Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wenquan Bi
@article{DBLP:journals/dcc/BiDLZW19, author = {Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang}, title = {MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1271--1296}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0526-x}, doi = {10.1007/S10623-018-0526-X}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BiDLZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiDBJWM19, author = {Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier}, title = {New Conditional Cube Attack on Keccak Keyed Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {94--124}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.94-124}, doi = {10.13154/TOSC.V2019.I2.94-124}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiDBJWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiDBJWM19, author = {Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier}, title = {New Conditional Cube Attack on Keccak Keyed Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2019}, url = {https://eprint.iacr.org/2019/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiDBJWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BiLDLW18, author = {Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang}, title = {Conditional cube attack on round-reduced River Keyak}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1295--1310}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0396-7}, doi = {10.1007/S10623-017-0396-7}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BiLDLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiDLZW18, author = {Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang}, title = {MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2018}, url = {http://eprint.iacr.org/2018/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiDLZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiBDW17, author = {Zheng Li and Wenquan Bi and Xiaoyang Dong and Xiaoyun Wang}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Improved Conditional Cube Attacks on Keccak Keyed Modes with {MILP} Method}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {99--127}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_4}, doi = {10.1007/978-3-319-70694-8\_4}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiBDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiBDW17, author = {Zheng Li and Wenquan Bi and Xiaoyang Dong and Xiaoyun Wang}, title = {Improved Conditional Cube Attacks on Keccak Keyed Modes with {MILP} Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {804}, year = {2017}, url = {http://eprint.iacr.org/2017/804}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiBDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiLDLW17, author = {Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang}, title = {Conditional Cube Attack on Round-Reduced River Keyak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2017}, url = {http://eprint.iacr.org/2017/1012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiLDLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.