New impossible differential attacks on AES J Lu, O Dunkelman, N Keller, J Kim INDOCRYPT 2008 --- The 9th International Conference on Cryptology in India …, 2008 | 214 | 2008 |
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1 J Lu, J Kim, N Keller, O Dunkelman CT-RSA 2008 --- Cryptographers' Track at the RSA Conference 2008, 370--386, 2008 | 143 | 2008 |
Related-key rectangle attack on 36 rounds of the XTEA block cipher J Lu International Journal of Information Security 8 (1), 1-11, 2009 | 130 | 2009 |
Attacking reduced-round versions of the SMS4 block cipher in the Chinese WAPI standard J Lu ICICS 2007 --- The 9th International Conference on Information and …, 2007 | 69 | 2007 |
Verifiable ring signature J Lv, X Wang CANS 2003 --- The 3rd International Workshop on Cryptology and Network …, 2003 | 52 | 2003 |
Practical convertible authenticated encryption schemes using self-certified public keys J Lv, X Wang, K Kim Applied Mathematics and Computation 169 (2), 1285-1297, 2005 | 48 | 2005 |
Related-key rectangle attack on 42-round SHACAL-2 J Lu, J Kim, N Keller, O Dunkelman ISC 2006 --- The 9th International Conference on Information Security, 85-100, 2006 | 45 | 2006 |
Cryptanalysis of Block Ciphers J Lu PhD Thesis, 2008 | 44 | 2008 |
A methodology for differential-linear cryptanalysis and its applications J Lu Designs, Codes and Cryptography 77 (1), 11--48, 2015 | 43 | 2015 |
Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006 J Lu ICISC 2007 --- The 9th International Conference on Information Security and …, 2007 | 34 | 2007 |
On Lightweight Security Enforcement in Cyber-Physical Systems Y Yang, J Lu, KKR Choo, JK Liu LightSec 2015 --- The Fourth International Workshop on Lightweight …, 2016 | 33 | 2016 |
You cannot hide behind the mask: Power analysis on a provably secure s-box implementation J Pan, JI den Hartog, J Lu WISA 2009 --- The 10th International Workshop on Information Security …, 2009 | 31 | 2009 |
Attacking 44 rounds of the SHACAL-2 block cipher using related-key rectangle cryptanalysis J Lu, J Kim IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008 | 30 | 2008 |
Cryptanalysis of reduced versions of the Camellia block cipher J Lu, Y Wei, PA Fouque, J Kim IET Information Security 6 (3), 228-238, 2012 | 28 | 2012 |
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits Y Wei, J Lu, Y Hu ISPEC 2011 --- The 7th Information Security Practice and Experience …, 2011 | 28 | 2011 |
Enhanced DES implementation secure against high-order differential power analysis in smartcards J Lv, Y Han ACISP 2005 --- The 10th Australasian Conference on Information Security and …, 2005 | 28 | 2005 |
Principles on the security of AES against first and second-order differential power analysis J Lu, J Pan, J den Hartog ACNS 2010 --- The 8th International Conference on Applied Cryptography and …, 2010 | 26 | 2010 |
Related-key attacks on the full-round Cobra-F64a and Cobra-F64b J Lu, C Lee, J Kim SCN 2006 --- The 5th International Conference on Security and Cryptography …, 2006 | 24 | 2006 |
Differential and rectangle attacks on reduced-round SHACAL-1 J Lu, J Kim, N Keller, O Dunkelman INDOCRYPT 2006 --- The 7th International Conference on Cryptology in India …, 2006 | 23 | 2006 |
Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms J Lu ASIACCS 2017 --- The 12th ACM Asia Conference on Computer and Communications …, 2017 | 21* | 2017 |