Meiqin Wang
Orcid: 0000-0003-1580-6544
According to our database1,
Meiqin Wang
authored at least 176 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Trans. Symmetric Cryptol., 2025
Extending Randomness-Free First-Order Masking Schemes and Applications to Masking-Friendly S-boxes.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
Pushing The Area Limit of Composable Gadgets Low-Area Hardware Masked Circuits with Fewer Sources of Randomness.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
A Fast Search Method for 3-Share Second-Order Masking Schemes for Lightweight S-Boxes.
IET Inf. Secur., 2025
IACR Cryptol. ePrint Arch., 2025
One More Pair, More Information Gained: Improved Attacks on LowMC with Full S-box Layers Using Two Plaintext/Ciphertext Pairs.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Quantum Periodic Distinguisher Construction: Symbolization Method and Automated Tool.
IACR Cryptol. ePrint Arch., 2025
Towards Better Integral Distinguishers over 픽<sub>p</sub> Based on Exact Coefficients of Monomials.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025
Quasidifferential Saves Infeasible Differential - Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
2024
IACR Cryptol. ePrint Arch., 2024
On Constructing Pseudorandom Involutions: Feistel variants using a single round function.
IACR Cryptol. ePrint Arch., 2024
Eur. J. Comb., 2024
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation.
IACR Commun. Cryptol., 2024
Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations.
IACR Trans. Symmetric Cryptol., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper).
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
Research on the Immune Microenvironment and Key Genes of Colorectal Cancer based on Transcriptome Data Mining.
Proceedings of the 15th International Conference on Computer Modeling and Simulation, 2023
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly 𝔽<sub>p</sub>-Based Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU.
IACR Trans. Symmetric Cryptol., 2022
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs.
IACR Cryptol. ePrint Arch., 2022
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version).
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation.
Comput. Oper. Res., 2022
Sci. China Inf. Sci., 2022
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Progress in Cryptology, 2022
2021
J. Comput. Sci. Technol., 2021
Inf. Process. Lett., 2021
IACR Cryptol. ePrint Arch., 2021
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations.
IACR Cryptol. ePrint Arch., 2021
Accelerating the Search of Differential and Linear Characteristics with the SAT Method.
IACR Cryptol. ePrint Arch., 2021
Sci. China Inf. Sci., 2021
New automatic tool for finding impossible differentials and zero-correlation linear approximations.
Sci. China Inf. Sci., 2021
Cryptogr. Commun., 2021
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
Inf. Process. Lett., 2020
Optimised two-dimensional orthogonal matching pursuit algorithm via singular value decomposition.
IET Signal Process., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Sci. China Inf. Sci., 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
2018
IACR Trans. Symmetric Cryptol., 2018
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version).
IACR Cryptol. ePrint Arch., 2018
Zero-correlation attacks: statistical models independent of the number of approximations.
Des. Codes Cryptogr., 2018
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers.
Cryptogr. Commun., 2018
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018
Proceedings of the 4th International Conference on Communication and Information Processing, 2018
2017
Secur. Commun. Networks, 2017
Sci. China Inf. Sci., 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016
MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers.
IACR Cryptol. ePrint Arch., 2016
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations.
IACR Cryptol. ePrint Arch., 2016
Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using χ<sup>2</sup>-method.
Des. Codes Cryptogr., 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
J. Comput. Sci. Technol., 2014
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard.
Inf. Process. Lett., 2014
IACR Cryptol. ePrint Arch., 2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2014
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Sci. China Inf. Sci., 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
2005
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005