关注
Chaoyun Li
Chaoyun Li
COSIC, KU Leuven
在 esat.kuleuven.be 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Improved division property based cube attacks exploiting algebraic properties of superpoly
Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang
IEEE Transactions on Computers, 275-‌305, 2018
1002018
The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
C Li, X Zeng, T Helleseth, C Li, L Hu
IEEE Transactions on Information Theory 60 (5), 3052-3061, 2014
562014
Construction of de Bruijn sequences from LFSRs with reducible characteristic polynomials
C Li, X Zeng, C Li, T Helleseth, M Li
IEEE Transactions on Information Theory 62 (1), 610-624, 2015
522015
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits
S Li, S Sun, C Li, Z Wei, L Hu
IACR Transactions on Symmetric Cryptology, 84-117, 2019
482019
A class of de Bruijn sequences
C Li, X Zeng, C Li, T Helleseth
IEEE Transactions on Information Theory 60 (12), 7955-7969, 2014
462014
Permutation polynomials (xpm− x+ δ) s1+ (xpm− x+ δ) s2+ x over Fpn
L Li, S Wang, C Li, X Zeng
Finite Fields and Their Applications 51, 31-61, 2018
362018
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
C Li, Q Wang
IACR Transactions on Symmetric Cryptology 2017 (1), 129-155, 2017
352017
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full
D Shi, S Sun, Y Sasaki, C Li, L Hu
Annual International Cryptology Conference, 180-209, 2019
302019
Ciphertext-only fault analysis on the led lightweight cryptosystem in the internet of things
W Li, L Liao, D Gu, C Li, C Ge, Z Guo, Y Liu, Z Liu
IEEE Transactions on Dependable and Secure Computing 16 (3), 454-461, 2018
252018
New classes of complete permutation polynomials
L Li, C Li, C Li, X Zeng
Finite Fields and Their Applications 55, 177-201, 2019
212019
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
C Li, B Preneel
International Conference on Selected Areas in Cryptography, 171-193, 2019
192019
Links between Division Property and Other Cube Attack Variants
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
IACR Transactions on Symmetric Cryptology 1 (1), 2020
162020
Lightweight Iterative MDS Matrices: How Small Can We Go?
S Li, S Sun, D Shi, C Li, L Hu
IACR Transactions on Symmetric Cryptology, 147-170, 2019
122019
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
IACR Cryptology ePrint Archive 2018, 972, 2018
122018
ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest
G Barbu, W Beullens, E Dottax, C Giraud, A Houzelot, C Li, M Mahzoun, ...
Cryptology ePrint Archive, 2022
8*2022
Binary sequences with period N and nonlinear complexity N − 2
Z Xiao, X Zeng, C Li, Y Jiang
Cryptography and Communications 11 (4), 735-757, 2019
82019
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
W Li, V Rijmen, Z Tao, Q Wang, H Chen, Y Liu, C Li, Y Liu
Science China Information Sciences 61 (3), 032110, 2018
82018
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks
W Li, J Li, D Gu, C Li, T Cai
IEEE Transactions on Information Forensics and Security 16, 4224-4233, 2021
62021
Cryptanalysis of the MALICIOUS Framework.
T Beyne, C Li
IACR Cryptol. ePrint Arch. 2020, 1032, 2020
42020
Towards practical intrusion detection system over encrypted traffic
S Canard, C Li
IET Information Security 15 (3), 231-246, 2021
32021
系统目前无法执行此操作,请稍后再试。
文章 1–20