基本信息
李永强 男 硕导 中国科学院信息工程研究所
电子邮件: liyongqiang@iie.ac.cn
通信地址: 北京市海淀区树村路 19 号
邮政编码: 100093
电子邮件: liyongqiang@iie.ac.cn
通信地址: 北京市海淀区树村路 19 号
邮政编码: 100093
研究领域
- 密码函数
对称密码算法设计与分析
教育背景
2008-09--2012-01 中国科学院软件研究所 博士2005-09--2008-06 北京师范大学 硕士2001-09--2005-06 北京师范大学 学士
工作经历
工作简历
2014-10~现在, 中国科学院信息工程研究所, 副研究员2012-04~2014-10,中国科学院信息工程研究所, 助理研究员
教授课程
密码学的数学基础I
出版信息
主要论文
[1] 刘芬, 李永强, 陈惠琴, 矫琳, 罗明, 王明生. YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2024, 第 2 作者 通讯作者 5(70): 3729 -3749, https://ieeexplore.ieee.org/document/10379822.[2] 刘正斌, 李永强, 朱朝熹. 分组密码最小活跃S盒个数快速搜索算法. 通信学报[J]. 2023, 第 2 作者44(1): 118-128, http://lib.cqvip.com/Qikan/Article/Detail?id=7108894179.[3] Jiao, Lin, Hao, Yonglin, Li, Yongqiang. Guess-and-determine attacks on SNOW-Vi stream cipher. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2023, 第 3 作者91(5): 2021-2055, http://dx.doi.org/10.1007/s10623-022-01150-z.[4] 陈惠琴, 李永强, 排尔哈提, 李志冉, 王明生. Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.. ACISP 2023. 2023, 第 2 作者 通讯作者 https://link.springer.com/chapter/10.1007/978-3-031-35486-1_19.[5] Kang, Man, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. Differential Analysis of ARX Block Ciphers Based on an Improved Genetic Algorithm. CHINESE JOURNAL OF ELECTRONICS[J]. 2023, 第 2 作者 通讯作者 32(2): 225-236, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7386459&detailType=1.[6] 陈惠琴, 李永强, 胡西超, 刘正斌, 矫琳, 王明生. Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. ACNS workshop. 2023, 第 2 作者 通讯作者 https://link.springer.com/chapter/10.1007/978-3-031-41181-6_1.[7] Hu, Xichao, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. COMPUTER JOURNAL[J]. 2022, 第 2 作者 通讯作者 65(6): 1560-1573, http://dx.doi.org/10.1093/comjnl/bxaa203.[8] 许峥, 李永强, 王明生. Alzette 的安全性分析. 密码学报[J]. 2022, 第 2 作者 通讯作者 4(9): 698-708, http://www.jcr.cacrnet.org.cn/CN/10.13868/j.cnki.jcr.000543.[9] Lin Jiao, Yonglin Hao, Yongqiang Li. Guess-and-determine attacks on SNOW-Vi stream cipher. Designs, Codes and Cryptography[J]. 2022, 第 3 作者[10] Liu, Zhengbin, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. On the upper bound of squared correlation of SIMON-like functions and its applications. IET INFORMATION SECURITY[J]. 2022, 第 2 作者 通讯作者 16(3): http://dx.doi.org/10.1049/ise2.12057.[11] Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. The Computer Journal[J]. 2021, 第 2 作者 通讯作者 [12] Xu, Zheng, Li, Yongqiang, Wang, Mingsheng. Observations on the Security of COMET. COMPUTER JOURNAL. 2021, 第 2 作者 通讯作者 http://dx.doi.org/10.1093/comjnl/bxab061.[13] Lin Jiao, yongqingli, Shaoyu du. Guess-and-Determine Attacks on AEGIS. The Computer Journal[J]. 2021, [14] Zheng Xu, Yongqiang Li, Mingsheng Wang. Observations on the Security of COMET. The Computer Journal[J]. 2021, 第 2 作者 通讯作者 [15] Liu, Zhengbin, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2021, 第 2 作者 通讯作者 67(2): 1054-1068, http://dx.doi.org/10.1109/TIT.2020.3040543.[16] Jiao, Lin, Li, Yongqiang, Hao, Yonglin. A Guess-And-Determine Attack On SNOW-V Stream Cipher. COMPUTER JOURNAL[J]. 2020, 第 2 作者63(12): 1789-1812, https://www.webofscience.com/wos/woscc/full-record/WOS:000606839100001.[17] Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li. Classification of quadratic APN functions with coefficients in formula omitted for dimensions up to 9. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2020, 第 4 作者68: http://dx.doi.org/10.1016/j.ffa.2020.101733.[18] Botao Hou, Yongqiang Li, Haoyue Zhao, 吴槟. Linear Attack on Round-Reduced DES Using Deep Learning. ESORICS 2020[J]. 2020, 第 2 作者[19] Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang. Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. Asiacrypt2020[J]. 2020, 第 2 作者 通讯作者 [20] Jiao, Lin, Hao, Yonglin, Li, Yongqiang. Improved guess-and-determine attack on TRIVIUM. IET INFORMATION SECURITY[J]. 2019, 第 3 作者13(5): 411-419, https://www.webofscience.com/wos/woscc/full-record/WOS:000479308800001.[21] Yongqiang Li, Shizhu Tian, Yuyin Yu, Mingsheng Wang. On the Generalization of Butterfly Structure. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2018, 第 1 作者160-179, https://doaj.org/article/2017ecd9ffed4fffb7db72bd0377d51e.