![]() |
个人信息Personal Information
教授 博士生导师 硕士生导师
性别:女
出生日期:1974-07-18
毕业院校:山东大学
学历:博士研究生毕业
学位:理学博士学位
在职信息:在职
所在单位:网络空间安全学院(研究院)
入职时间:2005-03-18
电子邮箱:infosec@sdu.edu.cn
扫描关注
- [21] 樊燕红. Investigation for 8-bit SKINNY-like S-boxes, analysis and applications. 密码与通讯, 13, 2021.
- [22] 赵梓伸. Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC. INFORMATION PROCESSING LETTERS Journal, 171, 2021.
- [23] 樊燕红. A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY Journal, 36, 2021.
- [24] 孙玲. On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers. 2020.
- [25] 郭淳. Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks. IACR Transactions on Symmetric Cryptology, 2020.
- [26] 高源. Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks. IACR Transactions on Symmetric Cryptology, 2020.
- [27] 郭浩 , 孙思维 and 王美琴. Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Transactions on Symmetric Cryptology, 2020, 119-151, 2020.
- [28] 孙玲 and 王美琴. On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers. IACR Transactions on Symmetric Cryptology, 2020, 262-287, 2020.
- [29] 高源 , 郭淳 , 王美琴 , 王伟嘉 and 文洁晶. Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks. IACR Transactions on Symmetric Cryptology, 2020, 305-326, 2020.
- [30] 安鑫 , 胡凯 and 王美琴. MixColumns Coefficient Property and Security of the AES with A Secret S-Box. AFRICACRYPT 2020, 114-131, 2020.
- [31] 胡凯 and 王美琴. Finding Bit-Based Division Property for Ciphers with Complex Linear Layers.. IACR Transactions on Symmetric Cryptology, 2020, 396-424, 2020.
- [32] Cui, Tingting. Distinguisher on full-round compression function of GOST R. INFORMATION PROCESSING LETTERS Journal, 156, 2020.
- [33] 崔婷婷 , 王美琴 and 王薇. Distinguisher on full-round compression function of GOST R. Inf. Process. Lett, 156, 105902, 2020.
- [34] 李艳斌 , Gaëtan Leurent , 王美琴 , 王薇 and 张国艳. Universal Forgery Attack Against GCM-RUP. CT-RSA 2020, 15-34, 2020.
- [35] 王薇 and 王美琴. Related-Tweakey Impossible Differential Attack on QARMA-128. SCIENCE CHINA-Information Sciences, 2020.
- [36] 王美琴 and 王薇. Cryptanalysis of PRIMATEs. SCIENCE CHINA-Information Sciences, 63, 1, 2020.
- [37] 李艳斌. Universal forgery attack against GCM-RUP. 12006 LNCS, 15-34, 2020.
- [38] 孙玲 , 王美琴 and 王薇. MILP-aided bit-based division property for primitives with non-bit-permutation linear layers. IET Inf. Secur., 14, 12-20, 2020.
- [39] 孙玲. MILP-aided bit-based division property for primitives with non-bit-permutation linear layers. IET Information Security, 14, 12, 2020.
- [40] 李艳斌. Cryptanalysis of PRIMATEs. SCIENCE CHINA-Information Sciences, 63, 2020.