Chao Li

Affiliations:
  • National University of Defense Technology, Changsha, China


According to our database1, Chao Li authored at least 120 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers.
Comput. J., February, 2024

2023
New Wine Old Bottles: Feistel Structure Revised.
IEEE Trans. Inf. Theory, March, 2023

Rotational Differential-Linear Cryptanalysis Revisited.
J. Cryptol., 2023

Characterizations and constructions of <i>n</i>-to-1 mappings over finite fields.
Finite Fields Their Appl., 2023

2022
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix.
Theor. Comput. Sci., 2022

Improved rotational-XOR cryptanalysis of Simon-like block ciphers.
IET Inf. Secur., 2022

A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.
IACR Cryptol. ePrint Arch., 2022

Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK.
IACR Cryptol. ePrint Arch., 2022

Characterizations and constructions of n-to-1 mappings over finite fields.
CoRR, 2022

Improved nonlinear invariant attack.
Sci. China Inf. Sci., 2022

On equivalence between two known families of APN polynomial functions and APN power functions.
Cryptogr. Commun., 2022

2021
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers.
IACR Cryptol. ePrint Arch., 2021

Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette.
IACR Cryptol. ePrint Arch., 2021

A Note on the Bias of Rotational Differential-Linear Distinguishers.
IACR Cryptol. ePrint Arch., 2021

Autocorrelations of vectorial Boolean functions.
IACR Cryptol. ePrint Arch., 2021

On equivalence between known polynomial APN functions and power APN functions.
Finite Fields Their Appl., 2021

The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions.
Discret. Appl. Math., 2021

Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem.
Adv. Math. Commun., 2021

Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
A New Construction of (<i>m</i>+<i>k</i>, <i>m</i>)-Functions with Low Differential Uniformity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Rotational-XOR Cryptanalysis of Simon-like Block Ciphers.
IACR Cryptol. ePrint Arch., 2020

On a conjecture about a class of permutation quadrinomials.
Finite Fields Their Appl., 2020

The phantom of differential characteristics.
Des. Codes Cryptogr., 2020

Hierarchical Identity-Based Signature in Polynomial Rings.
Comput. J., 2020

On the Security of LWE Cryptosystem against Subversion Attacks.
Comput. J., 2020

Constructing 1-resilient rotation symmetric functions over 픽<sub>p</sub> with q variables through special orthogonal arrays.
Adv. Math. Commun., 2020

2019
New Results About the Boomerang Uniformity of Permutation Polynomials.
IEEE Trans. Inf. Theory, 2019

New Classes of Efficient MDS Transformations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Simplified Revocable Hierarchical Identity-Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2019

On the Differential-Linear Connectivity Table of Vectorial Boolean Functions.
CoRR, 2019

On the Differential Linear Connectivity Table of Vectorial Boolean Functions.
CoRR, 2019

Further improvement of factoring N = p<sup>r</sup> q<sup>s</sup> with partial known bits.
Adv. Math. Commun., 2019

Improved Cryptanalysis on SipHash.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Impossible Differential Cryptanalysis of Fantomas and Robin.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2018

A lower dimension lattice attack on NTRU.
Sci. China Inf. Sci., 2018

A better bound for implicit factorization problem with shared middle bits.
Sci. China Inf. Sci., 2018

Permutation polynomials of the form cx + Tr<sub>q<sup>l</sup>/q</sub>(x<sup>a</sup>) and permutation trinomials over finite fields with even characteristic.
Cryptogr. Commun., 2018

New constructions of systematic authentication codes from three classes of cyclic codes.
Adv. Math. Commun., 2018

2017
Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Revised cryptanalysis for SMS4.
Sci. China Inf. Sci., 2017

Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers.
Proceedings of the Information Security Practice and Experience, 2017

2016
Constructions of <i>p</i>-variable 1-resilient rotation symmetric functions over <i>GF(p)</i>.
Secur. Commun. Networks, 2016

New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

A new method to investigate the CCZ-equivalence between functions with low differential uniformity.
Finite Fields Their Appl., 2016

More constructions of differentially 4-uniform permutations on 𝔽<sub>2<sup>2k</sup></sub>.
Des. Codes Cryptogr., 2016

New Permutation Trinomials Constructed from Fractional Polynomials.
CoRR, 2016

New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽<sub>p</sub>.
Sci. China Inf. Sci., 2016

Impossible Differentials of SPN Ciphers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Truncated differential cryptanalysis of PRINCE.
Secur. Commun. Networks, 2015

Differential fault analysis on LED using Super-Sbox.
IET Inf. Secur., 2015

A New Attack on RSA with Known Middle Bits of the Private Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015

2-Adic complexity of binary sequences with interleaved structure.
Finite Fields Their Appl., 2015

2014
A New Method to Compute the 2-Adic Complexity of Binary Sequences.
IEEE Trans. Inf. Theory, 2014

A recursive construction of highly nonlinear resilient vectorial functions.
Inf. Sci., 2014

When a Boolean Function can be Expressed as the Sum of two Bent Functions.
IACR Cryptol. ePrint Arch., 2014

On the Walsh spectrum of a family of quadratic APN functions with five terms.
Sci. China Inf. Sci., 2014

Some results on the differential functions over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014

On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function.
Proceedings of the Provable Security - 8th International Conference, 2014

2013
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method.
IEEE Trans. Inf. Theory, 2013

Fault analysis study of the block cipher FOX64.
Multim. Tools Appl., 2013

New constructions of semi-bent functions in polynomial forms.
Math. Comput. Model., 2013

Linear complexity of binary sequences with interleaved structure.
IET Commun., 2013

On the Balanced Elementary Symmetric Boolean Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A negative answer to Bracken-Tan-Tan's problem on differentially 4-uniform permutations over F2n.
Finite Fields Their Appl., 2013

More Constructions of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$.
CoRR, 2013

Security evaluation of MISTY structure with SPN round function.
Comput. Math. Appl., 2013

New construction of perfect sequence set and low correlation zone sequence set.
Sci. China Inf. Sci., 2013

Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Sci. China Inf. Sci., 2013

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Math. Comput. Model., 2012

On the number of rotation symmetric functions over GF(p).
Math. Comput. Model., 2012

New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties.
Int. J. Found. Comput. Sci., 2012

New constructions of low-correlation sequences with high-linear complexity.
IET Commun., 2012

On Algebraic Property of T-Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Construction of highly nonlinear resilient S-boxes with given degree.
Des. Codes Cryptogr., 2012

Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

2011
A meet-in-the-middle attack on reduced-round ARIA.
J. Syst. Softw., 2011

Impossible differential cryptanalysis of 13-round CLEFIA-128.
J. Syst. Softw., 2011

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
J. Inf. Sci. Eng., 2011

Differential Fault Analysis on SMS4 using a single fault.
Inf. Process. Lett., 2011

Impossible differential cryptanalysis of SPN ciphers.
IET Inf. Secur., 2011

Balanced rotation symmetric boolean functions with maximum algebraic immunity.
IET Inf. Secur., 2011

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011

Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0.
Proceedings of the 2011 World Congress on Internet Security, 2011

2010
Enumeration of balanced symmetric functions over GF(p).
Inf. Process. Lett., 2010

Improved Fault Attack on FOX.
IACR Cryptol. ePrint Arch., 2010

A Meet-in-the-Middle Attack on ARIA.
IACR Cryptol. ePrint Arch., 2010

Some Observations on MISTY Structure with SPN Round Function.
IACR Cryptol. ePrint Arch., 2010

SQUARE attack on block ciphers with low algebraic degree.
Sci. China Inf. Sci., 2010

On the number of rotation symmetric Boolean functions.
Sci. China Inf. Sci., 2010

Impossible Differential Cryptanalysis on Feistel Ciphers with <i>SP</i> and <i>SPS</i> Round Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions.
IEEE Trans. Inf. Theory, 2009

New Integral Distinguisher for Rijndael-256.
IACR Cryptol. ePrint Arch., 2009

Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network.
IACR Cryptol. ePrint Arch., 2009

Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A New Construction of Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Information Security, 12th International Conference, 2009

New Cryptanalysis of Block Ciphers with Low Algebraic Degree.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Differential Fault Analysis on SHACAL-1.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Minimum Distance between Bent and Resilient Boolean Functions.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

Integral Cryptanalysis of ARIA.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Saturation Attack on the Block Cipher HIGHT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
On the Construction of Boolean Functions With Optimal Algebraic Immunity.
IEEE Trans. Inf. Theory, 2008

New Impossible Differential Cryptanalysis of ARIA.
IACR Cryptol. ePrint Arch., 2008

Enumeration of Balanced Symmetric Functions over GF(p).
IACR Cryptol. ePrint Arch., 2008

On the 2<sup>m</sup>-variable symmetric Boolean functions with maximum algebraic immunity.
Sci. China Ser. F Inf. Sci., 2008

Construction of Resilient Functions with Multiple Cryptographic Criteria.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Enumeration of Homogeneous Rotation Symmetric Functions over Fp.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables.
IEEE Trans. Inf. Theory, 2007

Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
The Design Principle of Hash Function with Merkle-Damgård Construction.
IACR Cryptol. ePrint Arch., 2006

2005
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count.
IACR Cryptol. ePrint Arch., 2005


  Loading...