[22] Jiao, Lin, Li, Yongqiang, Hao, Yonglin. Guess-and-determine attacks on PANAMA-like stream ciphers. IET INFORMATION SECURITY[J]. 2018, 第 2 作者12(6): 484-497, https://www.webofscience.com/wos/woscc/full-record/WOS:000448814200003.[23] 李永强. Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. International Conference on Information and Communications Security. 2018, 第 1 作者[24] Xu, Yuwei, Li, Yongqiang, Wu, Chuankun, Liu, Feng. On the construction of differentially 4-uniform involutions. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2017, 第 2 作者 通讯作者 47: 309-329, https://www.webofscience.com/wos/woscc/full-record/WOS:000407407500019.[25] Zhengbin Liu, Yongqiang Li, Mingsheng Wang. Optimal Differential Trails in SIMON-like Ciphers. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2017, 第 2 作者358-379, https://doaj.org/article/4aa7a1ad11df479085f8ecc302c5652c.[26] Zhao, Ruoxin, Zhang, Rui, Li, Yongqiang, Wu, Baofeng. Construction of MDS block diffusion matrices for block ciphers and hash functions. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2016, 第 3 作者 通讯作者 59(9): https://www.webofscience.com/wos/woscc/full-record/WOS:000389031000018.[27] Li Yongqiang, Wang Mingsheng, Peyrin T. On the Construction of Lightweight Circulant Involutory MDS Matrices. FAST SOFTWARE ENCRYPTION (FSE 2016). 2016, 第 1 作者9783: 121-139, [28] 李鹏飞, 李永强. MDS矩阵构造方法. 网络与信息安全学报[J]. 2016, 第 2 作者2(6): 44-53, http://lib.cqvip.com/ZK/detail.aspx?id=87886581504849544854484854.[29] Zhao, Ruoxin, Zhang, Rui, Li, Yongqiang, Wu, Baofeng. Construction of MDS block diffusion matrices for block ciphers and hash functions. SCIENCE CHINA-INFORMATION SCIENCES. 2016, 第 3 作者 通讯作者 59(9): https://www.webofscience.com/wos/woscc/full-record/WOS:000389031000018.[30] Li Yongqiang, Wang Mingsheng, Batina L, Robshaw M. Constructing S-boxes for Lightweight Cryptography with Feistel Structure. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014. 2014, 第 1 作者8731: 127-146, [31] Li, Yongqiang, Wang, Mingsheng. Constructing differentially 4-uniform permutations over GF(2(2m) ) from quadratic APN permutations over GF(2(2m+1)). DESIGNS CODES AND CRYPTOGRAPHY[J]. 2014, 第 1 作者72(2): 249-264, https://www.webofscience.com/wos/woscc/full-record/WOS:000336444600004.[32] Yu, Yuyin, Wang, Mingsheng, Li, Yongqiang. A matrix approach for constructing quadratic APN functions. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2014, 第 3 作者73(2): 587-600, https://www.webofscience.com/wos/woscc/full-record/WOS:000339826100020.[33] JIAO Lin, WANG Mingsheng, LI Yongqiang, LIU Meicheng. On Annihilators in Fewer Variables: Basic Theory and Applications. 电子学报:英文版[J]. 2013, 第 3 作者22(3): 489-494, http://lib.cqvip.com/Qikan/Article/Detail?id=46603916.[34] Yu Yuyin, Wang Mingsheng, Li Yongqiang. Constructing Differentially 4 Uniform Permutations from Known Ones. CHINESE JOURNAL OF ELECTRONICS[J]. 2013, 第 3 作者22(3): 495-499, http://lib.cqvip.com/Qikan/Article/Detail?id=46603917.[35] Li, Yongqiang, Wang, Mingsheng. The Nonexistence of Permutations EA-Equivalent to Certain AB Functions. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2013, 第 1 作者 通讯作者 59(1): 672-679, https://www.webofscience.com/wos/woscc/full-record/WOS:000312896600043.[36] YU Yuyin, WANG Mingsheng, LI Yongqiang. Constructing Differentially 4 Uniform Permutations from Known Ones. 电子学报:英文版[J]. 2013, 第 3 作者22(3): 495-499, http://lib.cqvip.com/Qikan/Article/Detail?id=46603917.[37] Jiao Lin, Wang Mingsheng, Li Yongqiang, Liu Meicheng. On Annihilators in Fewer Variables: Basic Theory and Applications. CHINESE JOURNAL OF ELECTRONICS[J]. 2013, 第 3 作者22(3): 489-494, http://lib.cqvip.com/Qikan/Article/Detail?id=46603916.[38] Li, Yongqiang, Wang, Mingsheng. Permutation polynomials EA-equivalent to the inverse function over GF(2(n)). CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2011, 第 1 作者3(3): 175-186, https://www.webofscience.com/wos/woscc/full-record/WOS:000208850300003.[39] Li, Yongqiang, Wang, Mingsheng. On EA-equivalence of certain permutations to power mappings. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2011, 第 1 作者58(3): 259-269, https://www.webofscience.com/wos/woscc/full-record/WOS:000287707100003.