Leibo Li

According to our database1, Leibo Li authored at least 20 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
HML-BFT: Hybrid multi-layer BFT consensus with reputation model for large-scale blockchain.
Peer Peer Netw. Appl., February, 2025

DynaNet: A dynamic BFT consensus framework.
J. Syst. Archit., 2025

2024
Biometric identification on the cloud: A more secure and faster construction.
Inf. Sci., 2024

2022
Efficient Biometric Identification on the Cloud With Privacy Preservation Guarantee.
IEEE Access, 2022

2015
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Improved Attacks on Reduced-Round Camellia-128/192/256.
Proceedings of the Topics in Cryptology, 2015

2014
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256.
IACR Cryptol. ePrint Arch., 2014

A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.
Proceedings of the Network and System Security - 8th International Conference, 2014

Improved Single-Key Attacks on 9-Round AES-192/256.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE.
IACR Cryptol. ePrint Arch., 2013

2012
Improved Impossible Differential Attacks on Reduced-Round MISTY1.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Improved Cryptanalysis of the Block Cipher KASUMI.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

New Impossible Differential Attacks on Camellia.
Proceedings of the Information Security Practice and Experience, 2012

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Low Data Complexity Attack on Reduced Camellia-256.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia.
IACR Cryptol. ePrint Arch., 2011

Co-Z Addition Operation of Hessian Curve.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

New Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2009
New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields.
IACR Cryptol. ePrint Arch., 2009

A Note on Twin Diffie-Hellman Problem.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009


  Loading...