default search action
Wenling Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng:
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. Comput. J. 67(2): 674-687 (2024) - [j51]Bolin Wang, Wenling Wu, Yuhan Zhang, Li Zhang:
New Integral Distinguishers On Permutation Of Whirlpool. Comput. J. 67(3): 899-906 (2024) - [j50]Le Dong, Danxun Zhang, Wenya Li, Wenling Wu:
Yoyo attack on 4-round Lai-Massey scheme with secret round functions. Des. Codes Cryptogr. 92(9): 2655-2684 (2024) - [j49]Bolin Wang, Wenling Wu:
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes. Des. Codes Cryptogr. 92(11): 3753-3782 (2024) - [j48]Tairong Shi, Wenling Wu, Bin Hu, Jie Guan, Han Sui, Senpeng Wang, Mengyuan Zhang:
Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACs. IEEE Trans. Inf. Forensics Secur. 19: 5971-5984 (2024) - [j47]Yufei Yuan, Wenling Wu, Tairong Shi, Lei Zhang, Yu Zhang:
A Framework to Improve the Implementations of Linear Layers. IACR Trans. Symmetric Cryptol. 2024(2): 322-347 (2024) - [c92]Xiaodan Li, Wenling Wu, Yuhan Zhang, Ee Duan:
Efficient Search for Optimal Permutations of Refined Type-II Generalized Feistel Structures. ACISP (1) 2024: 98-117 - [i31]Weiqiong Cao, Hua Chen, Jingyi Feng, Linmin Fan, Wenling Wu:
Lattice-based Fault Attacks against ECMQV. IACR Cryptol. ePrint Arch. 2024: 882 (2024) - 2023
- [j46]Xiaodan Li, Wenling Wu:
Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure. Comput. J. 66(1): 160-173 (2023) - [j45]Li Zhang, Wenling Wu, Yafei Zheng, Bolin Wang:
Cryptanalysis on Reduced-Round 3D and Saturnin. Comput. J. 66(4): 1017-1029 (2023) - [j44]Zhongya Zhang, Wenling Wu, Han Sui, Bolin Wang:
Post-quantum security on the Lai-Massey scheme. Des. Codes Cryptogr. 91(8): 2687-2704 (2023) - [j43]Bolin Wang, Wenling Wu:
New Key-Independent Structural Properties of AES-Like Permutations. IEEE Internet Things J. 10(1): 575-583 (2023) - [c91]Yongxia Mao, Wenling Wu, Yafei Zheng, Lei Zhang:
Related-Cipher Attacks: Applications to Ballet and ANT. ACISP 2023: 109-123 - [i30]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023) - 2022
- [j42]Wengang Jin, Xiaoni Du, Wenling Wu, Zhixiong Chen:
Generic Construction of Boolean Functions with A Few Walsh Transform Values of Any Possible Algebraic Degree. Adv. Math. Commun. 16(4): 811-832 (2022) - [j41]Jian Zou, Zihao Wei, Siwei Sun, Yiyuan Luo, Qian Liu, Wenling Wu:
Some efficient quantum circuit implementations of Camellia. Quantum Inf. Process. 21(4): 131 (2022) - [j40]Jian Zou, Liji Li, Zihao Wei, Yiyuan Luo, Qian Liu, Wenling Wu:
New quantum circuit implementations of SM4 and SM3. Quantum Inf. Process. 21(5): 181 (2022) - [j39]Zhongya Zhang, Wenling Wu, Han Sui, Xiaodan Li:
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys. Quantum Inf. Process. 21(6): 219 (2022) - [j38]Jian Zheng, Jianfeng Wang, Yanping Chen, Shuping Chen, Jingjin Chen, Wenlong Zhong, Wenling Wu:
Effective approximation of high-dimensional space using neural networks. J. Supercomput. 78(3): 4377-4397 (2022) - [c90]Yuhan Zhang, Wenling Wu, Lei Zhang:
Improved Differential Attack on Round-Reduced LEA. ACISP 2022: 67-84 - [c89]Yongxia Mao, Wenling Wu, Bolin Wang, Li Zhang:
Improved Division Property for Ciphers with Complex Linear Layers. ACISP 2022: 106-124 - [c88]Lei Zhang, Ruichen Wu, Yuhan Zhang, Yafei Zheng, Wenling Wu:
LLLWBC: A New Low-Latency Light-Weight Block Cipher. Inscrypt 2022: 23-42 - [c87]Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA. CT-RSA 2022: 169-195 - [c86]Li Zhang, Wenling Wu, Yongxia Mao:
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore. ICISC 2022: 61-77 - 2021
- [j37]Tairong Shi, Wenling Wu, Bin Hu, Jie Guan, Sengpeng Wang:
Breaking LWC candidates: sESTATE and Elephant in quantum setting. Des. Codes Cryptogr. 89(7): 1405-1432 (2021) - [j36]Jian Zheng, Jianfeng Wang, Yanping Chen, Shuping Chen, Jingjin Chen, Wenlong Zhong, Wenling Wu:
Neural networks trained with high-dimensional functions approximation data in high-dimensional space. J. Intell. Fuzzy Syst. 41(2): 3739-3750 (2021) - [c85]Xiaodan Li, Wenling Wu:
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. ACISP 2021: 132-150 - [c84]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
On Characterization of Transparency Order for (n, m)-functions. Inscrypt 2021: 351-370 - [c83]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
Transparency Order of (n, m)-Functions - Its Further Characterization and Applications. ISC 2021: 139-157 - 2020
- [c82]Jian Zou, Zihao Wei, Siwei Sun, Ximeng Liu, Wenling Wu:
Quantum Circuit Implementations of AES with Fewer Qubits. ASIACRYPT (2) 2020: 697-726 - [c81]Bolin Wang, Chan Song, Wenling Wu, Lei Zhang:
A New Non-random Property of 4.5-Round PRINCE. ICISC 2020: 199-212 - [e1]Khoa Nguyen, Wenling Wu, Kwok-Yan Lam, Huaxiong Wang:
Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12505, Springer 2020, ISBN 978-3-030-62575-7 [contents] - [i29]Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Xi, Haoyuan Li, Limin Fan, Wenling Wu:
Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA. IACR Cryptol. ePrint Arch. 2020: 803 (2020)
2010 – 2019
- 2019
- [j35]Yafei Zheng, Wenling Wu:
On the extension and security of key schedule of GOST. IET Inf. Secur. 13(2): 125-132 (2019) - [j34]Lingchen Li, Wenling Wu, Lei Zhang, Yafei Zheng:
New method to describe the differential distribution table for large S-boxes in MILP and its application. IET Inf. Secur. 13(5): 479-485 (2019) - [i28]Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang:
The Relationship between the Construction and Solution of the MILP Models and Applications. IACR Cryptol. ePrint Arch. 2019: 49 (2019) - [i27]Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong:
Observations on the Quantum Circuit of the SBox of AES. IACR Cryptol. ePrint Arch. 2019: 1245 (2019) - 2018
- [j33]Li Lin, Wenling Wu:
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. Des. Codes Cryptogr. 86(4): 721-741 (2018) - [j32]Jian Zou, Le Dong, Wenling Wu:
New algorithms for the unbalanced generalised birthday problem. IET Inf. Secur. 12(6): 527-533 (2018) - [j31]Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic:
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. IACR Trans. Symmetric Cryptol. 2018(4): 62-79 (2018) - [c80]Weiqiong Cao, Hua Chen, Jingyi Feng, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks Against ECMQV. COSADE 2018: 101-116 - 2017
- [j30]Lei Zhang, Wenling Wu:
Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. IET Inf. Secur. 11(3): 121-128 (2017) - [j29]Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Wenling Wu, Cheng-Xiang Wang:
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions. Inf. Sci. 415: 377-396 (2017) - [j28]Li Lin, Wenling Wu:
Meet-in-the-Middle Attacks on Reduced-Round Midori64. IACR Trans. Symmetric Cryptol. 2017(1): 215-239 (2017) - [j27]Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin:
Direct Construction of Optimal Rotational-XOR Diffusion Primitives. IACR Trans. Symmetric Cryptol. 2017(4): 169-187 (2017) - [c79]Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma:
My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses. CT-RSA 2017: 363-378 - [c78]Lingchen Li, Wenling Wu, Lei Zhang:
Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. ICICS 2017: 502-508 - [c77]Li Lin, Wenling Wu, Yafei Zheng:
Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers. ISC 2017: 58-76 - 2016
- [j26]Yanfeng Wang, Wenling Wu:
New criterion for diffusion property and applications to improved GFS and EGFN. Des. Codes Cryptogr. 81(3): 393-412 (2016) - [j25]Yuan Yao, Bin Zhang, Wenling Wu:
Utilizing Probabilistic Linear Equations in Cube Attacks. J. Comput. Sci. Technol. 31(2): 317-325 (2016) - [j24]Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang:
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP. IACR Trans. Symmetric Cryptol. 2016(2): 288-306 (2016) - [c76]Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma:
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. CANS 2016: 3-18 - [c75]Yafei Zheng, Wenling Wu:
Biclique Attack of Block Cipher SKINNY. Inscrypt 2016: 3-17 - [c74]Yanfeng Wang, Wenling Wu:
New Observations on Piccolo Block Cipher. CT-RSA 2016: 378-393 - [c73]Li Lin, Wenling Wu, Yafei Zheng:
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. FSE 2016: 247-267 - [c72]Jian Zhang, Wenling Wu, Yafei Zheng:
Security of SM4 Against (Related-Key) Differential Cryptanalysis. ISPEC 2016: 65-78 - [c71]Jian Zhang, Wenling Wu, Yafei Zheng:
Collision Attacks on CAESAR Second-Round Candidate: ELmD. ISPEC 2016: 122-136 - [c70]Huiling Zhang, Wenling Wu:
Structural Evaluation for Simon-Like Designs Against Integral Attack. ISPEC 2016: 194-208 - [i26]Li Lin, Wenling Wu, Yafei Zheng:
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version). IACR Cryptol. ePrint Arch. 2016: 414 (2016) - [i25]Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512. IACR Cryptol. ePrint Arch. 2016: 722 (2016) - [i24]Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin:
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers. IACR Cryptol. ePrint Arch. 2016: 1036 (2016) - [i23]Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma:
My traces learn what you did in the dark: recovering secret signals without key guesses. IACR Cryptol. ePrint Arch. 2016: 1082 (2016) - [i22]Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang:
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP. IACR Cryptol. ePrint Arch. 2016: 1098 (2016) - 2015
- [j23]Wenling Wu, Lei Zhang, Xiaoli Yu:
The DBlock family of block ciphers. Sci. China Inf. Sci. 58(3): 1-14 (2015) - [j22]Le Dong, Yanling Wang, Wenling Wu, Jian Zou:
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. IET Inf. Secur. 9(5): 277-283 (2015) - [j21]Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. J. Cryptol. 28(3): 718-744 (2015) - [c69]Yuan Yao, Bin Zhang, Wenling Wu:
A Single Query Forgery Attack on Raviyoyla v1. AsiaCCS 2015: 671 - [c68]Weiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm. ICICS 2015: 62-70 - [c67]Huiling Zhang, Wenling Wu, Yanfeng Wang:
Integral Attack Against Bit-Oriented Block Ciphers. ICISC 2015: 102-118 - [c66]Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm. ICISC 2015: 297-313 - [c65]Huiling Zhang, Wenling Wu:
Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. INDOCRYPT 2015: 218-237 - [c64]Yuan Yao, Bin Zhang, Wenling Wu:
Automatic Search for Linear Trails of the SPECK Family. ISC 2015: 158-176 - [c63]Li Lin, Wenling Wu, Yafei Zheng:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. SAC 2015: 122-142 - [c62]Zhiyuan Guo, Wenling Wu, Si Gao:
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure. SAC 2015: 352-372 - [i21]Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. IACR Cryptol. ePrint Arch. 2015: 51 (2015) - [i20]Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. IACR Cryptol. ePrint Arch. 2015: 159 (2015) - [i19]Li Lin, Wenling Wu:
Meet-in-the-Middle Attacks on Reduced-Round Midori-64. IACR Cryptol. ePrint Arch. 2015: 1165 (2015) - 2014
- [j20]Xinxin Gong, Bin Zhang, Wenling Wu, Dengguo Feng:
Computing Walsh coefficients from the algebraic normal form of a Boolean function. Cryptogr. Commun. 6(4): 335-358 (2014) - [j19]Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. Frontiers Comput. Sci. 8(3): 513-525 (2014) - [j18]Lei Zhang, Wenling Wu:
Differential analysis of the Extended Generalized Feistel Networks. Inf. Process. Lett. 114(12): 723-727 (2014) - [j17]Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. J. Inf. Sci. Eng. 30(6): 1789-1806 (2014) - [c61]Yanfeng Wang, Wenling Wu:
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. ACISP 2014: 1-16 - [c60]Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu:
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. ACNS 2014: 308-323 - [i18]Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Wenling Wu:
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function. IACR Cryptol. ePrint Arch. 2014: 971 (2014) - 2013
- [c59]Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE. ASIACRYPT (1) 2013: 377-404 - [c58]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function. Inscrypt 2013: 291-308 - [c57]Jian Zou, Wenling Wu, Shuang Wu:
Cryptanalysis of the Round-Reduced GOST Hash Function. Inscrypt 2013: 309-322 - [c56]Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. FSE 2013: 71-91 - [c55]Han Sui, Wenling Wu, Liting Zhang, Peng Wang:
Attacking and Fixing the CS Mode. ICICS 2013: 318-330 - [c54]Xiaoqian Li, Bao Li, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma:
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core. ICISC 2013: 158-172 - [c53]Li Lin, Wenling Wu, Yanfeng Wang, Lei Zhang:
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. ICISC 2013: 203-223 - [c52]Peng Wang, Wenling Wu, Liting Zhang:
Cryptanalysis of the OKH Authenticated Encryption Scheme. ISPEC 2013: 353-360 - [i17]Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu:
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. IACR Cryptol. ePrint Arch. 2013: 775 (2013) - [i16]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function (Full Version). IACR Cryptol. ePrint Arch. 2013: 867 (2013) - 2012
- [j16]Liting Zhang, Wenling Wu, Peng Wang, Bo Liang:
TrCBC: Another look at CBC-MAC. Inf. Process. Lett. 112(7): 302-307 (2012) - [c51]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu:
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. ACNS 2012: 117-134 - [c50]Liting Zhang, Wenling Wu, Han Sui, Peng Wang:
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. ASIACRYPT 2012: 296-312 - [c49]Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu:
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. ASIACRYPT 2012: 562-579 - [c48]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. FSE 2012: 127-145 - [c47]Zhenqing Shi, Bin Zhang, Dengguo Feng, Wenling Wu:
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. ICISC 2012: 337-351 - [c46]Yanfeng Wang, Wenling Wu, Xiaoli Yu:
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher. ISPEC 2012: 337-352 - [c45]Shengbao Wu, Mingsheng Wang, Wenling Wu:
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions. Selected Areas in Cryptography 2012: 355-371 - [c44]Yanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang:
Security on LBlock against Biclique Cryptanalysis. WISA 2012: 1-14 - [i15]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). IACR Cryptol. ePrint Arch. 2012: 206 (2012) - [i14]Peng Wang, Wenling Wu, Liting Zhang:
Cryptanalysis of the OKH Authenticated Encryption Scheme. IACR Cryptol. ePrint Arch. 2012: 580 (2012) - [i13]Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. IACR Cryptol. ePrint Arch. 2012: 686 (2012) - 2011
- [j15]Liting Zhang, Wenling Wu, Lei Zhang, Peng Wang:
CBCR: CBC MAC with rotating transformations. Sci. China Inf. Sci. 54(11): 2247-2255 (2011) - [c43]Wenling Wu, Lei Zhang:
LBlock: A Lightweight Block Cipher. ACNS 2011: 327-344 - [c42]Xiaoli Yu, Wenling Wu, Yanjun Li, Lei Zhang:
Cryptanalysis of Reduced-Round KLEIN Block Cipher. Inscrypt 2011: 237-250 - [c41]Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su, Le Dong:
Preimage Attacks on Step-Reduced SM3 Hash Function. ICISC 2011: 375-390 - [c40]Bo Liang, Wenling Wu, Liting Zhang:
BCBC: A More Efficient MAC Algorithm. ISPEC 2011: 233-246 - [c39]Liting Zhang, Wenling Wu, Peng Wang:
PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers. ProvSec 2011: 266-280 - [c38]Yanjun Li, Wenling Wu, Lei Zhang:
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher. WISA 2011: 28-39 - [c37]Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-Key Distinguisher on Round-Reduced 3D Block Cipher. WISA 2011: 55-69 - [i12]Wenling Wu, Lei Zhang:
LBlock: A Lightweight Block Cipher. IACR Cryptol. ePrint Arch. 2011: 345 (2011) - 2010
- [j14]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng:
Some results on cryptanalysis of SMS4 block cipher. Int. J. Appl. Cryptogr. 2(1): 60-67 (2010) - [j13]Liting Zhang, Wenling Wu, Peng Wang:
A New Variant of 3GPP-MAC With Provable Security and Higher Efficiency. J. Inf. Sci. Eng. 26(4): 1539-1552 (2010) - [j12]Shuang Wu, Dengguo Feng, Wenling Wu:
New Disturbance Vector for SHA-0 Collision. J. Inf. Sci. Eng. 26(6): 2143-2157 (2010) - [c36]Haining Chen, Yongbin Zhou, Wenling Wu, Na Wang:
Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. CIT 2010: 1050-1057 - [c35]Bozhan Su, Wenling Wu, Shuang Wu, Le Dong:
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. CANS 2010: 124-139 - [c34]Shuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su:
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. Inscrypt 2010: 155-168 - [c33]Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, Bo Liang:
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. FSE 2010: 250-269 - [c32]Yanjun Li, Wenling Wu, Lei Zhang:
Integral Attacks on Reduced-Round ARIA Block Cipher. ISPEC 2010: 19-29 - [c31]Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li:
Full-Round Differential Attack on TWIS Block Cipher. WISA 2010: 234-242 - [i11]Bozhan Su, Wenling Wu, Wentao Zhang:
Differential Cryptanalysis of SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2010: 62 (2010) - [i10]Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li:
Some Observations on TWIS Block Cipher. IACR Cryptol. ePrint Arch. 2010: 66 (2010) - [i9]Bozhan Su, Wenling Wu, Shuang Wu, Le Dong:
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. IACR Cryptol. ePrint Arch. 2010: 355 (2010)
2000 – 2009
- 2009
- [c30]Liting Zhang, Wenling Wu, Lei Zhang, Yanjun Li:
A note on Cook's elastic block cipher. AsiaCCS 2009: 380-383 - [c29]Lei Zhang, Wenling Wu, Liting Zhang:
Proposition of Two Cipher Structures. Inscrypt 2009: 215-229 - [c28]Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang:
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. ICICS 2009: 17-31 - [c27]Shuang Wu, Dengguo Feng, Wenling Wu:
Practical Rebound Attack on 12-Round Cheetah-256. ICISC 2009: 300-314 - [c26]Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335 - [c25]Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Correctness of an Approach against Side-Channel Attacks. ISPEC 2009: 336-344 - [c24]Shuang Wu, Dengguo Feng, Wenling Wu:
Cryptanalysis of the LANE Hash Function. Selected Areas in Cryptography 2009: 126-140 - [i8]Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang:
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. IACR Cryptol. ePrint Arch. 2009: 346 (2009) - 2008
- [j11]Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu:
Analysis of All-or-Nothing Hash Functions. J. Inf. Sci. Eng. 24(5): 1473-1484 (2008) - [c23]Lei Zhang, Wentao Zhang, Wenling Wu:
Cryptanalysis of Reduced-Round SMS4 Block Cipher. ACISP 2008: 216-229 - [c22]Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Unprovable Security of 2-Key XCBC. ACISP 2008: 230-238 - [c21]Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu:
Security of Truncated MACs. Inscrypt 2008: 96-114 - [c20]Liting Zhang, Wenling Wu, Peng Wang:
Extended Models for Message Authentication. ICISC 2008: 286-301 - [c19]Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu:
Analysis of Zipper as a Hash Function. ISPEC 2008: 392-403 - [c18]Lei Zhang, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom:
Improved Impossible Differential Attacks on Large-Block Rijndael. ISC 2008: 298-315 - [c17]Wenling Wu, Lei Zhang, Wentao Zhang:
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. Selected Areas in Cryptography 2008: 442-456 - [i7]Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Correctness of An Approach Against Side-channel attacks. IACR Cryptol. ePrint Arch. 2008: 497 (2008) - [i6]Shuang Wu, Dengguo Feng, Wenling Wu:
Cryptanalysis of the Hash Function LUX-256. IACR Cryptol. ePrint Arch. 2008: 520 (2008) - 2007
- [j10]ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng:
Constructing parallel long-message signcryption scheme from trapdoor permutation. Sci. China Ser. F Inf. Sci. 50(1): 82-98 (2007) - [j9]Pin Lin, Wenling Wu, Chuankun Wu:
Security Analysis of Double Length Compression Function Based on Block Cipher. Int. J. Netw. Secur. 4(2): 121-127 (2007) - [j8]Dayin Wang, Dongdai Lin, Wenling Wu:
Related-Mode Attacks on CTR Encryption Mode. Int. J. Netw. Secur. 4(3): 282-287 (2007) - [j7]Dayin Wang, Dongdai Lin, Wenling Wu:
Another Look at PMAC. Int. J. Netw. Secur. 5(1): 16-20 (2007) - [j6]Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. J. Comput. Sci. Technol. 22(3): 449-456 (2007) - [c16]Hua Chen, Wenling Wu, Dengguo Feng:
Differential Fault Analysis on CLEFIA. ICICS 2007: 284-295 - [c15]Wentao Zhang, Wenling Wu, Dengguo Feng:
New Results on Impossible Differential Cryptanalysis of Reduced AES. ICISC 2007: 239-250 - [c14]Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng:
Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRYPT 2007: 73-85 - 2006
- [j5]Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. Int. J. Netw. Secur. 3(3): 215-224 (2006) - [j4]Wenling Wu:
Pseudorandomness of Camellia-Like Scheme. J. Comput. Sci. Technol. 21(1): 82-88 (2006) - [j3]Honggang Hu, Dengguo Feng, Wenling Wu:
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z2l. IEEE Trans. Inf. Theory 52(5): 2260-2265 (2006) - [c13]Dayin Wang, Dongdai Lin, Wenling Wu:
An Improved Poly1305 MAC. ACNS 2006: 284-292 - [c12]Dayin Wang, Dongdai Lin, Wenling Wu:
OPMAC: One-Key Poly1305 MAC. Inscrypt 2006: 78-87 - [c11]Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang:
An ID-Based Watermarking Scheme for Java Programs. EUC Workshops 2006: 848-857 - [c10]Peng Wang, Dengguo Feng, Wenling Wu:
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006: 280-286 - [c9]Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng:
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Selected Areas in Cryptography 2006: 15-27 - [i5]Peng Wang, Dengguo Feng, Wenling Wu:
Cryptanalysis of the MEM Mode of Operation. IACR Cryptol. ePrint Arch. 2006: 94 (2006) - [i4]Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of ARIA and Camellia. IACR Cryptol. ePrint Arch. 2006: 350 (2006) - 2005
- [j2]Wenling Wu, Dengguo Feng:
Collision attack on reduced-round Camellia. Sci. China Ser. F Inf. Sci. 48(1): 78-90 (2005) - [c8]Fengtong Wen, Wenling Wu, Qiaoyan Wen:
Error Oracle Attacks on Several Modes of Operation. CIS (2) 2005: 62-67 - [c7]Dayin Wang, Dongdai Lin, Wenling Wu:
A Variant of Poly1305 MAC and Its Security Proof. CIS (2) 2005: 375-380 - [c6]Peng Wang, Dengguo Feng, Wenling Wu:
HCTR: A Variable-Input-Length Enciphering Mode. CISC 2005: 175-188 - [c5]Wenling Wu, Wentao Zhang, Dengguo Feng:
Integral Cryptanalysis of Reduced FOX Block Cipher. ICISC 2005: 229-241 - [c4]Peng Wang, Dengguo Feng, Wenling Wu:
On the Security of Tweakable Modes of Operation: TBC and TAE. ISC 2005: 274-287 - [i3]Wenling Wu, Wentao Zhang, Dengguo Feng:
Improved Integral Cryptanalysis of FOX Block Cipher. IACR Cryptol. ePrint Arch. 2005: 292 (2005) - 2004
- [c3]Wenling Wu, Dengguo Feng, Hua Chen:
Collision Attack and Pseudorandomness of Reduced-Round Camellia. Selected Areas in Cryptography 2004: 252-266 - [i2]Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. IACR Cryptol. ePrint Arch. 2004: 337 (2004) - 2003
- [i1]Wenling Wu, Dengguo Feng:
Collision Attack on Reduced-Round Camellia. IACR Cryptol. ePrint Arch. 2003: 135 (2003) - 2002
- [j1]Wenling Wu, Dengguo Feng:
Linear cryptanalysis of NUSH block cipher. Sci. China Ser. F Inf. Sci. 45(1): 59-67 (2002) - 2000
- [c2]Wenling Wu, Dengguo Feng, Sihan Qing:
Power Analysis of RC6 and Serpent. SEC 2000: 201-209
1990 – 1999
- 1999
- [c1]Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint