Qianqian Yang
Orcid: 0000-0002-2062-1344Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering / Data Assurance and Communication Security Research Center, Beijing, China
According to our database1,
Qianqian Yang
authored at least 25 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Cybersecur., December, 2025
2024
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
IACR Cryptol. ePrint Arch., 2024
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY.
IACR Cryptol. ePrint Arch., 2024
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
Proceedings of the Advances in Information and Computer Security, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2018
Secur. Commun. Networks, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015