Improved division property based cube attacks exploiting algebraic properties of superpoly Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang IEEE Transactions on Computers, 275-305, 2018 | 100 | 2018 |
The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs C Li, X Zeng, T Helleseth, C Li, L Hu IEEE Transactions on Information Theory 60 (5), 3052-3061, 2014 | 56 | 2014 |
Construction of de Bruijn sequences from LFSRs with reducible characteristic polynomials C Li, X Zeng, C Li, T Helleseth, M Li IEEE Transactions on Information Theory 62 (1), 610-624, 2015 | 52 | 2015 |
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits S Li, S Sun, C Li, Z Wei, L Hu IACR Transactions on Symmetric Cryptology, 84-117, 2019 | 48 | 2019 |
A class of de Bruijn sequences C Li, X Zeng, C Li, T Helleseth IEEE Transactions on Information Theory 60 (12), 7955-7969, 2014 | 46 | 2014 |
Permutation polynomials (xpm− x+ δ) s1+ (xpm− x+ δ) s2+ x over Fpn L Li, S Wang, C Li, X Zeng Finite Fields and Their Applications 51, 31-61, 2018 | 36 | 2018 |
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices C Li, Q Wang IACR Transactions on Symmetric Cryptology 2017 (1), 129-155, 2017 | 35 | 2017 |
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full D Shi, S Sun, Y Sasaki, C Li, L Hu Annual International Cryptology Conference, 180-209, 2019 | 30 | 2019 |
Ciphertext-only fault analysis on the led lightweight cryptosystem in the internet of things W Li, L Liao, D Gu, C Li, C Ge, Z Guo, Y Liu, Z Liu IEEE Transactions on Dependable and Secure Computing 16 (3), 454-461, 2018 | 25 | 2018 |
New classes of complete permutation polynomials L Li, C Li, C Li, X Zeng Finite Fields and Their Applications 55, 177-201, 2019 | 21 | 2019 |
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree C Li, B Preneel International Conference on Selected Areas in Cryptography, 171-193, 2019 | 19 | 2019 |
Links between Division Property and Other Cube Attack Variants Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang IACR Transactions on Symmetric Cryptology 1 (1), 2020 | 16 | 2020 |
Lightweight Iterative MDS Matrices: How Small Can We Go? S Li, S Sun, D Shi, C Li, L Hu IACR Transactions on Symmetric Cryptology, 147-170, 2019 | 12 | 2019 |
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18. Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang IACR Cryptology ePrint Archive 2018, 972, 2018 | 12 | 2018 |
ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest G Barbu, W Beullens, E Dottax, C Giraud, A Houzelot, C Li, M Mahzoun, ... Cryptology ePrint Archive, 2022 | 8* | 2022 |
Binary sequences with period N and nonlinear complexity N − 2 Z Xiao, X Zeng, C Li, Y Jiang Cryptography and Communications 11 (4), 735-757, 2019 | 8 | 2019 |
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs W Li, V Rijmen, Z Tao, Q Wang, H Chen, Y Liu, C Li, Y Liu Science China Information Sciences 61 (3), 032110, 2018 | 8 | 2018 |
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks W Li, J Li, D Gu, C Li, T Cai IEEE Transactions on Information Forensics and Security 16, 4224-4233, 2021 | 6 | 2021 |
Cryptanalysis of the MALICIOUS Framework. T Beyne, C Li IACR Cryptol. ePrint Arch. 2020, 1032, 2020 | 4 | 2020 |
Towards practical intrusion detection system over encrypted traffic S Canard, C Li IET Information Security 15 (3), 231-246, 2021 | 3 | 2021 |