JIA KetingAssociate Researcher
Personal information

JIA Keting

Associate Researcher

+86-10-62788631

Email:ktjia@tsinghua.edu.cn

Education background

Ph.D., Information Security, Shandong University, China, 2010

B.S., Computer Science and Technology, Shandong University, China, 2005

Honors And Awards

First Class Prize of Technology Invention Awards of Shandong Provincial(2025)

Academic Achievement

[1] Yingxin Li, Fukang Liu, Gaoli Wang, Haifeng Qian, Keting Jia, Xiangyu Kong. New Collision Attacks on Round-Reduced SHA-512. CRYPTO 2025.

[2] Guowei Liu, Guoxiao Liu, Kaijie Jiang, Qingyuan Yu, Keting Jia, Puwen Wei, Meiqin Wang: Improving MPCitH with Preprocessing: Mask Is All You Need. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(2): 1-22 (2025)

[3] Rujia Li, Jingyuan Ding, Qin Wang, Keting Jia, Haibin Zhang, Sisi Duan. Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus. USENIX Security 2025.

[4] Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju: High-Performance Hardware Implementation of MPCitH and Picnic3. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 190-214 (2024)

[5] Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang: Symmetric Twin Column Parity Mixers and Their Applications. IACR Trans. Symmetric Cryptol. 2024(4): 1-37 (2024)

[6] Guoxiao Liu, Qingyuan Yu, Liyuan Tang, Shihe Ma, Congming Wei, Keting Jia, Lingyue Qin, Xiaoyang Dong, Yantian Shen: Ultra Low-Latency Block Cipher uLBC. IACR Commun. Cryptol. 1(4): 25 (2024)

[7] Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang: Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023)

[8] Qin Lingyue, Dong Xiaoyang, Jia Keting, Zong Rui. Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes,SCIENCE CHINA Information Sciences 64, Article number: 139103 (2021)

[9] Cui Tingting, Chen Shiyao, Fu Kai, Wang Meiqin, Jia Keting. New automatic tool for finding impossible differentials and zero-correlation linear approximations,SCIENCE CHINA Information Sciences 64, Article number: 129103 (2021)

[10] Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You: (Quantum) Collision Attacks on Reduced Simpira v2. IACR Trans. Symmetric Cryptol. 2021(2): 222-248 (2021)

[11] Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu: Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021)

[12] Boxin Zhao, Xiaoyang Dong, Keting Jia. New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect, IACR Transactions on Symmetric Cryptology ISSN 2519-173X, Vol. 2019, No. 3, pp. 121–151.

[13] Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier. New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019)

[14] Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao. Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. SCIENCE CHINA Information Sciences 61(9): 098103:1-098103:3 (2018)

[15] Keting Jia, Ning Wang:Impossible Differential Cryptanalysis of 14-Round Camellia-192. ACISP (2) 2016: 363-378

[16] Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki: Cryptanalysis of Reduced NORX. FSE 2016: 554-574

[17] Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong, Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia, FSE 2015.

[18] Leibo Li, Keting Jia, Xiaoyun Wang: Improved Single-Key Attacks on 9-Round AES-192/256, 2014, LNCS FSE 2014, LNCS 8540, 2015, pp. 1-20;

[19] Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang: New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. ACISP 2011, LNCS 6812, pp. 16-33, 2011.(Best Paper)

[20] Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang: New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009, LNCS 5677, pp. 209-230, 2009.

[21] Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang: New Distinguishing Attack on MAC using Secret-Prefix Method. FSE 2009, LNCS 5665, pp. 363-374, 2009.