基本信息
李永强  男  硕导  中国科学院信息工程研究所
电子邮件: liyongqiang@iie.ac.cn
通信地址: 北京市海淀区树村路 19 号
邮政编码: 100093

研究领域

  • ​密码函数
  • ​对称密码算法设计与分析


教育背景

2008-09--2012-01   中国科学院软件研究所   博士
2005-09--2008-06   北京师范大学   硕士
2001-09--2005-06   北京师范大学   学士

工作经历

   
工作简历
2014-10~现在, 中国科学院信息工程研究所, 副研究员
2012-04~2014-10,中国科学院信息工程研究所, 助理研究员

教授课程

密码学的数学基础I

出版信息

   
主要论文
[1] 刘正斌, 李永强, 朱朝熹. 分组密码最小活跃S盒个数快速搜索算法. 通信学报[J]. 2023, 44(1): 118-128, http://lib.cqvip.com/Qikan/Article/Detail?id=7108894179.
[2] Jiao, Lin, Hao, Yonglin, Li, Yongqiang. Guess-and-determine attacks on SNOW-Vi stream cipher. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2023, 91(5): 2021-2055, http://dx.doi.org/10.1007/s10623-022-01150-z.
[3] 陈惠琴, 李永强, 排尔哈提, 李志冉, 王明生. Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.. ACISP 2023null. 2023, https://link.springer.com/chapter/10.1007/978-3-031-35486-1_19.
[4] Kang, Man, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. Differential Analysis of ARX Block Ciphers Based on an Improved Genetic Algorithm. CHINESE JOURNAL OF ELECTRONICS[J]. 2023, 32(2): 225-236, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7386459&detailType=1.
[5] 陈惠琴, 李永强, 胡西超, 刘正斌, 矫琳, 王明生. Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. ACNS workshopnull. 2023, https://link.springer.com/chapter/10.1007/978-3-031-41181-6_1.
[6] Hu, Xichao, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. COMPUTER JOURNAL[J]. 2022, 65(6): 1560-1573, http://dx.doi.org/10.1093/comjnl/bxaa203.
[7] 许峥, 李永强, 王明生. Alzette 的安全性分析. 密码学报[J]. 2022, 4(9): 698-708, http://www.jcr.cacrnet.org.cn/CN/10.13868/j.cnki.jcr.000543.
[8] Lin Jiao, Yonglin Hao, Yongqiang Li. Guess-and-determine attacks on SNOW-Vi stream cipher. Designs, Codes and Cryptography[J]. 2022, [9] Liu, Zhengbin, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. On the upper bound of squared correlation of SIMON-like functions and its applications. IET INFORMATION SECURITY[J]. 2022, 16(3): http://dx.doi.org/10.1049/ise2.12057.
[10] Hu, Xichao, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. COMPUTER JOURNAL. 2021, [11] Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. The Computer Journal[J]. 2021, [12] Xu, Zheng, Li, Yongqiang, Wang, Mingsheng. Observations on the Security of COMET. COMPUTER JOURNAL. 2021, http://dx.doi.org/10.1093/comjnl/bxab061.
[13] Lin Jiao, yongqingli, Shaoyu du. Guess-and-Determine Attacks on AEGIS. The Computer Journal[J]. 2021, [14] Zheng Xu, Yongqiang Li, Mingsheng Wang. Observations on the Security of COMET. The Computer Journal[J]. 2021, [15] Liu, Zhengbin, Li, Yongqiang, Jiao, Lin, Wang, Mingsheng. A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2021, 67(2): 1054-1068, http://dx.doi.org/10.1109/TIT.2020.3040543.
[16] Jiao, Lin, Li, Yongqiang, Hao, Yonglin. A Guess-And-Determine Attack On SNOW-V Stream Cipher. COMPUTER JOURNAL[J]. 2020, 63(12): 1789-1812, https://www.webofscience.com/wos/woscc/full-record/WOS:000606839100001.
[17] Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li. Classification of quadratic APN functions with coefficients in formula omitted for dimensions up to 9. FINITE FIELDS AND THEIR APPLICATIONS. 2020, 68: http://dx.doi.org/10.1016/j.ffa.2020.101733.
[18] Yu, Yuyin, Kaleyski, Nikolay, Budaghyan, Lilya, Li, Yongqiang. Classification of quadratic APN functions with coefficients in F-2 for dimensions up to 9. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2020, 68: http://dx.doi.org/10.1016/j.ffa.2020.101733.
[19] Botao Hou, Yongqiang Li, Haoyue Zhao, 吴槟. Linear Attack on Round-Reduced DES Using Deep Learning. ESORICS 2020[J]. 2020, [20] Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang. Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. Asiacrypt2020[J]. 2020, [21] Jiao, Lin, Hao, Yonglin, Li, Yongqiang. Improved guess-and-determine attack on TRIVIUM. IET INFORMATION SECURITY[J]. 2019, 13(5): 411-419, https://www.webofscience.com/wos/woscc/full-record/WOS:000479308800001.
[22] Yongqiang Li, Shizhu Tian, Yuyin Yu, Mingsheng Wang. On the Generalization of Butterfly Structure. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2018, 160-179, https://doaj.org/article/2017ecd9ffed4fffb7db72bd0377d51e.
[23] Jiao, Lin, Li, Yongqiang, Hao, Yonglin. Guess-and-determine attacks on PANAMA-like stream ciphers. IET INFORMATION SECURITY[J]. 2018, 12(6): 484-497, https://www.webofscience.com/wos/woscc/full-record/WOS:000448814200003.
[24] 李永强. Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. International Conference on Information and Communications Security. 2018, [25] Xu, Yuwei, Li, Yongqiang, Wu, Chuankun, Liu, Feng. On the construction of differentially 4-uniform involutions. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2017, 47: 309-329, https://www.webofscience.com/wos/woscc/full-record/WOS:000407407500019.
[26] Zhengbin Liu, Yongqiang Li, Mingsheng Wang. Optimal Differential Trails in SIMON-like Ciphers. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2017, 358-379, https://doaj.org/article/4aa7a1ad11df479085f8ecc302c5652c.
[27] Zhao, Ruoxin, Zhang, Rui, Li, Yongqiang, Wu, Baofeng. Construction of MDS block diffusion matrices for block ciphers and hash functions. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2016, 59(9): https://www.webofscience.com/wos/woscc/full-record/WOS:000389031000018.
[28] Li Yongqiang, Wang Mingsheng, Peyrin T. On the Construction of Lightweight Circulant Involutory MDS Matrices. FAST SOFTWARE ENCRYPTION (FSE 2016)null. 2016, 9783: 121-139, [29] 李鹏飞, 李永强. MDS矩阵构造方法. 网络与信息安全学报[J]. 2016, 2(6): 44-53, http://lib.cqvip.com/ZK/detail.aspx?id=87886581504849544854484854.
[30] Zhao, Ruoxin, Zhang, Rui, Li, Yongqiang, Wu, Baofeng. Construction of MDS block diffusion matrices for block ciphers and hash functions. SCIENCE CHINA-INFORMATION SCIENCES. 2016, 59(9): https://www.webofscience.com/wos/woscc/full-record/WOS:000389031000018.
[31] Li Yongqiang, Wang Mingsheng, Batina L, Robshaw M. Constructing S-boxes for Lightweight Cryptography with Feistel Structure. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014null. 2014, 8731: 127-146, [32] Li, Yongqiang, Wang, Mingsheng. Constructing differentially 4-uniform permutations over GF(2(2m) ) from quadratic APN permutations over GF(2(2m+1)). DESIGNS CODES AND CRYPTOGRAPHY[J]. 2014, 72(2): 249-264, https://www.webofscience.com/wos/woscc/full-record/WOS:000336444600004.
[33] Yu, Yuyin, Wang, Mingsheng, Li, Yongqiang. A matrix approach for constructing quadratic APN functions. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2014, 73(2): 587-600, https://www.webofscience.com/wos/woscc/full-record/WOS:000339826100020.
[34] JIAO Lin, WANG Mingsheng, LI Yongqiang, LIU Meicheng. On Annihilators in Fewer Variables: Basic Theory and Applications. 电子学报:英文版[J]. 2013, 22(3): 489-494, http://lib.cqvip.com/Qikan/Article/Detail?id=46603916.
[35] Yu Yuyin, Wang Mingsheng, Li Yongqiang. Constructing Differentially 4 Uniform Permutations from Known Ones. CHINESE JOURNAL OF ELECTRONICS[J]. 2013, 22(3): 495-499, http://lib.cqvip.com/Qikan/Article/Detail?id=46603917.
[36] YU Yuyin, WANG Mingsheng, LI Yongqiang. Constructing Differentially 4 Uniform Permutations from Known Ones. 电子学报:英文版[J]. 2013, 22(3): 495-499, http://lib.cqvip.com/Qikan/Article/Detail?id=46603917.
[37] Li, Yongqiang, Wang, Mingsheng. The Nonexistence of Permutations EA-Equivalent to Certain AB Functions. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2013, 59(1): 672-679, https://www.webofscience.com/wos/woscc/full-record/WOS:000312896600043.
[38] Jiao Lin, Wang Mingsheng, Li Yongqiang, Liu Meicheng. On Annihilators in Fewer Variables: Basic Theory and Applications. CHINESE JOURNAL OF ELECTRONICS[J]. 2013, 22(3): 489-494, http://lib.cqvip.com/Qikan/Article/Detail?id=46603916.
[39] Li, Yongqiang, Wang, Mingsheng. Permutation polynomials EA-equivalent to the inverse function over GF(2(n)). CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2011, 3(3): 175-186, https://www.webofscience.com/wos/woscc/full-record/WOS:000208850300003.
[40] Li, Yongqiang, Wang, Mingsheng. On EA-equivalence of certain permutations to power mappings. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2011, 58(3): 259-269, https://www.webofscience.com/wos/woscc/full-record/WOS:000287707100003.