BibTeX records: Wenquan Bi

download as .bib file

@article{DBLP:journals/dcc/BiDLZW19,
  author       = {Wenquan Bi and
                  Xiaoyang Dong and
                  Zheng Li and
                  Rui Zong and
                  Xiaoyun Wang},
  title        = {MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1271--1296},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0526-x},
  doi          = {10.1007/S10623-018-0526-X},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BiDLZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiDBJWM19,
  author       = {Zheng Li and
                  Xiaoyang Dong and
                  Wenquan Bi and
                  Keting Jia and
                  Xiaoyun Wang and
                  Willi Meier},
  title        = {New Conditional Cube Attack on Keccak Keyed Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {94--124},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.94-124},
  doi          = {10.13154/TOSC.V2019.I2.94-124},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiDBJWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiDBJWM19,
  author       = {Zheng Li and
                  Xiaoyang Dong and
                  Wenquan Bi and
                  Keting Jia and
                  Xiaoyun Wang and
                  Willi Meier},
  title        = {New Conditional Cube Attack on Keccak Keyed Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiDBJWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BiLDLW18,
  author       = {Wenquan Bi and
                  Zheng Li and
                  Xiaoyang Dong and
                  Lu Li and
                  Xiaoyun Wang},
  title        = {Conditional cube attack on round-reduced River Keyak},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1295--1310},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0396-7},
  doi          = {10.1007/S10623-017-0396-7},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BiLDLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiDLZW18,
  author       = {Wenquan Bi and
                  Xiaoyang Dong and
                  Zheng Li and
                  Rui Zong and
                  Xiaoyun Wang},
  title        = {MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiDLZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiBDW17,
  author       = {Zheng Li and
                  Wenquan Bi and
                  Xiaoyang Dong and
                  Xiaoyun Wang},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Improved Conditional Cube Attacks on Keccak Keyed Modes with {MILP}
                  Method},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {99--127},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_4},
  doi          = {10.1007/978-3-319-70694-8\_4},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiBDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiBDW17,
  author       = {Zheng Li and
                  Wenquan Bi and
                  Xiaoyang Dong and
                  Xiaoyun Wang},
  title        = {Improved Conditional Cube Attacks on Keccak Keyed Modes with {MILP}
                  Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {804},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/804},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiBDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiLDLW17,
  author       = {Wenquan Bi and
                  Zheng Li and
                  Xiaoyang Dong and
                  Lu Li and
                  Xiaoyun Wang},
  title        = {Conditional Cube Attack on Round-Reduced River Keyak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiLDLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics