Hongjun Wu

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved differential cryptanalysis on generalized Feistel schemes2018-04-26Paper
Cryptanalysis of Simpira v22017-08-25Paper
Cryptanalysis of the authenticated encryption algorithm COFFE
Lecture Notes in Computer Science
2016-05-19Paper
Improving the biclique cryptanalysis of AES
Information Security and Privacy
2015-10-20Paper
AEGIS: a fast authenticated encryption algorithm
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Differential-linear cryptanalysis of ICEPOLE
Fast Software Encryption
2015-09-18Paper
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Differential attacks against stream cipher ZUC
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Improving the Algorithm 2 in multidimensional linear cryptanalysis
Information Security and Privacy
2011-07-07Paper
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
Information Security and Privacy
2011-07-07Paper
Cryptanalysis of the Stream Cipher DECIM
Fast Software Encryption
2009-04-02Paper
Resynchronization Attacks on WG and LEX
Fast Software Encryption
2009-04-02Paper
Differential-Linear Attacks Against the Stream Cipher Phelix
Fast Software Encryption
2008-09-16Paper
Decentralized robust \(H_\infty\) output feedback controller2008-04-04Paper
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Cryptanalysis of the Stream Cipher ABC v2
Selected Areas in Cryptography
2007-11-29Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
scientific article; zbMATH DE number 2202215 (Why is no real title available?)2005-09-05Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1980981 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1950339 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950341 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1808261 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1618048 (Why is no real title available?)2002-07-22Paper
scientific article; zbMATH DE number 1618046 (Why is no real title available?)2002-07-16Paper
scientific article; zbMATH DE number 1302789 (Why is no real title available?)2002-06-23Paper
scientific article; zbMATH DE number 1302790 (Why is no real title available?)2002-04-21Paper
scientific article; zbMATH DE number 1942817 (Why is no real title available?)2002-01-01Paper
scientific article; zbMATH DE number 1612504 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1612518 (Why is no real title available?)2001-07-01Paper


Research outcomes over time


This page was built for person: Hongjun Wu