default search action
Yunwen Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:
Rotational Differential-Linear Cryptanalysis Revisited. J. Cryptol. 36(1): 3 (2023) - 2022
- [j13]Haipeng Tong, Xuan Shen, Chao Li, Yunwen Liu:
Improved nonlinear invariant attack. Sci. China Inf. Sci. 65(3) (2022) - [j12]Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li:
On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers. Comput. J. 65(9): 2454-2469 (2022) - [j11]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved rotational-XOR cryptanalysis of Simon-like block ciphers. IET Inf. Secur. 16(4): 282-300 (2022) - [j10]Tim Beyne, Yunwen Liu:
Truncated Differential Attacks on Contracting Feistel Ciphers. IACR Trans. Symmetric Cryptol. 2022(2): 141-160 (2022) - [c11]Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li:
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks. CRYPTO (1) 2022: 3-32 - [c10]Yunwen Liu, Chongwen Wang:
Research on the Integrated Method of Classification and Counting of Fitness Activities. ICIGP 2022: 310-316 - [i16]Jinyu Lu, Guoqiang Liu, Yunwen Liu, Bing Sun, Chao Li, Li Liu:
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK. CoRR abs/2201.03767 (2022) - [i15]Jinyu Lu, Guoqiang Liu, Yunwen Liu, Bing Sun, Chao Li, Li Liu:
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK. IACR Cryptol. ePrint Arch. 2022: 30 (2022) - [i14]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. IACR Cryptol. ePrint Arch. 2022: 402 (2022) - [i13]Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li:
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks. IACR Cryptol. ePrint Arch. 2022: 765 (2022) - 2021
- [j9]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021) - [c9]Yunwen Liu, Siwei Sun, Chao Li:
Rotational Cryptanalysis from a Differential-Linear Perspective - Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette. EUROCRYPT (1) 2021: 741-770 - [i12]Yunwen Liu, Siwei Sun, Chao Li:
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette. IACR Cryptol. ePrint Arch. 2021: 189 (2021) - [i11]Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:
A Note on the Bias of Rotational Differential-Linear Distinguishers. IACR Cryptol. ePrint Arch. 2021: 379 (2021) - [i10]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. IACR Cryptol. ePrint Arch. 2021: 656 (2021) - [i9]Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li:
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers. IACR Cryptol. ePrint Arch. 2021: 674 (2021) - 2020
- [j8]Yunwen Liu, Wenying Zhang, Bing Sun, Vincent Rijmen, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. Des. Codes Cryptogr. 88(11): 2289-2311 (2020) - [c8]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers. ACISP 2020: 105-124 - [c7]Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim:
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings. INDOCRYPT 2020: 373-394 - [i8]Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 486 (2020) - [i7]Adrián Ranea, Yunwen Liu, Tomer Ashur:
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 727 (2020) - [i6]Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim:
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings. IACR Cryptol. ePrint Arch. 2020: 959 (2020)
2010 – 2019
- 2019
- [j7]Mengfei Zhou, Zheng Pan, Yunwen Liu, Qiang Zhang, Yijun Cai, Haitian Pan:
Leak Detection and Location Based on ISLMD and CNN in a Pipeline. IEEE Access 7: 30457-30464 (2019) - [c6]Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. ACISP 2019: 555-572 - [c5]Wenqian Xin, Yunwen Liu, Bing Sun, Chao Li:
Improved Cryptanalysis on SipHash. CANS 2019: 61-79 - [i5]Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. IACR Cryptol. ePrint Arch. 2019: 669 (2019) - 2018
- [j6]Yunwen Liu, Longjiang Qu, Chao Li:
New constructions of systematic authentication codes from three classes of cyclic codes. Adv. Math. Commun. 12(1): 1-16 (2018) - [j5]Wei Li, Vincent Rijmen, Zhi Tao, Qingju Wang, Hua Chen, Yunwen Liu, Chaoyun Li, Ya Liu:
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs. Sci. China Inf. Sci. 61(3): 032110:1-032110:13 (2018) - [j4]Yunwen Liu, Vincent Rijmen, Gregor Leander:
Nonlinear diffusion layers. Des. Codes Cryptogr. 86(11): 2469-2484 (2018) - [j3]Yunwen Liu, Vincent Rijmen:
New observations on invariant subspace attack. Inf. Process. Lett. 138: 27-30 (2018) - [c4]Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang:
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. SAC 2018: 92-114 - 2017
- [j2]Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur:
Rotational-XOR Cryptanalysis of Reduced-round SPECK. IACR Trans. Symmetric Cryptol. 2017(3): 24-36 (2017) - [i4]Yunwen Liu, Vincent Rijmen:
New Observations on Invariant Subspace Attack. IACR Cryptol. ePrint Arch. 2017: 278 (2017) - [i3]Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur:
Rotational-XOR Cryptanalysis of Reduced-round SPECK. IACR Cryptol. ePrint Arch. 2017: 1036 (2017) - 2016
- [j1]Tomer Ashur, Yunwen Liu:
Rotational Cryptanalysis in the Presence of Constants. IACR Trans. Symmetric Cryptol. 2016(1): 57-70 (2016) - [c3]Yunwen Liu, Qingju Wang, Vincent Rijmen:
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. ACNS 2016: 485-499 - [c2]Hua Chen, Jingyi Feng, Vincent Rijmen, Yunwen Liu, Limin Fan, Wei Li:
Improved Fault Analysis on SIMON Block Cipher Family. FDTC 2016: 16-24 - [i2]Tomer Ashur, Yunwen Liu:
Rotational Cryptanalysis in the Presence of Constants. IACR Cryptol. ePrint Arch. 2016: 826 (2016) - 2015
- [c1]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. ASIACRYPT (2) 2015: 535-560 - [i1]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. IACR Cryptol. ePrint Arch. 2015: 418 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-02 19:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint