Links among impossible differential, integral and zero correlation linear cryptanalysis B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li Annual Cryptology Conference, 95-115, 2015 | 91 | 2015 |
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis B Sun, M Liu, J Guo, V Rijmen, R Li Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 71 | 2016 |
Impossible differential cryptanalysis of SPN ciphers R Li, B Sun, C Li IET Information Security 5 (2), 111-120, 2011 | 47 | 2011 |
An efficient method to enhance Bitcoin wallet security Y Liu, R Li, X Liu, J Wang, L Zhang, C Tang, H Kang 2017 11th IEEE International Conference on Anti-counterfeiting, Security …, 2017 | 43 | 2017 |
Differential fault analysis on SMS4 using a single fault R Li, B Sun, C Li, J You Information Processing Letters 111 (4), 156-163, 2011 | 32 | 2011 |
New impossible differential cryptanalysis of ARIA R Li, B Sun, P Zhang, C Li Cryptology ePrint Archive, 2008 | 32 | 2008 |
Differential fault analysis on SHACAL-1 R Li, C Li, C Gong 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 120-126, 2009 | 28 | 2009 |
The mirror Langevin algorithm converges with vanishing bias R Li, M Tao, SS Vempala, A Wibisono International Conference on Algorithmic Learning Theory, 718-742, 2022 | 24 | 2022 |
Enhancing anonymity of bitcoin based on ring signature algorithm Y Liu, R Li, X Liu, J Wang, C Tang, H Kang 2017 13th International conference on computational intelligence and …, 2017 | 22 | 2017 |
Preparation and characterization of a specialized lunar regolith simulant for use in lunar low gravity simulation R Li, G Zhou, K Yan, J Chen, D Chen, S Cai, PQ Mo International Journal of Mining Science and Technology 32 (1), 1-15, 2022 | 21 | 2022 |
A meet-in-the-middle attack on reduced-round ARIA X Tang, B Sun, R Li, C Li, J Yin Journal of Systems and Software 84 (10), 1685-1692, 2011 | 21 | 2011 |
SQUARE attack on block ciphers with low algebraic degree B Sun, RL Li, LJ Qu, C Li Science China Information Sciences 53, 1988-1995, 2010 | 17 | 2010 |
RDFuzz: Accelerating directed fuzzing with intertwined schedule and optimized mutation J Ye, R Li, B Zhang Mathematical Problems in Engineering 2020, 1-12, 2020 | 16 | 2020 |
Fault analysis study of the block cipher FOX64 R Li, J You, B Sun, C Li Multimedia Tools and Applications 63 (3), 691-708, 2013 | 16 | 2013 |
Impossible differential cryptanalysis of 13-round CLEFIA-128 X Tang, B Sun, R Li, C Li Journal of Systems and Software 84 (7), 1191-1196, 2011 | 16 | 2011 |
Differential fault analysis on LED using Super‐Sbox G Zhao, R Li, L Cheng, C Li, B Sun IET Information Security 9 (4), 209-218, 2015 | 15 | 2015 |
Program state sensitive parallel fuzzing for real world software J Ye, B Zhang, R Li, C Feng, C Tang IEEE Access 7, 42557-42564, 2019 | 13 | 2019 |
Impossible differential cryptanalysis of CLEFIA B Sun, R Li, M Wang, P Li, C Li Cryptology ePrint Archive, 2008 | 12 | 2008 |
Piccolo 算法的差分故障分析 赵光耀, 李瑞林, 孙兵, 李超 计算机学报 35 (9), 1918-1926, 2012 | 11 | 2012 |
A real-time inversion attack on the GMR-2 cipher used in the satellite phones J Hu, R Li, C Tang Science China Information Sciences 61, 1-18, 2018 | 10 | 2018 |