Leibo Li

According to our database1, Leibo Li authored at least 17 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient Biometric Identification on the Cloud With Privacy Preservation Guarantee.
IEEE Access, 2022

2015
Improved Attacks on Reduced-Round Camellia-128/192/256.
IACR Cryptol. ePrint Arch., 2015

Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256.
IACR Cryptol. ePrint Arch., 2014

A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.
Proceedings of the Network and System Security - 8th International Conference, 2014

Improved Single-Key Attacks on 9-Round AES-192/256.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE.
IACR Cryptol. ePrint Arch., 2013

2012
Improved Impossible Differential Attacks on Reduced-Round MISTY1.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Improved Cryptanalysis of the Block Cipher KASUMI.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Low Data Complexity Attack on Reduced Camellia-256.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia.
IACR Cryptol. ePrint Arch., 2011

New Impossible Differential Attacks on Camellia.
IACR Cryptol. ePrint Arch., 2011

Co-Z Addition Operation of Hessian Curve.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

New Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2009
New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields.
IACR Cryptol. ePrint Arch., 2009

A Note on Twin Diffie-Hellman Problem.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009


  Loading...