Yongqiang Li

Orcid: 0000-0002-2551-2737

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China


According to our database1, Yongqiang Li authored at least 38 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Full-round impossible differential attack on shadow block cipher.
Cybersecur., December, 2023

Guess-and-determine attacks on SNOW-Vi stream cipher.
Des. Codes Cryptogr., May, 2023

Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect.
IACR Cryptol. ePrint Arch., 2023

Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

Four by four MDS matrices with the fewest XOR gates based on words.
Adv. Math. Commun., 2023

Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
On the upper bound of squared correlation of SIMON-like functions and its applications.
IET Inf. Secur., 2022

Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.
IACR Cryptol. ePrint Arch., 2022

Observations on the Security of COMET.
Comput. J., 2022

Guess-and-Determine Attacks on AEGIS.
Comput. J., 2022

New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes.
Comput. J., 2022

2021
A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers.
IEEE Trans. Inf. Theory, 2021

2020
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version).
IACR Cryptol. ePrint Arch., 2020

Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9.
Finite Fields Their Appl., 2020

A Guess-And-Determine Attack On SNOW-V Stream Cipher.
Comput. J., 2020

Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Improved guess-and-determine attack on TRIVIUM.
IET Inf. Secur., 2019

Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9.
IACR Cryptol. ePrint Arch., 2019

2018
On the Generalization of Butterfly Structure.
IACR Trans. Symmetric Cryptol., 2018

Guess-and-determine attacks on PANAMA-like stream ciphers.
IET Inf. Secur., 2018

Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
The Security of SIMON-like Ciphers Against Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2017

Optimal Differential Trails in SIMON-like Ciphers.
IACR Cryptol. ePrint Arch., 2017

On the construction of differentially 4-uniform involutions.
Finite Fields Their Appl., 2017

2016
On the Construction of Lightweight Circulant Involutory MDS Matrices.
IACR Cryptol. ePrint Arch., 2016

Construction of MDS block diffusion matrices for block ciphers and hash functions.
Sci. China Inf. Sci., 2016

2015
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions.
IACR Cryptol. ePrint Arch., 2015

2014
A matrix approach for constructing quadratic APN functions.
Des. Codes Cryptogr., 2014

Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1).
Des. Codes Cryptogr., 2014

Constructing S-boxes for Lightweight Cryptography with Feistel Structure.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
The Nonexistence of Permutations EA-Equivalent to Certain AB Functions.
IEEE Trans. Inf. Theory, 2013

Constructing Differentially 4-uniform Permutations over GF(2<sup>2k</sup>) from the Inverse Function Revisited.
IACR Cryptol. ePrint Arch., 2013

2012
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Constructing differential 4-uniform permutations from know ones.
IACR Cryptol. ePrint Arch., 2011

Constructing differentially 4-uniform permutations over 2<sup>2m</sup> from quadratic APN permutations over 2<sup>2m+1</sup>.
IACR Cryptol. ePrint Arch., 2011

On EA-equivalence of certain permutations to power mappings.
Des. Codes Cryptogr., 2011

Permutation polynomials EA-equivalent to the inverse function over GF (2<sup><i>n</i></sup>).
Cryptogr. Commun., 2011

2010
On permutation polynomials EA-equivalent to the inverse function over GF(2<sup>n</sup>).
IACR Cryptol. ePrint Arch., 2010


  Loading...