Hongjun Wu

From MaRDI portal
Person:1746849



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved differential cryptanalysis on generalized Feistel schemes2018-04-26Paper
Cryptanalysis of Simpira v22017-08-25Paper
Cryptanalysis of the authenticated encryption algorithm COFFE
Lecture Notes in Computer Science
2016-05-19Paper
Improving the biclique cryptanalysis of AES
Information Security and Privacy
2015-10-20Paper
AEGIS: a fast authenticated encryption algorithm
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Differential-linear cryptanalysis of ICEPOLE
Fast Software Encryption
2015-09-18Paper
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Differential attacks against stream cipher ZUC
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Improving the Algorithm 2 in multidimensional linear cryptanalysis
Information Security and Privacy
2011-07-07Paper
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
Information Security and Privacy
2011-07-07Paper
Cryptanalysis of the Stream Cipher DECIM
Fast Software Encryption
2009-04-02Paper
Resynchronization Attacks on WG and LEX
Fast Software Encryption
2009-04-02Paper
Differential-Linear Attacks Against the Stream Cipher Phelix
Fast Software Encryption
2008-09-16Paper
Decentralized robust \(H_\infty\) output feedback controller2008-04-04Paper
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Cryptanalysis of the Stream Cipher ABC v2
Selected Areas in Cryptography
2007-11-29Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
scientific article; zbMATH DE number 2202215 (Why is no real title available?)2005-09-05Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1980981 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1950339 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950341 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1808261 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1618048 (Why is no real title available?)2002-07-22Paper
scientific article; zbMATH DE number 1618046 (Why is no real title available?)2002-07-16Paper
scientific article; zbMATH DE number 1302789 (Why is no real title available?)2002-06-23Paper
scientific article; zbMATH DE number 1302790 (Why is no real title available?)2002-04-21Paper
scientific article; zbMATH DE number 1942817 (Why is no real title available?)2002-01-01Paper
scientific article; zbMATH DE number 1612504 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1612518 (Why is no real title available?)2001-07-01Paper


Research outcomes over time


This page was built for person: Hongjun Wu