default search action
Yongqiang Li 0001
Person information
- unicode name: 李永强
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
Other persons with the same name
- Yongqiang Li — disambiguation page
- Yongqiang Li 0002 — Henan University, Department of Preventive Medicine, Institute of Biomedical Informatics, Cell Signal Transduction Laboratory, Kaifeng, China
- Yongqiang Li 0003 — Zhejiang University of Technology, College of Information Engineering, Hangzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Lin Jiao, Yongqiang Li, Yonglin Hao, Xinxin Gong:
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA. IET Inf. Secur. 2024: 1-11 (2024) - [j23]Man Kang, Lin Jiao, Yongqiang Li, Mingsheng Wang:
An iterative correction method for practically LPN solving. Inf. Sci. 679: 121080 (2024) - [j22]Fen Liu, Yongqiang Li, Huiqin Chen, Lin Jiao, Ming Luo, Mingsheng Wang:
YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation. IEEE Trans. Inf. Theory 70(5): 3729-3749 (2024) - [i16]Xichao Hu, Dengguo Feng, Lin Jiao, Yonglin Hao, Xinxin Gong, Yongqiang Li:
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods. IACR Cryptol. ePrint Arch. 2024: 1008 (2024) - 2023
- [j21]Shi Wang, Yongqiang Li, Shizhu Tian, Xiangyong Zeng:
Four by four MDS matrices with the fewest XOR gates based on words. Adv. Math. Commun. 17(4): 845-872 (2023) - [j20]Yuting Liu, Yongqiang Li, Huiqin Chen, Mingsheng Wang:
Full-round impossible differential attack on shadow block cipher. Cybersecur. 6(1): 52 (2023) - [j19]Lin Jiao, Yonglin Hao, Yongqiang Li:
Guess-and-determine attacks on SNOW-Vi stream cipher. Des. Codes Cryptogr. 91(5): 2021-2055 (2023) - [c7]Huiqin Chen, Yongqiang Li, Parhat Abla, Zhiran Li, Lin Jiao, Mingsheng Wang:
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers. ACISP 2023: 431-451 - [c6]Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. ACNS Workshops 2023: 3-22 - [i15]Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang:
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect. IACR Cryptol. ePrint Arch. 2023: 496 (2023) - [i14]Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 1353 (2023) - 2022
- [j18]Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. Comput. J. 65(6): 1560-1573 (2022) - [j17]Lin Jiao, Yongqiang Li, Shaoyu Du:
Guess-and-Determine Attacks on AEGIS. Comput. J. 65(8): 2221-2230 (2022) - [j16]Zheng Xu, Yongqiang Li, Mingsheng Wang:
Observations on the Security of COMET. Comput. J. 65(9): 2247-2261 (2022) - [j15]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
On the upper bound of squared correlation of SIMON-like functions and its applications. IET Inf. Secur. 16(3): 220-234 (2022) - [i13]Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier:
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers. IACR Cryptol. ePrint Arch. 2022: 135 (2022) - 2021
- [j14]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE Trans. Inf. Theory 67(2): 1054-1068 (2021) - 2020
- [j13]Lin Jiao, Yongqiang Li, Yonglin Hao:
A Guess-And-Determine Attack On SNOW-V Stream Cipher. Comput. J. 63(12): 1789-1812 (2020) - [j12]Yuyin Yu, Nikolay S. Kaleyski, Lilya Budaghyan, Yongqiang Li:
Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9. Finite Fields Their Appl. 68: 101733 (2020) - [c5]Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. ASIACRYPT (1) 2020: 415-445 - [i12]Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version). IACR Cryptol. ePrint Arch. 2020: 1093 (2020)
2010 – 2019
- 2019
- [j11]Lin Jiao, Yonglin Hao, Yongqiang Li:
Improved guess-and-determine attack on TRIVIUM. IET Inf. Secur. 13(5): 411-419 (2019) - [i11]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IACR Cryptol. ePrint Arch. 2019: 1438 (2019) - [i10]Yuyin Yu, Nikolay S. Kaleyski, Lilya Budaghyan, Yongqiang Li:
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9. IACR Cryptol. ePrint Arch. 2019: 1491 (2019) - 2018
- [j10]Lin Jiao, Yongqiang Li, Yonglin Hao:
Guess-and-determine attacks on PANAMA-like stream ciphers. IET Inf. Secur. 12(6): 484-497 (2018) - [j9]Yongqiang Li, Shizhu Tian, Yuyin Yu, Mingsheng Wang:
On the Generalization of Butterfly Structure. IACR Trans. Symmetric Cryptol. 2018(1): 160-179 (2018) - [c4]Ya Han, Yongqiang Li, Mingsheng Wang:
Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. ICICS 2018: 647-663 - 2017
- [j8]Yuwei Xu, Yongqiang Li, Chuankun Wu, Feng Liu:
On the construction of differentially 4-uniform involutions. Finite Fields Their Appl. 47: 309-329 (2017) - [j7]Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
Optimal Differential Trails in SIMON-like Ciphers. IACR Trans. Symmetric Cryptol. 2017(1): 358-379 (2017) - [i9]Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
Optimal Differential Trails in SIMON-like Ciphers. IACR Cryptol. ePrint Arch. 2017: 178 (2017) - [i8]Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
The Security of SIMON-like Ciphers Against Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2017: 576 (2017) - 2016
- [j6]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
Construction of MDS block diffusion matrices for block ciphers and hash functions. Sci. China Inf. Sci. 59(9): 99101 (2016) - [c3]Yongqiang Li, Mingsheng Wang:
On the Construction of Lightweight Circulant Involutory MDS Matrices. FSE 2016: 121-139 - [i7]Yongqiang Li, Mingsheng Wang:
On the Construction of Lightweight Circulant Involutory MDS Matrices. IACR Cryptol. ePrint Arch. 2016: 406 (2016) - 2015
- [i6]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. IACR Cryptol. ePrint Arch. 2015: 449 (2015) - 2014
- [j5]Yongqiang Li, Mingsheng Wang:
Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1). Des. Codes Cryptogr. 72(2): 249-264 (2014) - [j4]Yuyin Yu, Mingsheng Wang, Yongqiang Li:
A matrix approach for constructing quadratic APN functions. Des. Codes Cryptogr. 73(2): 587-600 (2014) - [c2]Yongqiang Li, Mingsheng Wang:
Constructing S-boxes for Lightweight Cryptography with Feistel Structure. CHES 2014: 127-146 - 2013
- [j3]Yongqiang Li, Mingsheng Wang:
The Nonexistence of Permutations EA-Equivalent to Certain AB Functions. IEEE Trans. Inf. Theory 59(1): 672-679 (2013) - [i5]Yuyin Yu, Mingsheng Wang, Yongqiang Li:
A Matrix Approach for Constructing Quadratic APN Functions. IACR Cryptol. ePrint Arch. 2013: 7 (2013) - [i4]Yongqiang Li, Mingsheng Wang, Yuyin Yu:
Constructing Differentially 4-uniform Permutations over GF(22k) from the Inverse Function Revisited. IACR Cryptol. ePrint Arch. 2013: 731 (2013) - 2012
- [c1]Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li:
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators. Inscrypt 2012: 294-310 - 2011
- [j2]Yongqiang Li, Mingsheng Wang:
Permutation polynomials EA-equivalent to the inverse function over GF (2n). Cryptogr. Commun. 3(3): 175-186 (2011) - [j1]Yongqiang Li, Mingsheng Wang:
On EA-equivalence of certain permutations to power mappings. Des. Codes Cryptogr. 58(3): 259-269 (2011) - [i3]Yuyin Yu, Mingsheng Wang, Yongqiang Li:
Constructing differential 4-uniform permutations from know ones. IACR Cryptol. ePrint Arch. 2011: 47 (2011) - [i2]Yongqiang Li, Mingsheng Wang:
Constructing differentially 4-uniform permutations over 22m from quadratic APN permutations over 22m+1. IACR Cryptol. ePrint Arch. 2011: 642 (2011) - 2010
- [i1]Yongqiang Li, Mingsheng Wang:
On permutation polynomials EA-equivalent to the inverse function over GF(2n). IACR Cryptol. ePrint Arch. 2010: 573 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint