متابعة
Ruilin Li
Ruilin Li
National University of Defense Technology
ليس هناك بريد إلكتروني تم التحقق منه
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
912015
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
B Sun, M Liu, J Guo, V Rijmen, R Li
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
712016
Impossible differential cryptanalysis of SPN ciphers
R Li, B Sun, C Li
IET Information Security 5 (2), 111-120, 2011
472011
An efficient method to enhance Bitcoin wallet security
Y Liu, R Li, X Liu, J Wang, L Zhang, C Tang, H Kang
2017 11th IEEE International Conference on Anti-counterfeiting, Security …, 2017
432017
Differential fault analysis on SMS4 using a single fault
R Li, B Sun, C Li, J You
Information Processing Letters 111 (4), 156-163, 2011
322011
New impossible differential cryptanalysis of ARIA
R Li, B Sun, P Zhang, C Li
Cryptology ePrint Archive, 2008
322008
Differential fault analysis on SHACAL-1
R Li, C Li, C Gong
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 120-126, 2009
282009
The mirror Langevin algorithm converges with vanishing bias
R Li, M Tao, SS Vempala, A Wibisono
International Conference on Algorithmic Learning Theory, 718-742, 2022
242022
Enhancing anonymity of bitcoin based on ring signature algorithm
Y Liu, R Li, X Liu, J Wang, C Tang, H Kang
2017 13th International conference on computational intelligence and …, 2017
222017
Preparation and characterization of a specialized lunar regolith simulant for use in lunar low gravity simulation
R Li, G Zhou, K Yan, J Chen, D Chen, S Cai, PQ Mo
International Journal of Mining Science and Technology 32 (1), 1-15, 2022
212022
A meet-in-the-middle attack on reduced-round ARIA
X Tang, B Sun, R Li, C Li, J Yin
Journal of Systems and Software 84 (10), 1685-1692, 2011
212011
SQUARE attack on block ciphers with low algebraic degree
B Sun, RL Li, LJ Qu, C Li
Science China Information Sciences 53, 1988-1995, 2010
172010
RDFuzz: Accelerating directed fuzzing with intertwined schedule and optimized mutation
J Ye, R Li, B Zhang
Mathematical Problems in Engineering 2020, 1-12, 2020
162020
Fault analysis study of the block cipher FOX64
R Li, J You, B Sun, C Li
Multimedia Tools and Applications 63 (3), 691-708, 2013
162013
Impossible differential cryptanalysis of 13-round CLEFIA-128
X Tang, B Sun, R Li, C Li
Journal of Systems and Software 84 (7), 1191-1196, 2011
162011
Differential fault analysis on LED using Super‐Sbox
G Zhao, R Li, L Cheng, C Li, B Sun
IET Information Security 9 (4), 209-218, 2015
152015
Program state sensitive parallel fuzzing for real world software
J Ye, B Zhang, R Li, C Feng, C Tang
IEEE Access 7, 42557-42564, 2019
132019
Impossible differential cryptanalysis of CLEFIA
B Sun, R Li, M Wang, P Li, C Li
Cryptology ePrint Archive, 2008
122008
Piccolo 算法的差分故障分析
赵光耀, 李瑞林, 孙兵, 李超
计算机学报 35 (9), 1918-1926, 2012
112012
A real-time inversion attack on the GMR-2 cipher used in the satellite phones
J Hu, R Li, C Tang
Science China Information Sciences 61, 1-18, 2018
102018
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20