Qingju Wang (王庆菊)
Qingju Wang (王庆菊)
Postdoctoral Researcher, University of Luxembourg
Verified email at uni.lu - Homepage
TitleCited byYear
Differential and linear cryptanalysis using mixed-integer linear programming
N Mouha, Q Wang, D Gu, B Preneel
International Conference on Information Security and Cryptology, 57-76, 2011
1642011
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
992018
Fides: Lightweight authenticated cipher with side-channel resistance for constrained hardware
B Bilgin, A Bogdanov, M Knežević, F Mendel, Q Wang
International Workshop on Cryptographic Hardware and Embedded Systems, 142-158, 2013
892013
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
International Conference on Cryptology in India, 143-160, 2014
742014
PRIMATEs v1. Submission to the CAESAR Competition (2014)
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
42*
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H Alkhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
402015
Optimized interpolation attacks on LowMC
I Dinur, Y Liu, W Meier, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2015
252015
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Annual Cryptology Conference 1, 275-305, 2018
17*2018
PRIMATEs v1. 02 submission to the CAESAR competition
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Sep, 2014
122014
Single byte differential fault analysis on the LED lightweight cipher in the wireless sensor network
W Li, D Gu, X Xia, C Zhao, Z Liu, Y Liu, Q Wang
International Journal of Computational Intelligence Systems 5 (5), 896-904, 2012
112012
Automatic search of linear trails in ARX with applications to SPECK and Chaskey
Y Liu, Q Wang, V Rijmen
International Conference on Applied Cryptography and Network Security, 485-499, 2016
102016
Zero-sum partitions of PHOTON permutations
Q Wang, L Grassi, C Rechberger
Cryptographers’ Track at the RSA Conference, 279-299, 2018
82018
Design of lightweight linear diffusion layers from near-MDS matrices
C Li, Q Wang
IACR Transactions on Symmetric Cryptology, 129-155, 2017
72017
Improved impossible differential attacks on large-block Rijndael
Q Wang, D Gu, V Rijmen, Y Liu, J Chen, A Bogdanov
International Conference on Information Security and Cryptology, 126-140, 2012
72012
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
IACR Cryptology ePrint Archive 2018, 972, 2018
52018
On the division property of S-boxes.
F Göloglu, V Rijmen, Q Wang
IACR Cryptology ePrint Archive 2016, 188, 2016
52016
Security Evaluation of the Block Cipher LEA Final Report
A Bogdanov, N Mouha, E Tischhauser, D Toz, K Varici, V Velichkov, ...
COSIC, Belgium, 3-30, 2011
52011
Meet‐in‐the‐middle fault analysis on word‐oriented substitution‐permutation network block ciphers
Z Liu, Y Liu, Q Wang, D Gu, W Li
Security and Communication Networks 8 (4), 672-681, 2015
42015
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
Q Wang, A Bogdanov
Information Processing Letters 112 (11), 427-432, 2012
32012
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
W Li, V Rijmen, Z Tao, Q Wang, H Chen, Y Liu, C Li, Y Liu
Science China Information Sciences 61 (3), 032110, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20