[1]Guowei Liu, Guoxiao Liu, Kaijie Jiang, Qingyuan Yu, Keting Jia, Puwen Wei, Meiqin Wang: Improving MPCitH with Preprocessing: Mask Is All You Need. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(2): 1-22 (2025)
[2]Yingxin Li, Fukang Liu, Gaoli Wang, Haifeng Qian, Keting Jia, Xiangyu Kong. New Collision Attacks on Round-Reduced SHA-512. CRYPTO 2025.
[3]Rujia Li, Jingyuan Ding, Qin Wang, Keting Jia, Haibin Zhang, Sisi Duan. Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus. USENIX Security 2025.
[4]Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju: High-Performance Hardware Implementation of MPCitH and Picnic3. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 190-214 (2024)
[5]Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang: Symmetric Twin Column Parity Mixers and Their Applications. IACR Trans. Symmetric Cryptol. 2024(4): 1-37 (2024)
[6]Guoxiao Liu, Qingyuan Yu, Liyuan Tang, Shihe Ma, Congming Wei, Keting Jia, Lingyue Qin, Xiaoyang Dong, Yantian Shen: Ultra Low-Latency Block Cipher uLBC. IACR Commun. Cryptol. 1(4): 25 (2024)
[7]Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang: Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023)
[8]Qin Lingyue, Dong Xiaoyang, Jia Keting, Zong Rui. Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes,SCIENCE CHINA Information Sciences 64, Article number: 139103 (2021)
[9]Cui Tingting, Chen Shiyao, Fu Kai, Wang Meiqin, Jia Keting. New automatic tool for finding impossible differentials and zero-correlation linear approximations,SCIENCE CHINA Information Sciences 64, Article number: 129103 (2021)
[10]Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You: (Quantum) Collision Attacks on Reduced Simpira v2. IACR Trans. Symmetric Cryptol. 2021(2): 222-248 (2021)
[11]Keting Jia, Ning Wang:Impossible Differential Cryptanalysis of 14-Round Camellia-192. ACISP (2) 2016: 363-378
[12]Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang: New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009, LNCS 5677, pp. 209-230, 2009.