Differential and linear cryptanalysis using mixed-integer linear programming N Mouha, Q Wang, D Gu, B Preneel Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012 | 521 | 2012 |
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware B Bilgin, A Bogdanov, M Knežević, F Mendel, Q Wang Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013 | 154 | 2013 |
Cryptanalysis of reduced-round SIMON32 and SIMON48 Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014 | 127 | 2014 |
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier Annual Cryptology Conference 2018 - CRYPTO 2018 1, 275-305, 2018 | 104 | 2018 |
Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead Y Hao, G Leander, W Meier, Y Todo, Q Wang Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 94* | 2020 |
Links among impossible differential, integral and zero correlation linear cryptanalysis B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H Alkhzaimi, C Li Annual Cryptology Conference - CRYPTO 2015, 95-115, 2015 | 94 | 2015 |
Optimized interpolation attacks on LowMC I Dinur, Y Liu, W Meier, Q Wang International Conference on the Theory and Application of Cryptology and …, 2015 | 91 | 2015 |
Automatic search of linear trails in ARX with applications to SPECK and Chaskey Y Liu, Q Wang, V Rijmen Applied Cryptography and Network Security: 14th International Conference …, 2016 | 77 | 2016 |
PRIMATEs v1. Submission to the CAESAR Competition (2014) E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ... | 73* | 2014 |
Lightweight AEAD and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... IACR Transactions on Symmetric Cryptology 2020 (S1), 208-261, 2020 | 72 | 2020 |
Schwaemm and Esch: Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... | 72 | 2019 |
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums K Hu, S Sun, M Wang, Q Wang International Conference on the Theory and Application of Cryptology and …, 2020 | 63 | 2020 |
An algebraic attack on ciphers with low-degree round functions: application to full MiMC M Eichlseder, L Grassi, R Lüftenegger, M Øygarden, C Rechberger, ... Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 60 | 2020 |
Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX) C Beierle, A Biryukov, L Cardoso dos Santos, J Großschädl, L Perrin, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 56 | 2020 |
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications L Grassi, Y Hao, C Rechberger, M Schofnegger, R Walch, Q Wang Annual International Cryptology Conference, 573-606, 2023 | 43 | 2023 |
Design of lightweight linear diffusion layers from near-MDS matrices C Li, Q Wang Cryptology ePrint Archive, 2017 | 36 | 2017 |
Zero-sum partitions of PHOTON permutations Q Wang, L Grassi, C Rechberger Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018 | 35 | 2018 |
Massive superpoly recovery with nested monomial predictions K Hu, S Sun, Y Todo, M Wang, Q Wang Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 30 | 2021 |
Finding bit-based division property for ciphers with complex linear layers K Hu, Q Wang, M Wang IACR Transactions on Symmetric Cryptology, 396-424, 2020 | 17 | 2020 |
Links between division property and other cube attack variants Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang IACR Transactions on Symmetric Cryptology, 363-395, 2020 | 16 | 2020 |