Kexin Qiao
Orcid: 0000-0002-3624-9364
  According to our database1,
  Kexin Qiao
  authored at least 33 papers
  between 2014 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
    Cryptogr., 2025
    
  
  2024
    IEEE Internet Things J., July, 2024
    
  
Security Evaluation of Lightweight Block Ciphers Against Mixture Differential Cryptanalysis.
    
  
    IEEE Internet Things J., June, 2024
    
  
Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks.
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks.
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
Programming Equation Systems of Arithmetization-Oriented Primitives with Constraints.
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM.
    
  
    Sci. China Inf. Sci., 2024
    
  
  2023
    IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
    
  
    Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023
    
  
  2021
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks.
    
  
    IACR Cryptol. ePrint Arch., 2021
    
  
    Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
    
  
  2020
    Proceedings of the 19th IEEE International Conference on Trust, 2020
    
  
  2019
    IACR Cryptol. ePrint Arch., 2019
    
  
    IACR Cryptol. ePrint Arch., 2019
    
  
  2017
    IACR Cryptol. ePrint Arch., 2017
    
  
    Sci. China Inf. Sci., 2017
    
  
    Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
    
  
  2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
    
  
    IACR Trans. Symmetric Cryptol., 2016
    
  
    Proceedings of the Information Systems Security and Privacy, 2016
    
  
    Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
    
  
  2015
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
    
  
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
    Proceedings of the Network and System Security - 9th International Conference, 2015
    
  
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
    
  
    Proceedings of the Advances in Information and Computer Security, 2015
    
  
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
    
  
    Proceedings of the Information Security - 18th International Conference, 2015
    
  
    Proceedings of the Information Security Practice and Experience, 2015
    
  
  2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    Proceedings of the Network and System Security - 8th International Conference, 2014
    
  
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014