Keting Jia
Orcid: 0000-0002-6396-8882
  According to our database1,
  Keting Jia
  authored at least 55 papers
  between 2008 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    IACR Trans. Symmetric Cryptol., 2025
    
  
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
    
  
    Proceedings of the 45th IEEE International Conference on Distributed Computing Systems, 2025
    
  
    Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
    
  
  2024
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
  2023
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers.
    
  
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
    
  
  2022
    Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
    
  
  2021
    IACR Trans. Symmetric Cryptol., 2021
    
  
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny.
    
  
    IACR Cryptol. ePrint Arch., 2021
    
  
    Sci. China Inf. Sci., 2021
    
  
New automatic tool for finding impossible differentials and zero-correlation linear approximations.
    
  
    Sci. China Inf. Sci., 2021
    
  
  2020
    IACR Cryptol. ePrint Arch., 2020
    
  
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect.
    
  
    IACR Cryptol. ePrint Arch., 2020
    
  
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT.
    
  
    Des. Codes Cryptogr., 2020
    
  
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers.
    
  
    Sci. China Inf. Sci., 2020
    
  
  2019
    IACR Cryptol. ePrint Arch., 2019
    
  
    IACR Cryptol. ePrint Arch., 2019
    
  
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version).
    
  
    IACR Cryptol. ePrint Arch., 2019
    
  
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version).
    
  
    IACR Cryptol. ePrint Arch., 2019
    
  
    Proceedings of the Provable Security, 2019
    
  
    Proceedings of the Information Security Practice and Experience, 2019
    
  
Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128.
    
  
    Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
    
  
  2018
    Sci. China Inf. Sci., 2018
    
  
  2016
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations.
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
    Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
    
  
    Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
    
  
  2015
    Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
    
  
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
    
  
    Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
    
  
    Proceedings of the Topics in Cryptology, 2015
    
  
  2014
    IACR Cryptol. ePrint Arch., 2014
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
    
  
  2013
    IACR Cryptol. ePrint Arch., 2013
    
  
    Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
    
  
  2012
    Proceedings of the Information Security Applications - 13th International Workshop, 2012
    
  
    Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
    
  
  2011
    IACR Cryptol. ePrint Arch., 2011
    
  
    Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
    
  
    Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
    
  
    Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
    
  
  2010
    Proceedings of the Information Security, 2010
    
  
    Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
    
  
  2009
    IACR Cryptol. ePrint Arch., 2009
    
  
    Proceedings of the Information, Security and Cryptology, 2009
    
  
    Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
    
  
    Proceedings of the Advances in Cryptology, 2009
    
  
    Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
    
  
  2008
    IACR Cryptol. ePrint Arch., 2008
    
  
    IACR Cryptol. ePrint Arch., 2008