|
个人信息Personal Information
教授 博士生导师 硕士生导师
性别:女
毕业院校:山东大学
学历:博士研究生毕业
学位:博士
在职信息:在职
所在单位:网络空间安全学院(研究院)
入职时间:2005-03-18
电子邮箱:
扫描关注
- [21] Improved Attacks on LowMC with Algebraic Techniques. IACR Trans. Symmetric Cryptol., 2023(4), 143-165, 2023.
- [22] Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. IACR Trans. Symmetric Cryptol., 2023(2), 132-175, 2023.
- [23] SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations. IACR Trans. Symmetric Cryptol., 2023(1), 111-151, 2023.
- [24] Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies. ASIACRYPT 2022, 537-566, 2022.
- [25] On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC. ASIACRYPT 2022, 241-270, 2022.
- [26] Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU. IACR Trans. Symmetric Cryptol., 2022(2), 161-200, 2022.
- [27] More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs. IACR Trans. Symmetric Cryptol., 2022(2), 351-378, 2022.
- [28] A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis. EUROCRYPT 2022, 115-144, 2022.
- [29] Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Trans. Symmetric Cryptol., 2022(1), 212-219, 2022.
- [30] Towards Low-Latency Implementation of Linear Layers. IACR Trans. Symmetric Cryptol., 2022(1), 158-182, 2022.
- [31] Massive Superpoly Recovery with Nested Monomial Predictions. ASIACRYPT 2021, 392-421, 2021.
- [32] Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Trans. Symmetric Cryptol., 2021(2), 199-221, 2021.
- [33] Accelerating the Search of Differential and Linear Characteristics with the SAT Method.. IACR Trans. Symmetric Cryptol., 2021(1), 269-315, 2021.
- [34] An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. ASIACRYPT 2020, 446-476, 2020.
- [35] Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Trans. Symmetric Cryptol., 2020(3), 119-151, 2020.
- [36] Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks. IACR Trans. Symmetric Cryptol., 2020(3), 305-326, 2020.
- [37] On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers. IACR Trans. Symmetric Cryptol., 2020(3), 262-287, 2020.
- [38] Finding Bit-Based Division Property for Ciphers with Complex Linear Layers. IACR Trans. Symmetric Cryptol., 2020(1), 396-424, 2020.
- [39] Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. IACR Trans. Symmetric Cryptol., 2019(1), 236-263, 2019.
- [40] More Accurate Differential Properties of LED64 and Midori64. IACR Trans. Symmetric Cryptol., 2018(3), 93-123, 2018.
