![]() | ![]() |
Jiqiang Lv
吕继强
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
14 | EE | Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim: The ring authenticated encryption scheme - How to provide a clue wisely. Inf. Sci. 179(1-2): 161-168 (2009) |
2008 | ||
13 | EE | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. CT-RSA 2008: 370-386 |
12 | EE | Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim: New Impossible Differential Attacks on AES. INDOCRYPT 2008: 279-293 |
11 | EE | Jiqiang Lu, Jongsung Kim: Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis. IEICE Transactions 91-A(9): 2588-2596 (2008) |
2007 | ||
10 | EE | Jiqiang Lu: Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. ICICS 2007: 306-318 |
9 | EE | Jiqiang Lu: Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. ICISC 2007: 11-26 |
2006 | ||
8 | EE | Jiqiang Lu: Security Weaknesses in Two Proxy Signature Schemes. ICCSA (3) 2006: 466-475 |
7 | EE | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Differential and Rectangle Attacks on Reduced-Round SHACAL-1. INDOCRYPT 2006: 17-31 |
6 | EE | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Related-Key Rectangle Attack on 42-Round SHACAL-2. ISC 2006: 85-100 |
5 | EE | Jiqiang Lu, Changhoon Lee, Jongsung Kim: Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. SCN 2006: 95-110 |
4 | EE | Jiqiang Lv: On two DES implementations secure against differential power analysis in smart-cards. Inf. Comput. 204(7): 1179-1193 (2006) |
2005 | ||
3 | EE | Jiqiang Lv, Yongfei Han: Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. ACISP 2005: 195-206 |
2 | EE | Jiqiang Lv, Xinmei Wang, Kwangjo Kim: Security of a multisignature scheme for specified group of verifiers. Applied Mathematics and Computation 166(1): 58-63 (2005) |
1 | EE | Jiqiang Lv, Xinmei Wang, Kwangjo Kim: Practical convertible authenticated encryption schemes using self-certified public keys. Applied Mathematics and Computation 169(2): 1285-1297 (2005) |
1 | Xiaofeng Chen | [14] |
2 | Orr Dunkelman | [6] [7] [12] [13] |
3 | Yongfei Han | [3] |
4 | Nathan Keller | [6] [7] [12] [13] |
5 | Jongsung Kim | [5] [6] [7] [11] [12] [13] |
6 | Kwangjo Kim | [1] [2] [14] |
7 | Changhoon Lee | [5] |
8 | Kui Ren | [14] |
9 | Xinmei Wang | [1] [2] |