Zheng Li

Affiliations:
  • Shandong University, Key Laboratory of Cryptologic Technology and Information Security, Jinan, China


According to our database1, Zheng Li authored at least 12 papers between 2017 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128.
IACR Trans. Symmetric Cryptol., 2021

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021

Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2020

2019
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak.
IACR Cryptol. ePrint Arch., 2019

New Conditional Cube Attack on Keccak Keyed Modes.
IACR Cryptol. ePrint Arch., 2019

MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes.
Des. Codes Cryptogr., 2019

Quantum cryptanalysis on some generalized Feistel schemes.
Sci. China Inf. Sci., 2019

2018
Conditional cube attack on round-reduced River Keyak.
Des. Codes Cryptogr., 2018

2017
Conditional Cube Attack on Round-Reduced ASCON.
IACR Cryptol. ePrint Arch., 2017

Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.
IACR Cryptol. ePrint Arch., 2017

Cube-like Attack on Round-Reduced Initialization of Ketje Sr.
IACR Cryptol. ePrint Arch., 2017


  Loading...