Li Lin

Affiliations:
  • Chinese Academy of Sciences, Institute of Software, Trusted Computing and Information Assurance Laboratory, Beijing, China
  • Graduate University of Chinese Academy of Sciences, Beijing, China


According to our database1, Li Lin authored at least 10 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512.
Des. Codes Cryptogr., 2018

2017
Meet-in-the-Middle Attacks on Reduced-Round Midori64.
IACR Trans. Symmetric Cryptol., 2017

Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers.
Proceedings of the Information Security - 20th International Conference, 2017

2016
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version).
IACR Cryptol. ePrint Arch., 2016

Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2015
Meet-in-the-Middle Attacks on Reduced-Round Midori-64.
IACR Cryptol. ePrint Arch., 2015

Improved Meet-in-the-Middle Distinguisher on Feistel Schemes.
IACR Cryptol. ePrint Arch., 2015

Improved Meet-in-the-Middle Distinguisher on Feistel Schemes.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

2013
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2010
A Research of P2P IPTV Node Measurement Based on Packets Analysis.
Proceedings of the Information and Automation - International Symposium, 2010


  Loading...