Follow
Chaoyun Li
Chaoyun Li
COSIC, KU Leuven
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Improved division property based cube attacks exploiting algebraic properties of superpoly
Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang
IEEE Transactions on Computers, 275-305, 2018
1042018
The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
C Li, X Zeng, T Helleseth, C Li, L Hu
IEEE Transactions on Information Theory 60 (5), 3052-3061, 2014
572014
Construction of de Bruijn sequences from LFSRs with reducible characteristic polynomials
C Li, X Zeng, C Li, T Helleseth, M Li
IEEE Transactions on Information Theory 62 (1), 610-624, 2015
532015
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits
S Li, S Sun, C Li, Z Wei, L Hu
IACR Transactions on Symmetric Cryptology, 84-117, 2019
502019
A class of de Bruijn sequences
C Li, X Zeng, C Li, T Helleseth
IEEE Transactions on Information Theory 60 (12), 7955-7969, 2014
472014
Permutation polynomials (xpm− x+ δ) s1+ (xpm− x+ δ) s2+ x over Fpn
L Li, S Wang, C Li, X Zeng
Finite Fields and Their Applications 51, 31-61, 2018
402018
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
C Li, Q Wang
IACR Transactions on Symmetric Cryptology 2017 (1), 129-155, 2017
392017
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full
D Shi, S Sun, Y Sasaki, C Li, L Hu
Annual International Cryptology Conference, 180-209, 2019
302019
Ciphertext-only fault analysis on the led lightweight cryptosystem in the internet of things
W Li, L Liao, D Gu, C Li, C Ge, Z Guo, Y Liu, Z Liu
IEEE Transactions on Dependable and Secure Computing 16 (3), 454-461, 2018
262018
New classes of complete permutation polynomials
L Li, C Li, C Li, X Zeng
Finite Fields and Their Applications 55, 177-201, 2019
222019
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
C Li, B Preneel
International Conference on Selected Areas in Cryptography, 171-193, 2019
202019
Links between division property and other cube attack variants
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
IACR Transactions on Symmetric Cryptology, 363-395, 2020
162020
Lightweight Iterative MDS Matrices: How Small Can We Go?
S Li, S Sun, D Shi, C Li, L Hu
IACR Transactions on Symmetric Cryptology, 147-170, 2019
142019
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
IACR Cryptology ePrint Archive 2018, 972, 2018
122018
ECDSA white-box implementations: attacks and designs from CHES 2021 challenge
G Barbu, W Beullens, E Dottax, C Giraud, A Houzelot, C Li, M Mahzoun, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (4 …, 2022
10*2022
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks
W Li, J Li, D Gu, C Li, T Cai
IEEE Transactions on Information Forensics and Security 16, 4224-4233, 2021
82021
Binary sequences with period N and nonlinear complexity N − 2
Z Xiao, X Zeng, C Li, Y Jiang
Cryptography and Communications 11 (4), 735-757, 2019
82019
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
W Li, V Rijmen, Z Tao, Q Wang, H Chen, Y Liu, C Li, Y Liu
Science China Information Sciences 61 (3), 032110, 2018
82018
Towards practical intrusion detection system over encrypted traffic
S Canard, C Li
IET Information Security 15 (3), 231-246, 2021
42021
Cryptanalysis of the MALICIOUS Framework.
T Beyne, C Li
IACR Cryptol. ePrint Arch. 2020, 1032, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20