Zheng Li

Affiliations:
  • Shandong University, Key Laboratory of Cryptologic Technology and Information Security, Jinan, China


According to our database1, Zheng Li authored at least 12 papers between 2017 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128.
IACR Trans. Symmetric Cryptol., 2021

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2019
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak.
IACR Cryptol. ePrint Arch., 2019

New Conditional Cube Attack on Keccak Keyed Modes.
IACR Cryptol. ePrint Arch., 2019

Quantum cryptanalysis on some generalized Feistel schemes.
Sci. China Inf. Sci., 2019

2018
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes.
IACR Cryptol. ePrint Arch., 2018

2017
Conditional Cube Attack on Round-Reduced ASCON.
IACR Cryptol. ePrint Arch., 2017

Cube-like Attack on Round-Reduced Initialization of Ketje Sr.
IACR Cryptol. ePrint Arch., 2017

Conditional Cube Attack on Round-Reduced River Keyak.
IACR Cryptol. ePrint Arch., 2017

Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017


  Loading...