部分期刊论文:
[1] Guowei Liu, Guoxiao Liu, Kaijie Jiang, Qingyuan Yu, Keting Jia, Puwen Wei, Meiqin Wang: Improving MPCitH with Preprocessing: Mask Is All You Need. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(2): 1-22 (2025)
[2] Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju: High-Performance Hardware Implementation of MPCitH and Picnic3. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 190-214 (2024)
[3] Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang: Symmetric Twin Column Parity Mixers and Their Applications. IACR Trans. Symmetric Cryptol. 2024(4): 1-37 (2024)
[4] Guoxiao Liu, Qingyuan Yu, Liyuan Tang, Shihe Ma, Congming Wei, Keting Jia, Lingyue Qin, Xiaoyang Dong, Yantian Shen: Ultra Low-Latency Block Cipher uLBC. IACR Commun. Cryptol. 1(4): 25 (2024)
[5] Qingyuan Yu, Lingyue Qin, Xiaoyang Dong, Keting Jia: Improved Related-Key Rectangle Attacks On GIFT. Comput. J. 67(4): 1443-1456 (2024)
[6] Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang: Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023)
[7] Qin Lingyue, Dong Xiaoyang, Jia Keting, Zong Rui. Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes,SCIENCE CHINA Information Sciences 64, Article number: 139103 (2021)
[8] Cui Tingting, Chen Shiyao, Fu Kai, Wang Meiqin, Jia Keting. New automatic tool for finding impossible differentials and zero-correlation linear approximations,SCIENCE CHINA Information Sciences 64, Article number: 129103 (2021)
[9] Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You: (Quantum) Collision Attacks on Reduced Simpira v2. IACR Trans. Symmetric Cryptol. 2021(2): 222-248 (2021)
[10] Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier: Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. Comput. J. 64(4): 628-638 (2021)
[11] Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu: Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021)
[12] Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier: Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak. Comput. J. 63(8): 1231-1246 (2020)
[13] Quan Yuan, Puwen Wei, Keting Jia, Haiyang Xue: Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers. Sci. China Inf. Sci. 63(3) (2020)
[14] Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020)
[15] Boxin Zhao, Xiaoyang Dong, Keting Jia. New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect, IACR Transactions on Symmetric Cryptology ISSN 2519-173X, Vol. 2019, No. 3, pp. 121–151.
[16] Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier. New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019)
[17] Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao. Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. SCIENCE CHINA Information Sciences 61(9): 098103:1-098103:3 (2018)
部分会议论文:
[1] Yingxin Li, Fukang Liu, Gaoli Wang, Haifeng Qian, Keting Jia, Xiangyu Kong. New Collision Attacks on Round-Reduced SHA-512. CRYPTO 2025.
[2] Rujia Li, Jingyuan Ding, Qin Wang, Keting Jia, Haibin Zhang, Sisi Duan. Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus. USENIX Security 2025.
[3] Xin Wang, Shuhe Cao, Keting Jia, Qidi You and Sisi Duan. Lumi: Lightweight Blockchain Layer 2 Protocol from On-chain Coordination. IEEE ICDCS 2025
[4] Qingyuan Yu , Keting Jia , Guangnan Zou, Guoyan Zhang:Differential Cryptanalysis of Round-Reduced SPEEDY Family. Inscrypt 2022: 272-291
[5] Boxin Zhao, Xiaoyang Dong, Keting Jia and Willi Meier. Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128, Indocrypt 2019.
[6] Chao Liu, Zhongxiang Zheng, Keting Jia and Limin Tao. Identity-Concealed Authenticated Encryption from Ring Learning With Errors, Provsec 2019,2019,LNCS 11821,pp. 3-18.
[7] Chao Liu, Zhongxiang Zheng, Keting Jia and Qidi You. Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE,ISPEC 2019.
[8] Keting Jia, Ning Wang:Impossible Differential Cryptanalysis of 14-Round Camellia-192. ACISP (2) 2016: 363-378
[9] Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki: Cryptanalysis of Reduced NORX. FSE 2016: 554-574
[10] Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong, Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia, FSE 2015.
[11] Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang, Improved Attacks on Reduced-Round Camellia-128/192/256, CT-RSA 2015, LNCS 9048,2015, pp. 59-83;
[12] Leibo Li, Keting Jia, Xiaoyun Wang: Improved Single-Key Attacks on 9-Round AES-192/256, 2014, LNCS FSE 2014, LNCS 8540, 2015, pp. 1-20;
[13] Xuexin Zheng, Keting Jia: Impossible Differential Attack on Reduced-Round TWINE, ICISC 2013, LNCS 8565, pp.123-143
[14] Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang: Improved Cryptanalysis of the Block Cipher KASUMI. SAC 2012, LNCS 7707, pp. 222-233, 2012.
[15] Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang: Practical Attack on the Full MMB Block Cipher. SAC 2011, LNCS 7118, pp. 185-199, 2011.
[16] Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang: Pseudo-Cryptanalysis of Luffa. INSCRYPT 2010, LNCS 6584, pp. 187-198, 2011.
[17] Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu: Distinguishing and Second-Preimage Attacks on CBC-Like MACs. CANS 2009, LNCS 5888, pp. 349-361, 2009.
[18] Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang: New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. ACISP 2011, LNCS 6812, pp. 16-33, 2011.(Best Paper)
[19] Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang: New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009, LNCS 5677, pp. 209-230, 2009.
[20] Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang: New Distinguishing Attack on MAC using Secret-Prefix Method. FSE 2009, LNCS 5665, pp. 363-374, 2009.