Leibo Li
According to our database1,
Leibo Li
authored at least 17 papers
between 2009 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
IEEE Access, 2022
2015
IACR Cryptol. ePrint Arch., 2015
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
2014
IACR Cryptol. ePrint Arch., 2014
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2009
New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009