Jiqiang Lu 吕继强
Jiqiang Lu 吕继强
Institute for Infocomm Research (I2R), A*STAR
Verified email at i2r.a-star.edu.sg - Homepage
TitleCited byYear
New impossible differential attacks on AES
J Lu, O Dunkelman, N Keller, J Kim
INDOCRYPT 2008 --- The 9th International Conference on Cryptology in India …, 2008
1542008
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
J Lu, J Kim, N Keller, O Dunkelman
CT-RSA 2008 --- Cryptographers' Track at the RSA Conference 2008, 370--386, 2008
1122008
Related-key rectangle attack on 36 rounds of the XTEA block cipher
J Lu
International Journal of Information Security 8 (1), 1-11, 2009
842009
Attacking reduced-round versions of the SMS4 block cipher in the Chinese WAPI standard
J Lu
ICICS 2007 --- The 9th International Conference on Information and …, 2007
582007
Practical convertible authenticated encryption schemes using self-certified public keys
J Lv, X Wang, K Kim
Applied Mathematics and Computation 169 (2), 1285-1297, 2005
442005
Related-key rectangle attack on 42-round SHACAL-2
J Lu, J Kim, N Keller, O Dunkelman
ISC 2006 --- The 9th International Conference on Information Security, 85-100, 2006
352006
Verifiable ring signature
J Lv, X Wang
CANS 2003 --- The 3rd International Workshop on Cryptology and Network …, 2003
342003
Cryptanalysis of Block Ciphers
J Lu
PhD Thesis, 2008
322008
You cannot hide behind the mask: Power analysis on a provably secure s-box implementation
J Pan, JI den Hartog, J Lu
WISA 2009 --- The 10th International Workshop on Information Security …, 2009
292009
Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006
J Lu
ICISC 2007 --- The 9th International Conference on Information Security and …, 2007
282007
Cryptanalysis of reduced versions of the Camellia block cipher
J Lu, Y Wei, PA Fouque, J Kim
IET Information Security 6 (3), 228-238, 2012
272012
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
Y Wei, J Lu, Y Hu
ISPEC 2011 --- The 7th Information Security Practice and Experience …, 2011
252011
On Lightweight Security Enforcement in Cyber-Physical Systems
Y Yang, J Lu, KKR Choo, JK Liu
LightSec 2015 --- The Fourth International Workshop on Lightweight …, 2016
232016
Differential and rectangle attacks on reduced-round SHACAL-1
J Lu, J Kim, N Keller, O Dunkelman
INDOCRYPT 2006 --- The 7th International Conference on Cryptology in India …, 2006
222006
Attacking 44 rounds of the SHACAL-2 block cipher using related-key rectangle cryptanalysis
J Lu, J Kim
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
202008
Enhanced DES implementation secure against high-order differential power analysis in smartcards
J Lv, Y Han
ACISP 2005 --- The 10th Australasian Conference on Information Security and …, 2005
202005
Related-key attacks on the full-round Cobra-F64a and Cobra-F64b
J Lu, C Lee, J Kim
SCN 2006 --- The 5th International Conference on Security and Cryptography …, 2006
192006
Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms
J Lu
ASIACCS 2017 --- The 12th ACM Asia Conference on Computer and Communications …, 2017
17*2017
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
JL Lu, J Wei, Yongzhuang, Kim, E Pasalic
Theoretical Computer Science 527, 102--122, 2014
172014
Principles on the security of AES against first and second-order differential power analysis
J Lu, J Pan, J den Hartog
ACNS 2010 --- The 8th International Conference on Applied Cryptography and …, 2010
172010
The system can't perform the operation now. Try again later.
Articles 1–20