基本信息
李永强  男  硕导  中国科学院信息工程研究所
电子邮件: liyongqiang@iie.ac.cn
通信地址: 北京市海淀区闵庄路甲89号信工所3号楼
邮政编码: 100093

研究领域

  • ​密码函数
  • ​对称密码算法设计与分析


教育背景

2008-09--2012-01   中国科学院软件研究所   博士
2005-09--2008-06   北京师范大学   硕士
2001-09--2005-06   北京师范大学   学士

工作经历

   
工作简历
2014-10~现在, 中国科学院信息工程研究所, 副研究员
2012-04~2014-10,中国科学院信息工程研究所, 助理研究员

教授课程

密码学的数学基础I

出版信息

   
主要论文
[1] Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. The Computer Journal[J]. 2021, [2] Lin Jiao, yongqingli, Shaoyu du. Guess-and-Determine Attacks on AEGIS. The Computer Journal[J]. 2021, [3] Zheng Xu, Yongqiang Li, Mingsheng Wang. Observations on the Security of COMET. The Computer Journal[J]. 2021, [4] Liu, Zhengbin, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2021, 67(2): 1054-1068, https://www.webofscience.com/wos/woscc/full-record/WOS:000612137400023.
[5] Jiao, Lin, Li, Yongqiang, Hao, Yonglin. A Guess-And-Determine Attack On SNOW-V Stream Cipher. COMPUTER JOURNAL[J]. 2020, 63(12): 1789-1812, https://www.webofscience.com/wos/woscc/full-record/WOS:000606839100001.
[6] Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li. Classification of quadratic APN functions with coefficients in formula omitted for dimensions up to 9. Finite Fields and Their Applications. 2020, 68: http://dx.doi.org/10.1016/j.ffa.2020.101733.
[7] Yu, Yuyin, Kaleyski, Nikolay, Budaghyan, Lilya, Li, Yongqiang. Classification of quadratic APN functions with coefficients in F-2 for dimensions up to 9. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2020, 68: https://www.webofscience.com/wos/woscc/full-record/WOS:000579851300004.
[8] Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang. Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. Asiacrypt2020[J]. 2020, [9] Botao Hou, Yongqiang Li, Haoyue Zhao, 吴槟. Linear Attack on Round-Reduced DES Using Deep Learning. ESORICS 2020[J]. 2020, [10] Jiao, Lin, Hao, Yonglin, Li, Yongqiang. Improved guess-and-determine attack on TRIVIUM. IET INFORMATION SECURITY[J]. 2019, 13(5): 411-419, https://www.webofscience.com/wos/woscc/full-record/WOS:000479308800001.
[11] Yongqiang Li, Shizhu Tian, Yuyin Yu, Mingsheng Wang. On the Generalization of Butterfly Structure. IACR Transactions on Symmetric Cryptology[J]. 2018, 160-179, https://doaj.org/article/2017ecd9ffed4fffb7db72bd0377d51e.
[12] Jiao, Lin, Li, Yongqiang, Hao, Yonglin. Guess-and-determine attacks on PANAMA-like stream ciphers. IET INFORMATION SECURITY[J]. 2018, 12(6): 484-497, https://www.webofscience.com/wos/woscc/full-record/WOS:000448814200003.
[13] 李永强. Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. International Conference on Information and Communications Security. 2018, [14] Xu, Yuwei, Li, Yongqiang, Wu, Chuankun, Liu, Feng. On the construction of differentially 4-uniform involutions. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2017, 47: 309-329, https://www.webofscience.com/wos/woscc/full-record/WOS:000407407500019.
[15] Zhengbin Liu, Yongqiang Li, Mingsheng Wang. Optimal Differential Trails in SIMON-like Ciphers. IACR Transactions on Symmetric Cryptology[J]. 2017, 358-379, https://doaj.org/article/4aa7a1ad11df479085f8ecc302c5652c.
[16] Zhao, Ruoxin, Zhang, Rui, Li, Yongqiang, Wu, Baofeng. Construction of MDS block diffusion matrices for block ciphers and hash functions. SCIENCE CHINA-INFORMATION SCIENCESnull. 2016, 59(9): https://www.webofscience.com/wos/woscc/full-record/WOS:000389031000018.
[17] Li Yongqiang, Wang Mingsheng, Peyrin T. On the Construction of Lightweight Circulant Involutory MDS Matrices. FAST SOFTWARE ENCRYPTION (FSE 2016)null. 2016, 9783: 121-139, [18] 李鹏飞, 李永强. MDS矩阵构造方法. 网络与信息安全学报. 2016, 2(6): 44-53, http://lib.cqvip.com/ZK/detail.aspx?id=87886581504849544854484854.
[19] Zhao, Ruoxin, Zhang, Rui, Li, Yongqiang, Wu, Baofeng. Construction of MDS block diffusion matrices for block ciphers and hash functions. SCIENCE CHINA-INFORMATION SCIENCESnull. 2016, 59(9): https://www.webofscience.com/wos/woscc/full-record/WOS:000389031000018.
[20] Li, Yongqiang, Wang, Mingsheng. Constructing differentially 4-uniform permutations over GF(2(2m) ) from quadratic APN permutations over GF(2(2m+1)). DESIGNS CODES AND CRYPTOGRAPHY[J]. 2014, 72(2): 249-264, https://www.webofscience.com/wos/woscc/full-record/WOS:000336444600004.
[21] Li Yongqiang, Wang Mingsheng, Batina L, Robshaw M. Constructing S-boxes for Lightweight Cryptography with Feistel Structure. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014null. 2014, 8731: 127-146, [22] Yu, Yuyin, Wang, Mingsheng, Li, Yongqiang. A matrix approach for constructing quadratic APN functions. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2014, 73(2): 587-600, https://www.webofscience.com/wos/woscc/full-record/WOS:000339826100020.
[23] JIAO Lin, WANG Mingsheng, LI Yongqiang, LIU Meicheng. On Annihilators in Fewer Variables: Basic Theory and Applications. 电子学报:英文版. 2013, 22(3): 489-494, http://lib.cqvip.com/Qikan/Article/Detail?id=46603916.
[24] Yu Yuyin, Wang Mingsheng, Li Yongqiang. Constructing Differentially 4 Uniform Permutations from Known Ones. CHINESE JOURNAL OF ELECTRONICS[J]. 2013, 22(3): 495-499, http://lib.cqvip.com/Qikan/Article/Detail?id=46603917.
[25] Li, Yongqiang, Wang, Mingsheng. The Nonexistence of Permutations EA-Equivalent to Certain AB Functions. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2013, 59(1): 672-679, https://www.webofscience.com/wos/woscc/full-record/WOS:000312896600043.
[26] YU Yuyin, WANG Mingsheng, LI Yongqiang. Constructing Differentially 4 Uniform Permutations from Known Ones. 电子学报:英文版. 2013, 22(3): 495-499, http://lib.cqvip.com/Qikan/Article/Detail?id=46603917.
[27] Jiao Lin, Wang Mingsheng, Li Yongqiang, Liu Meicheng. On Annihilators in Fewer Variables: Basic Theory and Applications. CHINESE JOURNAL OF ELECTRONICS[J]. 2013, 22(3): 489-494, http://lib.cqvip.com/Qikan/Article/Detail?id=46603916.
[28] Li, Yongqiang, Wang, Mingsheng. Permutation polynomials EA-equivalent to the inverse function over GF(2(n)). CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2011, 3(3): 175-186, https://www.webofscience.com/wos/woscc/full-record/WOS:000208850300003.
[29] Li, Yongqiang, Wang, Mingsheng. On EA-equivalence of certain permutations to power mappings. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2011, 58(3): 259-269, https://www.webofscience.com/wos/woscc/full-record/WOS:000287707100003.