Follow
Keting Jia
Keting Jia
Tsinghua University & Shandong University
No verified email
Title
Cited by
Cited by
Year
New automatic search tool for impossible differentials and zero-correlation linear approximations
T Cui, S Chen, K Jia, K Fu, M Wang
Cryptology ePrint Archive, 2016
1142016
Improved single-key attacks on 9-round AES-192/256
L Li, K Jia, X Wang
International Workshop on Fast Software Encryption, 127-146, 2014
742014
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
B Zhao, X Dong, W Meier, K Jia, G Wang
Designs, Codes and Cryptography 88 (6), 1103-1126, 2020
442020
Improved meet-in-the-middle attacks on AES-192 and PRINCE
L Li, K Jia, X Wang
Cryptology ePrint Archive, 2013
402013
Distinguishing and second-preimage attacks on CBC-like MACs
K Jia, X Wang, Z Yuan, G Xu
International Conference on Cryptology and Network Security, 349-361, 2009
372009
New related-tweakey boomerang and rectangle attacks on Deoxys-BC including BDT effect
B Zhao, X Dong, K Jia
IACR Transactions on Symmetric Cryptology, 121-151, 2019
332019
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques
N Wang, X Wang, K Jia, J Zhao
Science China. Information Sciences 61 (9), 098103, 2018
332018
Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny
L Qin, X Dong, X Wang, K Jia, Y Liu
IACR Transactions on Symmetric Cryptology, 249-291, 2021
312021
New impossible differential attacks of reduced-round Camellia-192 and Camellia-256
J Chen, K Jia, H Yu, X Wang
Australasian Conference on Information Security and Privacy, 16-33, 2011
312011
New birthday attacks on some MACs based on block ciphers
Z Yuan, W Wang, K Jia, G Xu, X Wang
Annual International Cryptology Conference, 209-230, 2009
312009
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
L Li, K Jia, X Wang, X Dong
International Workshop on Fast Software Encryption, 48-70, 2015
292015
Improved Differential Attacks on Reduced SIMON Versions.
N Wang, X Wang, K Jia, J Zhao
IACR Cryptol. ePrint Arch. 2014, 448, 2014
272014
Practical key-recovery attacks on round-reduced Ketje Jr, Xoodoo-AE and Xoodyak
H Zhou, Z Li, X Dong, K Jia, W Meier
The Computer Journal 63 (8), 1231-1246, 2020
232020
New conditional cube attack on Keccak keyed modes
Z Li, X Dong, W Bi, K Jia, X Wang, W Meier
IACR Transactions on Symmetric Cryptology, 94-124, 2019
202019
Near-collision attack on the step-reduced compression function of Skein-256
H Yu, J Chen, X Wang
Cryptology ePrint Archive, 2011
192011
Cryptanalysis of reduced NORX
N Bagheri, T Huang, K Jia, F Mendel, Y Sasaki
International Conference on Fast Software Encryption, 554-574, 2016
182016
New impossible differential cryptanalysis of reduced-round Camellia
L Li, J Chen, K Jia
International Conference on Cryptology and Network Security, 26-39, 2011
182011
Improved attacks on reduced-round camellia-128/192/256
X Dong, L Li, K Jia, X Wang
Cryptographers’ Track at the RSA Conference, 59-83, 2015
172015
Improved cryptanalysis of the block cipher KASUMI
K Jia, L Li, C Rechberger, J Chen, X Wang
Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013
172013
Improved related-key boomerang attacks on round-reduced Threefish-512
J Chen, K Jia
International Conference on Information Security Practice and Experience, 1-18, 2010
162010
The system can't perform the operation now. Try again later.
Articles 1–20