Chaoyun Li

Orcid: 0000-0001-9917-3419

According to our database1, Chaoyun Li authored at least 25 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V.
IACR Cryptol. ePrint Arch., 2024

2022
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest.
IACR Cryptol. ePrint Arch., 2022

2021
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Towards practical intrusion detection system over encrypted traffic.
IET Inf. Secur., 2021

2020
Links between Division Property and Other Cube Attack Variants.
IACR Trans. Symmetric Cryptol., 2020

Cryptanalysis of the MALICIOUS Framework.
IACR Cryptol. ePrint Arch., 2020

2019
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.
IACR Trans. Symmetric Cryptol., 2019

Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019

Lightweight Iterative MDS Matrices: How Small Can We Go?
IACR Cryptol. ePrint Arch., 2019

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit.
IACR Cryptol. ePrint Arch., 2019

Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree.
IACR Cryptol. ePrint Arch., 2019

New classes of complete permutation polynomials.
Finite Fields Their Appl., 2019

Binary sequences with period N and nonlinear complexity N - 2.
Cryptogr. Commun., 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
IACR Cryptol. ePrint Arch., 2018

Permutation polynomials (xpm-x+δ)s1+(xpm-x+δ)s2+x over Fpn.
Finite Fields Their Appl., 2018

Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs.
Sci. China Inf. Sci., 2018

2017
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IACR Cryptol. ePrint Arch., 2017

Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices.
IACR Cryptol. ePrint Arch., 2017

2016
Construction of de Bruijn Sequences From LFSRs With Reducible Characteristic Polynomials.
IEEE Trans. Inf. Theory, 2016

2014
A Class of de Bruijn Sequences.
IEEE Trans. Inf. Theory, 2014

The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs.
IEEE Trans. Inf. Theory, 2014


  Loading...