default search action
Meicheng Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers. IACR Commun. Cryptol. 1(1): 13 (2024) - [c26]Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3. CRYPTO (4) 2024: 241-272 - [i18]Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3. IACR Cryptol. ePrint Arch. 2024: 1136 (2024) - 2023
- [j12]Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma:
On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. Comput. J. 66(6): 1376-1399 (2023) - [c25]Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Moving a Step of ChaCha in Syncopated Rhythm. CRYPTO (3) 2023: 273-304 - [c24]Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials. EUROCRYPT (4) 2023: 220-251 - [i17]Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Moving a Step of ChaCha in Syncopated Rhythm. IACR Cryptol. ePrint Arch. 2023: 1087 (2023) - 2022
- [j11]Xiaojuan Lu, Bohan Li, Meicheng Liu, Dongdai Lin:
Improved conditional differential attacks on lightweight hash family QUARK. Cybersecur. 5(1): 12 (2022) - [c23]Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Enhancing Differential-Neural Cryptanalysis. ASIACRYPT (1) 2022: 318-347 - [c22]Lulu Zhang, Meicheng Liu, Shuaishuai Li, Dongdai Lin:
Cryptanalysis of Ciminion. Inscrypt 2022: 234-251 - [c21]Lulu Zhang, Meicheng Liu, Dongdai Lin:
A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair. SAC 2022: 306-327 - 2021
- [c20]Shichang Wang, Shiqi Hou, Meicheng Liu, Dongdai Lin:
Differential-Linear Cryptanalysis of the Lightweight Crytographic Algorithm KNOT. Inscrypt 2021: 171-190 - [c19]Meicheng Liu, Xiaojuan Lu, Dongdai Lin:
Differential-Linear Cryptanalysis from an Algebraic Perspective. CRYPTO (3) 2021: 247-277 - [i16]Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Conditional Differential-Neural Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 719 (2021) - 2020
- [j10]Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song:
Practical Collision Attacks against Round-Reduced SHA-3. J. Cryptol. 33(1): 228-270 (2020) - [j9]Bohan Li, Meicheng Liu, Dongdai Lin:
FPGA implementations of Grain v1, Mickey 2.0, Trivium, Lizard and Plantlet. Microprocess. Microsystems 78: 103210 (2020)
2010 – 2019
- 2019
- [c18]Jingchun Yang, Meicheng Liu, Dongdai Lin:
Cube Cryptanalysis of Round-Reduced ACORN. ISC 2019: 44-64 - [i15]Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song:
Practical Collision Attacks against Round-Reduced SHA-3. IACR Cryptol. ePrint Arch. 2019: 147 (2019) - [i14]Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma:
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. IACR Cryptol. ePrint Arch. 2019: 763 (2019) - 2018
- [c17]Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin:
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. EUROCRYPT (2) 2018: 715-744 - [c16]Xiaojuan Zhang, Meicheng Liu, Dongdai Lin:
Conditional Cube Searching and Applications on Trivium-Variant Ciphers. ISC 2018: 151-168 - [c15]Jingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang:
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. IWSEC 2018: 244-261 - [i13]Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin:
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. IACR Cryptol. ePrint Arch. 2018: 158 (2018) - 2017
- [j8]Guoyan Zhang, Meicheng Liu:
A distinguisher on PRESENT-like permutations with application to SPONGENT. Sci. China Inf. Sci. 60(7): 72101 (2017) - [j7]Meicheng Liu, Dongdai Lin:
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks. Inf. Sci. 421: 181-203 (2017) - [c14]Meicheng Liu:
Degree Evaluation of NFSR-Based Cryptosystems. CRYPTO (3) 2017: 227-249 - [c13]Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo:
New Collision Attacks on Round-Reduced Keccak. EUROCRYPT (3) 2017: 216-243 - [i12]Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo:
New Collision Attacks on Round-Reduced Keccak. IACR Cryptol. ePrint Arch. 2017: 128 (2017) - 2016
- [c12]Jian Guo, Meicheng Liu, Ling Song:
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak. ASIACRYPT (1) 2016: 249-274 - [c11]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-Like SPN Ciphers. CRYPTO (1) 2016: 605-624 - [c10]Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis. EUROCRYPT (1) 2016: 196-213 - [c9]Meicheng Liu, Siang Meng Sim:
Lightweight MDS Generalized Circulant Matrices. FSE 2016: 101-120 - [i11]Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2016: 96 (2016) - [i10]Meicheng Liu, Siang Meng Sim:
Lightweight MDS Generalized Circulant Matrices. IACR Cryptol. ePrint Arch. 2016: 186 (2016) - [i9]Guoyan Zhang, Meicheng Liu:
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT. IACR Cryptol. ePrint Arch. 2016: 236 (2016) - [i8]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-like SPN Ciphers. IACR Cryptol. ePrint Arch. 2016: 533 (2016) - [i7]Chun Guo, Dongdai Lin, Meicheng Liu:
Cascade Ciphers Revisited: Indifferentiability Analysis. IACR Cryptol. ePrint Arch. 2016: 825 (2016) - [i6]Jian Guo, Meicheng Liu, Ling Song:
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak. IACR Cryptol. ePrint Arch. 2016: 878 (2016) - 2015
- [c8]Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. FSE 2015: 494-515 - [c7]Tianze Wang, Meicheng Liu, Shangwei Zhao, Dongdai Lin:
Construction of cubic rotation symmetric bent functions in power-of-two variables. ISIT 2015: 486-490 - [c6]Meicheng Liu, Dongdai Lin, Wenhao Wang:
Searching cubes for testing Boolean functions and its application to Trivium. ISIT 2015: 496-500 - [i5]Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT. IACR Cryptol. ePrint Arch. 2015: 433 (2015) - 2014
- [j6]Yin Zhang, Meicheng Liu, Dongdai Lin:
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks. Discret. Appl. Math. 162: 17-27 (2014) - [j5]Shaoyu Du, Meicheng Liu, Yin Zhang, Dongdai Lin:
On the Nonlinearity and Correlation Immunity of Two Classes of Boolean Functions. Int. J. Softw. Informatics 8(2): 177-192 (2014) - [c5]Meicheng Liu, Dongdai Lin:
Almost perfect algebraic immune functions with good nonlinearity. ISIT 2014: 1837-1841 - 2013
- [j4]Wenhao Wang, Meicheng Liu, Yin Zhang:
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation". Cryptogr. Commun. 5(1): 1-6 (2013) - 2012
- [c4]Meicheng Liu, Yin Zhang, Dongdai Lin:
Perfect Algebraic Immune Functions. ASIACRYPT 2012: 172-189 - [c3]Tianze Wang, Meicheng Liu, Dongdai Lin:
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks. Inscrypt 2012: 276-293 - [i4]Yin Zhang, Meicheng Liu, Dongdai Lin:
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks. IACR Cryptol. ePrint Arch. 2012: 111 (2012) - [i3]Meicheng Liu, Yin Zhang, Dongdai Lin:
Perfect Algebraic Immune Functions. IACR Cryptol. ePrint Arch. 2012: 212 (2012) - [i2]Meicheng Liu, Yin Zhang, Dongdai Lin:
On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation. IACR Cryptol. ePrint Arch. 2012: 498 (2012) - 2011
- [j3]Yin Zhang, Meicheng Liu, Dongdai Lin:
On the nonexistence of Bent Functions. Int. J. Found. Comput. Sci. 22(6): 1431-1438 (2011) - [j2]Meicheng Liu, Dongdai Lin, Dingyi Pei:
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. IEEE Trans. Inf. Theory 57(7): 4817-4821 (2011) - [c2]Meicheng Liu, Dongdai Lin, Dingyi Pei:
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. ACISP 2011: 34-46 - [c1]Yusong Du, Fangguo Zhang, Meicheng Liu:
On the Resistance of Boolean Functions against Fast Algebraic Attacks. ICISC 2011: 261-274 - 2010
- [j1]Meicheng Liu, Dingyi Pei, Yusong Du:
Identification and construction of Boolean functions with maximum algebraic immunity. Sci. China Inf. Sci. 53(7): 1379-1396 (2010)
2000 – 2009
- 2009
- [i1]Meicheng Liu, Dongdai Lin:
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. CoRR abs/0910.4632 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint