dblp.uni-trier.dewww.uni-trier.de

Jiqiang Lu

Jiqiang Lv

吕继强

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
14EEJiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim: The ring authenticated encryption scheme - How to provide a clue wisely. Inf. Sci. 179(1-2): 161-168 (2009)
2008
13EEJiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. CT-RSA 2008: 370-386
12EEJiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim: New Impossible Differential Attacks on AES. INDOCRYPT 2008: 279-293
11EEJiqiang Lu, Jongsung Kim: Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis. IEICE Transactions 91-A(9): 2588-2596 (2008)
2007
10EEJiqiang Lu: Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. ICICS 2007: 306-318
9EEJiqiang Lu: Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. ICISC 2007: 11-26
2006
8EEJiqiang Lu: Security Weaknesses in Two Proxy Signature Schemes. ICCSA (3) 2006: 466-475
7EEJiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Differential and Rectangle Attacks on Reduced-Round SHACAL-1. INDOCRYPT 2006: 17-31
6EEJiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Related-Key Rectangle Attack on 42-Round SHACAL-2. ISC 2006: 85-100
5EEJiqiang Lu, Changhoon Lee, Jongsung Kim: Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. SCN 2006: 95-110
4EEJiqiang Lv: On two DES implementations secure against differential power analysis in smart-cards. Inf. Comput. 204(7): 1179-1193 (2006)
2005
3EEJiqiang Lv, Yongfei Han: Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. ACISP 2005: 195-206
2EEJiqiang Lv, Xinmei Wang, Kwangjo Kim: Security of a multisignature scheme for specified group of verifiers. Applied Mathematics and Computation 166(1): 58-63 (2005)
1EEJiqiang Lv, Xinmei Wang, Kwangjo Kim: Practical convertible authenticated encryption schemes using self-certified public keys. Applied Mathematics and Computation 169(2): 1285-1297 (2005)

Coauthor Index

1Xiaofeng Chen [14]
2Orr Dunkelman [6] [7] [12] [13]
3Yongfei Han [3]
4Nathan Keller [6] [7] [12] [13]
5Jongsung Kim [5] [6] [7] [11] [12] [13]
6Kwangjo Kim [1] [2] [14]
7Changhoon Lee [5]
8Kui Ren [14]
9Xinmei Wang [1] [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)