[All publications| DBLP | Google Scholar]
Conference Publications
L. Grassi, F. Liu, C. Rechberger, F. Schmid, R. Walch, Q. Wang: Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? --- Application to Pasta. SAC 2024, LNCS. ePrint
K. Zhang, Q. Wang, Y. Yu, C. Guo, H. Cui: Algebraic Attacks on Round-Reduced RAIN and Full AIM-III. ASIACRYPT 2023. ePrint doi
L. Grassi, Y. Hao, C. Rechberger, M. Schofnegger, R. Walch, Q. Wang: A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. CRYPTO 2023, LNCS 14083, pp. 573-606. ePrint doi
L. Grassi, I. Manterola Ayala, M. Norberg Hovd, M. Øygarden, H. Raddum, Q. Wang: Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. CRYPTO 2023, LNCS 14083, pp. 305-339, ePrint doi
H. Fan, Y. Hao, Q. Wang, X. Gong, L. Jiao: Key Filtering in Cube Attacks from the Implementation Aspect. CANS 2023. ePrint doi
J. Cui, K. Hu, Q. Wang, M. Wang: Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. CT-RSA 2022, LNCS 13161, pp. 223-246. doi
K. Hu, S. Sun, M. Wang, Y. Todo, Q. Wang: Massive Superpoly Recovery with Nested Monomial Predictions. ASIACRYPT 2021, LNCS 13090, pp. 392-421. doi ePrint
C. Niu, M. Li, M. Wang, Q. Wang, S.-M. Yiu: Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. SAC 2021, LNCS 13203, pp. 223-245. doi
M. Eichlseder, L. Grassi, R. Lüftenegger, M. Øygarden, C. Rechberger, M. Schofnegger, Q. Wang. An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. ASIACRYPT 2020, LNCS 12491, pp. 477-506. doi ePrint
K. Hu, S. Sun, M. Wang, Q. Wang. An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. ASIACRYPT 2020, LNCS 12491, pp. 446-476. doi ePrint
C. Beierle, A. Biryukov, L. Cardoso dos Santos, J. Großschädl, L. Perrin, A. Udovenko, V. Velichkov, Q. Wang. Alzette: a 64-bit ARX-box (feat. CRAX and TRAX). CRYPTO 2020, LNCS 12172, pp. 419-448. doi ePrint
Y. Hao, G. Leander, W. Meier, Y. Todo, Q. Wang, Modeling for Three-Subset Division Property without Unknown Subset ---Improved Cube Attacks against Trivium and Grain-128AEAD. EUROCRYPT 2020, LNCS 12105, pp. 466-495. doi ePrint
Q. Wang, Y. Hao, Y. Todo, C. Li, T. Isobe, W. Meier, Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. CRYPTO 2018, LNCS 10991, pp. 275-305. doi ePrint slides
Q. Wang, L. Grassi, C. Rechberger: Zero-Sum Partitions of PHOTON Permutations. CT-RSA 2018, LNCS 10808, pp. 279-299. doi ePrint
Y. Liu, Q. Wang, V. Rijmen: Automatic Search of Linear Trails in ARX with applications to SPECK and Chaskey. ACNS 2016, LNCS 9696, pp. 485-499. doi ePrint
B. Sun, Z. Liu, V. Rijmen, R. Li, L. Cheng, Q. Wang, H. AlKhzaimi, C. Li: Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. CRYPTO 2015, LNCS 9215, pp. 95-115. doi ePrint
I. Dinur, Y. Liu, W. Meier, Q. Wang: Optimized Interpolation Attacks on LowMC. ASIACRYPT 2015, LNCS 9453, pp. 535-560. doi ePrint slides
Q. Wang, Z. Liu, K. Varici, Y. Sasaki, V. Rijmen, Y. Todo: Cryptanalysis of Reduced-Round SIMON32 and SIMON48. INDOCRYPT 2014, LNCS 8885, pp. 143-160. doi ePrint
B. Bilgin, A. Bogdanov, M. Knezevic, F. Mendel, Q. Wang: Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. CHES 2013, LNCS 8086, pp. 142-158. doi ePrint
Q. Wang, D. Gu, V. Rijmen, Y. Liu, J. Chen, A. Bogdanov: Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012, LNCS 7839, pp. 126-140. doi
N. Mouha, Q. Wang, D. Gu, B. Preneel: Differential and Linear Cryptanalysis using Mixed-Integer Linear Programming. INSCRYPT 2011, LNCS 7537, pp. 57-76. doi
Journal Publications
X. Gong, Y. Hao, Q. Wang: Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW. Des. Codes Cryptogr. (2024). doi ePrint
Y. Hao, G. Leander, W. Meier, Y. Todo, Q. Wang: Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) (Extended version of EUROCRYPT 2020 paper). doi
C. Beierle, A. Biryukov, L. Cardoso dos Santos, J. Großschädl, L. Perrin, A. Udovenko, V. Velichkov, Q. Wang, Lightweight AEAD and Hashing using the Sparkle Permutation Family (long paper), IACR Trans. Symmetric Cryptol. 2020, 2020 (S1): 208-261 (2020). doi
K. Hu, Q. Wang, M. Wang, Finding Bit-Based Division Property for Ciphers with Complex Linear Layers. IACR Trans. Symmetric Cryptol. 2020 (1): 396-424. doi ePrint
Y. Hao, L. Jiao, C. Li, W. Meier; Y. Todo, Q. Wang, Links between Division Property and Other Cube Attack Variants. IACR Trans. Symmetric Cryptol. 2020 (1): 363-395. doi
Z. Liu, S. Han, Q. Wang, W. Li, Y. Liu, D. Gu: New insights on linear cryptanalysis, Science China Information Sciences 63(1): 112104 (2020).
Y. Hao, T. Isobe, L. Jiao, C. Li, W. Meier, Y. Todo, Q. Wang, Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) (Extended version of CRYPTO 2018 paper). doi
Y. Liu, L. Cheng, Z. Liu, W. Li, Q. Wang, D. Gu: Improved meet-in-the-middle attacks on reduced-round Piccolo. Science China Information Sciences 61 (3), 2108.
W. Meng, E. Tischhauser, Q. Wang, Y. Wang, J. Han: When intrusion detection meets blockchain technology: a review. IEEE Access 6, pp.10179-10188 (2018). doi
C. Li, Q. Wang: Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices. IACR Trans. Symmetric Cryptol. 2017(1): 129-155 (2017). doi ePrint
W. Li, V. Rijmen, Z. Tao, Q. Wang, H. Chen, Y Liu, C. Li, and Y. Liu, "Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs," Science China Information Sciences 61 (3), 2017.
Z. Liu, B. Sun, Q. Wang, K. Varici, D. Gu: Improved Zero-Correlation Linear Cryptanalysis of Reduced-round Camellia under Weak Keys, IET Information Security 10(2): 95-103, 2016.
Y. Liu, A. Yang, Z. Liu, W. Li, Q. Wang, L Song, D. Gu: Improved Impossible Differential Attack on Reduced Version of Camellia with FL/FL-1 Functions, IET Information Security 10(6): 425-432, 2016.
Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu, Wei Li: Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. Security and Communication Networks 8(4): 672-681 (2015) doi
Q. Wang, Z. Liu, D. Toz, K. Varici, D. Gu: Related-Key Rectangle Cryptanalysis of Rijndael-160 and Rijndael-192, IET Information Security 9(5): 266-276, 2015.
Q. Wang, A. Bogdanov: The Provable Constructive Effect of the Diffusion Switching Mechanism for CLEFIA-type Block Ciphers, Information Processing Letters 112(11): 427-432, 2012.
W. Li, D. Gu, X. Xia, C. Zhao, Z. Liu, Y. Liu, Q. Wang: Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network. Int. J. Computational Intelligence Systems 5(5): 896-904, 2012.
Authenticated Encryption Designs
C. Beierle, A. Biryukov, L. Cardoso dos Santos, J. Großschädl, A. Moradi, L. Perrin, A. Rezaei Shahmirzadi, A. Udovenko, V. Velichkov, Q. Wang. Schwaemm and Esch: Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family. Finalists of NIST LWC Competition, March 2021.
C. Beierle, A. Biryukov, L. Cardoso dos Santos, J. Großschädl, L. Perrin, A. Udovenko, V. Velichkov, Q. Wang. Schwaemm and Esch: Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family. Round 2 of NIST LWC Competition, August 2019.
E. Andreeva, B. Bilgin, A. Bogdanov, A. Luykx, F. Mendel, B. Mennink, N.Mouha, Q. Wang, K. Yasuda: PRIMATEs, Round 2 of CAESAR Competition. 2016.
B. Bilgin, A. Bogdanov, M. Knežević, F. Mendel, and Q. Wang, Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware, In Directions in Authenticated Ciphers (DIAC 2013).
Miscellaneous
P. Méaux, Q. Wang: Extreme Algebraic Attacks. IACR Cryptol. ePrint Arch. 2024: 64 (2024) ePrint
Y. Hao, Q. Wang, L. Jiao, X. Gong: Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE. Cryptology ePrint Archive, Report 2023/299, 2023.
S. Zhang, C. Guo, Q. Wang: Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations. Cryptology ePrint Archive, Report 2022/464, 2022.
Q. Wang, V. Rijmen, D. Toz, K. Varici, Study of the AES-like Super Boxes in LED and PHOTON, 34th Symposium on Information Theory in the Benelux - WIC 2013, WIC proceedings.