Linear Cryptanalysis. IET Inf. Secur. 2023: 1-14 (2023) - [j76]Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:
Rotational Differential-Linear Cryptanalysis Revisited. J. Cryptol. 36(1): 3 (2023) - [j75]Lei Fan, Yongjun Wang, Hongxin Zhang, Chao Li, Xingyuan Huang, Qi Zhang, Xiangjun Xin:
Quaternion Wavelet Transform and a Feedforward Neural Network-Aided Intelligent Distributed Optical Fiber Sensing System. Sensors 23(7): 3637 (2023) - [j74]Jiajie Liu, Bing Sun, Guoqiang Liu, Xinfeng Dong, Li Liu, Hua Zhang, Chao Li:
New Wine Old Bottles: Feistel Structure Revised. IEEE Trans. Inf. Theory 69(3): 2000-2008 (2023) - 2022
- [j73]Qianhong Wan, Chao Li:
On equivalence between two known families of APN polynomial functions and APN power functions. Cryptogr. Commun. 14(1): 161-182 (2022) - [j72]Haipeng Tong, Xuan Shen, Chao Li, Yunwen Liu:
Improved nonlinear invariant attack. Sci. China Inf. Sci. 65(3) (2022) - [j71]Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li:
On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers. Comput. J. 65(9): 2454-2469 (2022) - [j70]Jiao Du, Shaojing Fu, Longjiang Qu, Chao Li, Tianyin Wang, Shanqi Pang:
A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 93-99 (2022) - [j69]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved rotational-XOR cryptanalysis of Simon-like block ciphers. IET Inf. Secur. 16(4): 282-300 (2022) - [j68]Yi Zhang, Guoqiang Liu, Chao Li, Xuan Shen:
Impossible differential cryptanalysis of FBC-128. J. Inf. Secur. Appl. 69: 103279 (2022) - [j67]Jiao Du, Ziyu Chen, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix. Theor. Comput. Sci. 919: 80-91 (2022) - [c29]Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li:
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks. CRYPTO (1) 2022: 3-32 - [c28]Jiali Shi, Guoqiang Liu, Chao Li:
Improved the Automated Evaluation Algorithm Against Differential Attacks and Its Application to WARP. SAC 2022: 376-396 - [i36]Jinyu Lu, Guoqiang Liu, Yunwen Liu, Bing Sun, Chao Li, Li Liu:
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK. CoRR abs/2201.03767 (2022) - [i35]Tailin Niu, Kangquan Li, Longjiang Qu, Chao Li:
Characterizations and constructions of n-to-1 mappings over finite fields. CoRR abs/2201.10290 (2022) - [i34]Jinyu Lu, Guoqiang Liu, Yunwen Liu, Bing Sun, Chao Li, Li Liu:
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK. IACR Cryptol. ePrint Arch. 2022: 30 (2022) - [i33]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. IACR Cryptol. ePrint Arch. 2022: 402 (2022) - [i32]Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li:
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks. IACR Cryptol. ePrint Arch. 2022: 765 (2022) - 2021
- [j66]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen:
Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem. Adv. Math. Commun. 15(3): 441-469 (2021) - [j65]Xi Chen, Longjiang Qu, Shaojing Fu, Chao Li:
The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions. Discret. Appl. Math. 289: 477-491 (2021) - [j64]Qianhong Wan, Longjiang Qu, Chao Li:
On equivalence between known polynomial APN functions and power APN functions. Finite Fields Their Appl. 71: 101762 (2021) - [c27]Yunwen Liu, Siwei Sun, Chao Li:
Rotational Cryptanalysis from a Differential-Linear Perspective - Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette. EUROCRYPT (1) 2021: 741-770 - [c26]Luming Yang, Shaojing Fu, Yongjun Wang, Chao Li, Shanghuai Feng, Yuchuan Luo, Lin Liu:
Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic. ISPA/BDCloud/SocialCom/SustainCom 2021: 1126-1134 - [c25]Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
Autocorrelations of Vectorial Boolean Functions. LATINCRYPT 2021: 233-253 - [i31]Yunwen Liu, Siwei Sun, Chao Li:
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette. IACR Cryptol. ePrint Arch. 2021: 189 (2021) - [i30]Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:
A Note on the Bias of Rotational Differential-Linear Distinguishers. IACR Cryptol. ePrint Arch. 2021: 379 (2021) - [i29]Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li:
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers. IACR Cryptol. ePrint Arch. 2021: 674 (2021) - [i28]Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
Autocorrelations of vectorial Boolean functions. IACR Cryptol. ePrint Arch. 2021: 947 (2021) - 2020
- [j63]Jiao Du, Longjiang Qu, Chao Li, Xin Liao:
Constructing 1-resilient rotation symmetric functions over 픽p with q variables through special orthogonal arrays. Adv. Math. Commun. 14(2): 247-263 (2020) - [j62]Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang:
On the Security of LWE Cryptosystem against Subversion Attacks. Comput. J. 63(4): 495-507 (2020) - [j61]Zhichao Yang, Dung Hoang Duong, Willy Susilo, Guomin Yang, Chao Li, Rongmao Chen:
Hierarchical Identity-Based Signature in Polynomial Rings. Comput. J. 63(10): 1490-1499 (2020) - [j60]Yunwen Liu, Wenying Zhang, Bing Sun, Vincent Rijmen, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. Des. Codes Cryptogr. 88(11): 2289-2311 (2020) - [j59]Kangquan Li, Longjiang Qu, Chao Li, Hao Chen:
On a conjecture about a class of permutation quadrinomials. Finite Fields Their Appl. 66: 101690 (2020) - [j58]Tailin Niu, Xi Chen, Longjiang Qu, Chao Li:
A New Construction of (m+k, m)-Functions with Low Differential Uniformity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(6): 850-855 (2020) - [c24]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers. ACISP 2020: 105-124 - [i27]Qianhong Wan, Longjiang Qu, Chao Li:
On equivalence between known polynomial APN functions and power APN functions. IACR Cryptol. ePrint Arch. 2020: 363 (2020) - [i26]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 486 (2020)
2010 – 2019
- 2019
- [j57]Shixiong Wang, Longjiang Qu, Chao Li, Huaxiong Wang:
Further improvement of factoring N = pr qs with partial known bits. Adv. Math. Commun. 13(1): 121-135 (2019) - [j56]Yubo Li, Kangquan Li, Longjiang Qu, Chao Li:
New Classes of Efficient MDS Transformations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(11): 1504-1511 (2019) - [j55]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results About the Boomerang Uniformity of Permutation Polynomials. IEEE Trans. Inf. Theory 65(11): 7542-7553 (2019) - [c23]Wenqian Xin, Yunwen Liu, Bing Sun, Chao Li:
Improved Cryptanalysis on SipHash. CANS 2019: 61-79 - [c22]Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li:
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices. CANS 2019: 99-119 - [i25]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. CoRR abs/1901.10999 (2019) - [i24]Kangquan Li, Chunlei Li, Chao Li, Longjiang Qu:
On the Differential Linear Connectivity Table of Vectorial Boolean Functions. CoRR abs/1907.05986 (2019) - [i23]Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
On the Differential-Linear Connectivity Table of Vectorial Boolean Functions. CoRR abs/1908.07445 (2019) - [i22]Kangquan Li, Longjiang Qu, Chao Li, Hao Chen:
On a conjecture about a class of permutation quadrinomials. CoRR abs/1909.08209 (2019) - [i21]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. IACR Cryptol. ePrint Arch. 2019: 79 (2019) - [i20]Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li:
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices. IACR Cryptol. ePrint Arch. 2019: 917 (2019) - 2018
- [j54]Yunwen Liu, Longjiang Qu, Chao Li:
New constructions of systematic authentication codes from three classes of cyclic codes. Adv. Math. Commun. 12(1): 1-16 (2018) - [j53]Kangquan Li, Longjiang Qu, Xi Chen, Chao Li:
Permutation polynomials of the form cx + Trql/q(xa) and permutation trinomials over finite fields with even characteristic. Cryptogr. Commun. 10(3): 531-554 (2018) - [j52]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
A better bound for implicit factorization problem with shared middle bits. Sci. China Inf. Sci. 61(3): 032109:1-032109:10 (2018) - [j51]Zhichao Yang, Shaojing Fu, Longjiang Qu, Chao Li:
A lower dimension lattice attack on NTRU. Sci. China Inf. Sci. 61(5): 059101:1-059101:3 (2018) - [j50]Xuan Shen, Guoqiang Liu, Chao Li, Longjiang Qu:
Impossible Differential Cryptanalysis of Fantomas and Robin. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(5): 863-866 (2018) - [i19]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2018: 568 (2018) - 2017
- [j49]Lei Cheng, Bing Sun, Chao Li:
Revised cryptanalysis for SMS4. Sci. China Inf. Sci. 60(12): 122101 (2017) - [j48]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(10): 2113-2122 (2017) - [c21]Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao:
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers. ISPEC 2017: 237-255 - 2016
- [j47]Jiao Du, Shaojing Fu, Longjiang Qu, Chao Li, Shanqi Pang:
New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽p. Sci. China Inf. Sci. 59(7): 079102:1-079102:3 (2016) - [j46]Longjiang Qu, Yin Tan, Chao Li, Guang Gong:
More constructions of differentially 4-uniform permutations on 𝔽22k. Des. Codes Cryptogr. 78(2): 391-408 (2016) - [j45]Xi Chen, Longjiang Qu, Chao Li, Jiao Du:
A new method to investigate the CCZ-equivalence between functions with low differential uniformity. Finite Fields Their Appl. 42: 165-186 (2016) - [j44]Shaojing Fu, Jiao Du, Longjiang Qu, Chao Li:
Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(4): 853-855 (2016) - [j43]Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(8): 1584-1590 (2016) - [j42]Jiao Du, Chao Li, Shaojing Fu, Shanqi Pang:
Constructions of p-variable 1-resilient rotation symmetric functions over GF(p). Secur. Commun. Networks 9(18): 5651-5658 (2016) - [c20]Xuan Shen, Guoqiang Liu, Bing Sun, Chao Li:
Impossible Differentials of SPN Ciphers. Inscrypt 2016: 47-63 - [i18]Kangquan Li, Longjiang Qu, Chao Li, Shaojing Fu:
New Permutation Trinomials Constructed from Fractional Polynomials. CoRR abs/1605.06216 (2016) - [i17]Xi Chen, Longjiang Qu, Chao Li, Jiao Du:
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity. IACR Cryptol. ePrint Arch. 2016: 744 (2016) - 2015
- [j41]Hai Xiong, Longjiang Qu, Chao Li:
2-Adic complexity of binary sequences with interleaved structure. Finite Fields Their Appl. 33: 14-28 (2015) - [j40]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
A New Attack on RSA with Known Middle Bits of the Private Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2677-2685 (2015) - [j39]Guangyao Zhao, Ruilin Li, Lei Cheng, Chao Li, Bing Sun:
Differential fault analysis on LED using Super-Sbox. IET Inf. Secur. 9(4): 209-218 (2015) - [j38]Guangyao Zhao, Bing Sun, Chao Li, Jinshu Su:
Truncated differential cryptanalysis of PRINCE. Secur. Commun. Networks 8(16): 2875-2887 (2015) - [c19]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. CRYPTO (1) 2015: 95-115 - [i16]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 181 (2015) - 2014
- [j37]Hai Xiong, Longjiang Qu, Chao Li, Ying Li:
Some results on the differential functions over finite fields. Appl. Algebra Eng. Commun. Comput. 25(3): 189-195 (2014) - [j36]Longjiang Qu, Yin Tan, Chao Li:
On the Walsh spectrum of a family of quadratic APN functions with five terms. Sci. China Inf. Sci. 57(2): 1-7 (2014) - [j35]Shaojing Fu, Chao Li, Longjiang Qu:
A recursive construction of highly nonlinear resilient vectorial functions. Inf. Sci. 269: 388-396 (2014) - [j34]Hai Xiong, Longjiang Qu, Chao Li:
A New Method to Compute the 2-Adic Complexity of Binary Sequences. IEEE Trans. Inf. Theory 60(4): 2399-2406 (2014) - [c18]Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen:
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. ProvSec 2014: 40-54 - [i15]Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
When a Boolean Function can be Expressed as the Sum of two Bent Functions. IACR Cryptol. ePrint Arch. 2014: 48 (2014) - 2013
- [j33]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity. Sci. China Inf. Sci. 56(3): 1-9 (2013) - [j32]Hai Xiong, Longjiang Qu, Chao Li:
New construction of perfect sequence set and low correlation zone sequence set. Sci. China Inf. Sci. 56(11): 1-8 (2013) - [j31]Ruilin Li, Chao Li, Jinshu Su, Bing Sun:
Security evaluation of MISTY structure with SPN round function. Comput. Math. Appl. 65(9): 1264-1279 (2013) - [j30]Longjiang Qu, Hai Xiong, Chao Li:
A negative answer to Bracken-Tan-Tan's problem on differentially 4-uniform permutations over F2n. Finite Fields Their Appl. 24: 55-65 (2013) - [j29]Shaojing Fu, Chao Li, Longjiang Qu:
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 360-362 (2013) - [j28]Longjiang Qu, Qingping Dai, Chao Li:
On the Balanced Elementary Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(2): 663-665 (2013) - [j27]Hai Xiong, Longjiang Qu, Chao Li, Shaojing Fu:
Linear complexity of binary sequences with interleaved structure. IET Commun. 7(15): 1688-1696 (2013) - [j26]Deshuai Dong, Longjiang Qu, Shaojing Fu, Chao Li:
New constructions of semi-bent functions in polynomial forms. Math. Comput. Model. 57(5-6): 1139-1147 (2013) - [j25]Ruilin Li, Jianxiong You, Bing Sun, Chao Li:
Fault analysis study of the block cipher FOX64. Multim. Tools Appl. 63(3): 691-708 (2013) - [j24]Longjiang Qu, Yin Tan, Chik How Tan, Chao Li:
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method. IEEE Trans. Inf. Theory 59(7): 4675-4686 (2013) - [c17]Ruilin Li, Heng Li, Chao Li, Bing Sun:
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones. FSE 2013: 485-501 - [i14]Hai Xiong, Longjiang Qu, Chao Li:
A New Method to Compute the 2-adic Complexity of Binary Sequences. CoRR abs/1309.1625 (2013) - [i13]Longjiang Qu, Yin Tan, Chao Li, Guang Gong:
More Constructions of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$. CoRR abs/1309.7423 (2013) - 2012
- [j23]Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu:
Construction of highly nonlinear resilient S-boxes with given degree. Des. Codes Cryptogr. 64(3): 241-253 (2012) - [j22]Ruilin Li, Bing Sun, Chao Li, Shaojing Fu:
On Algebraic Property of T-Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 267-269 (2012) - [j21]Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu:
New constructions of low-correlation sequences with high-linear complexity. IET Commun. 6(18): 3309-3314 (2012) - [j20]Deshuai Dong, Longjiang Qu, Shaojing Fu, Chao Li:
New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties. Int. J. Found. Comput. Sci. 23(3): 749-760 (2012) - [j19]Shaojing Fu, Chao Li, Longjiang Qu, Deshuai Dong:
On the number of rotation symmetric functions over GF(p). Math. Comput. Model. 55(1-2): 142-150 (2012) - [j18]Peng Zhang, Deshuai Dong, Shaojing Fu, Chao Li:
New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity. Math. Comput. Model. 55(3-4): 828-836 (2012) - [c16]Yin Tan, Longjiang Qu, Chik How Tan, Chao Li:
New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$. SETA 2012: 25-39 - [c15]Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang:
Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity. WISA 2012: 43-54 - [i12]Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu:
New Constructions of Low Correlation Sequences with High Linear Complexity. IACR Cryptol. ePrint Arch. 2012: 161 (2012) - 2011
- [j17]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity. Appl. Math. Lett. 24(12): 2093-2096 (2011) - [j16]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 265-267 (2011) - [j15]Shaojing Fu, Longjiang Qu, Chao Li, Bing Sun:
Balanced rotation symmetric boolean functions with maximum algebraic immunity. IET Inf. Secur. 5(2): 93-99 (2011) - [j14]Ruilin Li, Bing Sun, Chao Li:
Impossible differential cryptanalysis of SPN ciphers. IET Inf. Secur. 5(2): 111-120 (2011) - [j13]Ruilin Li, Bing Sun, Chao Li, Jianxiong You:
Differential Fault Analysis on SMS4 using a single fault. Inf. Process. Lett. 111(4): 156-163 (2011) - [j12]Shaojing Fu, Bing Sun, Chao Li, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. J. Inf. Sci. Eng. 27(6): 1931-1942 (2011) - [j11]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
Impossible differential cryptanalysis of 13-round CLEFIA-128. J. Syst. Softw. 84(7): 1191-1196 (2011) - [j10]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li, Juhua Yin:
A meet-in-the-middle attack on reduced-round ARIA. J. Syst. Softw. 84(10): 1685-1692 (2011) - [c14]Yuechuan Wei, Chao Li, Bing Sun:
Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0. WorldCIS 2011: 227-232 - 2010
- [j9]Shaojing Fu, Chao Li, Longjiang Qu:
On the number of rotation symmetric Boolean functions. Sci. China Inf. Sci. 53(3): 537-545 (2010) - [j8]Bing Sun, Ruilin Li, Longjiang Qu, Chao Li:
SQUARE attack on block ciphers with low algebraic degree. Sci. China Inf. Sci. 53(10): 1988-1995 (2010) - [j7]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Enumeration of balanced symmetric functions over GF(p). Inf. Process. Lett. 110(14-15): 544-548 (2010) - [c13]Ruilin Li, Bing Sun, Chao Li, Longjiang Qu:
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. ACISP 2010: 1-18 - [c12]Yuechuan Wei, Ping Li, Bing Sun, Chao Li:
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. ACNS 2010: 105-122 - [i11]Ruilin Li, Bing Sun, Chao Li, Jianxiong You:
Differential Fault Analysis on SMS4 Using a Single Fault. IACR Cryptol. ePrint Arch. 2010: 63 (2010) - [i10]Jianxiong You, Ruilin Li, Bing Sun, Chao Li:
Improved Fault Attack on FOX. IACR Cryptol. ePrint Arch. 2010: 166 (2010) - [i9]Xuehai Tang, Bing Sun, Ruilin Li, Chao Li:
A Meet-in-the-Middle Attack on ARIA. IACR Cryptol. ePrint Arch. 2010: 168 (2010) - [i8]Ruilin Li, Bing Sun, Chao Li:
Impossible Differential Cryptanalysis of SPN Ciphers. IACR Cryptol. ePrint Arch. 2010: 307 (2010) - [i7]Ruilin Li, Bing Sun, Chao Li:
Some Observations on MISTY Structure with SPN Round Function. IACR Cryptol. ePrint Arch. 2010: 661 (2010)
2000 – 2009
- 2009
- [j6]Chao Li, Qiang Li, San Ling:
On the constructions of constant-composition codes from perfect nonlinear functions. Sci. China Ser. F Inf. Sci. 52(6): 964-973 (2009) - [j5]Chao Li, Qiang Li, San Ling:
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions. IEEE Trans. Inf. Theory 55(1): 64-69 (2009) - [j4]Chao Li, Longjiang Qu, San Ling:
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions. IEEE Trans. Inf. Theory 55(1): 70-82 (2009) - [c11]Peng Zhang, Bing Sun, Chao Li:
Saturation Attack on the Block Cipher HIGHT. CANS 2009: 76-86 - [c10]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. CANS 2009: 402-412 - [c9]Ping Li, Bing Sun, Chao Li:
Integral Cryptanalysis of ARIA. Inscrypt 2009: 1-14 - [c8]Longjiang Qu, Chao Li:
Minimum Distance between Bent and Resilient Boolean Functions. IWCC 2009: 219-232 - [c7]Ruilin Li, Chao Li, Chunye Gong:
Differential Fault Analysis on SHACAL-1. FDTC 2009: 120-126 - [c6]Bing Sun, Longjiang Qu, Chao Li:
New Cryptanalysis of Block Ciphers with Low Algebraic Degree. FSE 2009: 180-192 - [c5]Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li:
A New Construction of Boolean Functions with Maximum Algebraic Immunity. ISC 2009: 177-185 - [c4]Shaojing Fu, Longjiang Qu, Chao Li:
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity. WISA 2009: 109-117 - [e1]Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing:
Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings. Lecture Notes in Computer Science 5557, Springer 2009, ISBN 978-3-642-01813-8 [contents] - [i6]Ruilin Li, Bing Sun, Chao Li:
Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network. IACR Cryptol. ePrint Arch. 2009: 360 (2009) - [i5]Yuechuan Wei, Bing Sun, Chao Li:
New Integral Distinguisher for Rijndael-256. IACR Cryptol. ePrint Arch. 2009: 559 (2009) - 2008
- [j3]Longjiang Qu, Chao Li:
On the 2m-variable symmetric Boolean functions with maximum algebraic immunity. Sci. China Ser. F Inf. Sci. 51(2): 120-127 (2008) - [j2]Na Li, Longjiang Qu, Wen-Feng Qi, GuoZhu Feng, Chao Li, DuanQiang Xie:
On the Construction of Boolean Functions With Optimal Algebraic Immunity. IEEE Trans. Inf. Theory 54(3): 1330-1334 (2008) - [c3]Chao Li, Shaojing Fu, Bing Sun:
Construction of Resilient Functions with Multiple Cryptographic Criteria. CANS 2008: 268-277 - [c2]Shaojing Fu, Chao Li, Bing Sun:
Enumeration of Homogeneous Rotation Symmetric Functions over Fp. CANS 2008: 278-284 - [i4]Ruilin Li, Bing Sun, Peng Zhang, Chao Li:
New Impossible Differential Cryptanalysis of ARIA. IACR Cryptol. ePrint Arch. 2008: 227 (2008) - [i3]Shaojing Fu, Chao Li, Longjiang Qu, Ping Li:
Enumeration of Balanced Symmetric Functions over GF(p). IACR Cryptol. ePrint Arch. 2008: 372 (2008) - 2007
- [j1]Longjiang Qu, Chao Li, Keqin Feng:
A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables. IEEE Trans. Inf. Theory 53(8): 2908-2910 (2007) - [c1]Longjiang Qu, Chao Li:
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables. Inscrypt 2007: 271-282 - 2006
- [i2]Duo Lei, Da Lin, Chao Li, Keqin Feng, Longjiang Qu:
The Design Principle of Hash Function with Merkle-Damgård Construction. IACR Cryptol. ePrint Arch. 2006: 135 (2006) - 2005
- [i1]Longjiang Qu, GuoZhu Feng, Chao Li:
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count. IACR Cryptol. ePrint Arch. 2005: 449 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint