default search action
Keting Jia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Qingyuan Yu, Lingyue Qin, Xiaoyang Dong, Keting Jia:
Improved Related-Key Rectangle Attacks On GIFT. Comput. J. 67(4): 1443-1456 (2024) - [j13]Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju:
High-Performance Hardware Implementation of MPCitH and Picnic3. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 190-214 (2024) - [i26]Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang:
Symmetric Twin Column Parity Mixers and their Applications. IACR Cryptol. ePrint Arch. 2024: 1867 (2024) - 2023
- [j12]Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang:
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023) - 2022
- [c22]Qingyuan Yu, Keting Jia, Guangnan Zou, Guoyan Zhang:
Differential Cryptanalysis of Round-Reduced SPEEDY Family. Inscrypt 2022: 272-291 - 2021
- [j11]Tingting Cui, Shiyao Chen, Kai Fu, Meiqin Wang, Keting Jia:
New automatic tool for finding impossible differentials and zero-correlation linear approximations. Sci. China Inf. Sci. 64(2) (2021) - [j10]Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. Sci. China Inf. Sci. 64(3) (2021) - [j9]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. Comput. J. 64(4): 628-638 (2021) - [j8]Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You:
(Quantum) Collision Attacks on Reduced Simpira v2. IACR Trans. Symmetric Cryptol. 2021(2): 222-248 (2021) - [j7]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021) - [i25]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. IACR Cryptol. ePrint Arch. 2021: 656 (2021) - 2020
- [j6]Quan Yuan, Puwen Wei, Keting Jia, Haiyang Xue:
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers. Sci. China Inf. Sci. 63(3) (2020) - [j5]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak. Comput. J. 63(8): 1231-1246 (2020) - [j4]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020) - [i24]Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Cryptol. ePrint Arch. 2020: 102 (2020) - [i23]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128. IACR Cryptol. ePrint Arch. 2020: 103 (2020) - [i22]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. IACR Cryptol. ePrint Arch. 2020: 781 (2020)
2010 – 2019
- 2019
- [j3]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019) - [j2]Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Trans. Symmetric Cryptol. 2019(3): 121-151 (2019) - [c21]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128. INDOCRYPT 2019: 139-159 - [c20]Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You:
Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE. ISPEC 2019: 56-72 - [c19]Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao:
Identity-Concealed Authenticated Encryption from Ring Learning with Errors. ProvSec 2019: 3-18 - [i21]Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. IACR Cryptol. ePrint Arch. 2019: 170 (2019) - [i20]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2019: 392 (2019) - [i19]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. IACR Cryptol. ePrint Arch. 2019: 447 (2019) - [i18]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule. IACR Cryptol. ePrint Arch. 2019: 714 (2019) - [i17]Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao:
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version). IACR Cryptol. ePrint Arch. 2019: 1164 (2019) - [i16]Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You:
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version). IACR Cryptol. ePrint Arch. 2019: 1386 (2019) - 2018
- [j1]Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao:
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Inf. Sci. 61(9): 098103:1-098103:3 (2018) - 2016
- [c18]Keting Jia, Ning Wang:
Impossible Differential Cryptanalysis of 14-Round Camellia-192. ACISP (2) 2016: 363-378 - [c17]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. FSE 2016: 554-574 - [i15]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. IACR Cryptol. ePrint Arch. 2016: 436 (2016) - [i14]Tingting Cui, Keting Jia, Kai Fu, Shiyao Chen, Meiqin Wang:
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations. IACR Cryptol. ePrint Arch. 2016: 689 (2016) - 2015
- [c16]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. CT-RSA 2015: 59-83 - [c15]Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong:
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. FSE 2015: 48-70 - [c14]Ning Wang, Xiaoyun Wang, Keting Jia:
Improved Impossible Differential Attack on Reduced-Round LBlock. ICISC 2015: 136-152 - [i13]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. IACR Cryptol. ePrint Arch. 2015: 896 (2015) - 2014
- [c13]Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Single-Key Attacks on 9-Round AES-192/256. FSE 2014: 127-146 - [i12]Leibo Li, Keting Jia:
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256. IACR Cryptol. ePrint Arch. 2014: 292 (2014) - [i11]Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao:
Improved Differential Attacks on Reduced SIMON Versions. IACR Cryptol. ePrint Arch. 2014: 448 (2014) - 2013
- [c12]Xuexin Zheng, Keting Jia:
Impossible Differential Attack on Reduced-Round TWINE. ICISC 2013: 123-143 - [i10]Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE. IACR Cryptol. ePrint Arch. 2013: 573 (2013) - 2012
- [c11]Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang:
Improved Cryptanalysis of the Block Cipher KASUMI. Selected Areas in Cryptography 2012: 222-233 - [c10]Keting Jia, Leibo Li:
Improved Impossible Differential Attacks on Reduced-Round MISTY1. WISA 2012: 15-27 - 2011
- [c9]Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. ACISP 2011: 16-33 - [c8]Leibo Li, Jiazhe Chen, Keting Jia:
New Impossible Differential Cryptanalysis of Reduced-Round Camellia. CANS 2011: 26-39 - [c7]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical Attack on the Full MMB Block Cipher. Selected Areas in Cryptography 2011: 185-199 - [i9]Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. IACR Cryptol. ePrint Arch. 2011: 17 (2011) - [i8]Hongbo Yu, Jiazhe Chen, Keting Jia, Xiaoyun Wang:
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256. IACR Cryptol. ePrint Arch. 2011: 148 (2011) - [i7]Keting Jia, Hongbo Yu, Xiaoyun Wang:
A Meet-in-the-Middle Attack on the Full KASUMI. IACR Cryptol. ePrint Arch. 2011: 466 (2011) - 2010
- [c6]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. Inscrypt 2010: 187-198 - [c5]Jiazhe Chen, Keting Jia:
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. ISPEC 2010: 1-18 - [i6]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical-time Attack on the Full MMB Block Cipher. IACR Cryptol. ePrint Arch. 2010: 211 (2010)
2000 – 2009
- 2009
- [c4]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. CANS 2009: 349-361 - [c3]Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang:
New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009: 209-230 - [c2]Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang:
New Distinguishing Attack on MAC Using Secret-Prefix Method. FSE 2009: 363-374 - [c1]Siyuan Qiao, Wei Wang, Keting Jia:
Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1. ICISC 2009: 349-361 - [i5]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. IACR Cryptol. ePrint Arch. 2009: 224 (2009) - [i4]Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang:
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256. IACR Cryptol. ePrint Arch. 2009: 484 (2009) - [i3]Jiazhe Chen, Keting Jia:
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. IACR Cryptol. ePrint Arch. 2009: 526 (2009) - 2008
- [i2]Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang:
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC. IACR Cryptol. ePrint Arch. 2008: 516 (2008) - [i1]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. IACR Cryptol. ePrint Arch. 2008: 542 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint