Seguir
Ruilin Li
Ruilin Li
National University of Defense Technology
Nenhum email confirmado
Título
Citado por
Citado por
Ano
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
902015
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
B Sun, M Liu, J Guo, V Rijmen, R Li
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
702016
Impossible differential cryptanalysis of SPN ciphers
R Li, B Sun, C Li
IET Information Security 5 (2), 111-120, 2011
472011
An efficient method to enhance Bitcoin wallet security
Y Liu, R Li, X Liu, J Wang, L Zhang, C Tang, H Kang
2017 11th IEEE International Conference on Anti-counterfeiting, Security …, 2017
432017
Differential fault analysis on SMS4 using a single fault
R Li, B Sun, C Li, J You
Information Processing Letters 111 (4), 156-163, 2011
322011
New impossible differential cryptanalysis of ARIA
R Li, B Sun, P Zhang, C Li
Cryptology ePrint Archive, 2008
322008
Differential fault analysis on SHACAL-1
R Li, C Li, C Gong
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 120-126, 2009
282009
The mirror Langevin algorithm converges with vanishing bias
R Li, M Tao, SS Vempala, A Wibisono
International Conference on Algorithmic Learning Theory, 718-742, 2022
232022
Enhancing anonymity of bitcoin based on ring signature algorithm
Y Liu, R Li, X Liu, J Wang, C Tang, H Kang
2017 13th International conference on computational intelligence and …, 2017
222017
Preparation and characterization of a specialized lunar regolith simulant for use in lunar low gravity simulation
R Li, G Zhou, K Yan, J Chen, D Chen, S Cai, PQ Mo
International Journal of Mining Science and Technology 32 (1), 1-15, 2022
212022
A meet-in-the-middle attack on reduced-round ARIA
X Tang, B Sun, R Li, C Li, J Yin
Journal of Systems and Software 84 (10), 1685-1692, 2011
212011
SQUARE attack on block ciphers with low algebraic degree
B Sun, RL Li, LJ Qu, C Li
Science China Information Sciences 53, 1988-1995, 2010
172010
Impossible differential cryptanalysis of 13-round CLEFIA-128
X Tang, B Sun, R Li, C Li
Journal of Systems and Software 84 (7), 1191-1196, 2011
162011
RDFuzz: Accelerating directed fuzzing with intertwined schedule and optimized mutation
J Ye, R Li, B Zhang
Mathematical Problems in Engineering 2020, 1-12, 2020
152020
Differential fault analysis on LED using Super‐Sbox
G Zhao, R Li, L Cheng, C Li, B Sun
IET Information Security 9 (4), 209-218, 2015
152015
Fault analysis study of the block cipher FOX64
R Li, J You, B Sun, C Li
Multimedia Tools and Applications 63 (3), 691-708, 2013
152013
Program state sensitive parallel fuzzing for real world software
J Ye, B Zhang, R Li, C Feng, C Tang
IEEE Access 7, 42557-42564, 2019
132019
Impossible differential cryptanalysis of CLEFIA
B Sun, R Li, M Wang, P Li, C Li
Cryptology ePrint Archive, 2008
122008
Piccolo 算法的差分故障分析
赵光耀, 李瑞林, 孙兵, 李超
计算机学报 35 (9), 1918-1926, 2012
112012
A real-time inversion attack on the GMR-2 cipher used in the satellite phones
J Hu, R Li, C Tang
Science China Information Sciences 61, 1-18, 2018
102018
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20