Wenling Wu

From MaRDI portal
Person:244675

Available identifiers

zbMath Open wu.wenlingMaRDI QIDQ244675

List of research outcomes





PublicationDate of PublicationType
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes2024-11-04Paper
Yoyo attack on 4-round Lai-Massey scheme with secret round functions2024-08-23Paper
Related-cipher attacks: applications to Ballet and ANT2024-01-11Paper
LLLWBC: a new low-latency light-weight block cipher2023-08-21Paper
Post-quantum security on the Lai-Massey scheme2023-07-28Paper
Improved differential attack on round-reduced LEA2023-07-26Paper
Generic construction of Boolean functions with a few Walsh transform values of any possible algebraic degree2023-07-07Paper
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count2023-04-13Paper
Quantum circuit implementations of AES with fewer qubits2023-03-21Paper
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys2022-12-05Paper
New quantum circuit implementations of SM4 and SM32022-12-05Paper
Some efficient quantum circuit implementations of Camellia2022-11-29Paper
Transparency order of \((n, m)\)-functions -- its further characterization and applications2022-07-13Paper
Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA2022-07-06Paper
On characterization of transparency order for \((n, m)\)-functions2022-07-01Paper
A new non-random property of 4.5-round PRINCE2022-03-24Paper
Breaking LWC candidates: sESTATE and Elephant in quantum setting2021-06-24Paper
Lattice-Based Fault Attacks Against ECMQV2020-07-20Paper
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions2020-07-02Paper
Coordination of advertising free riding in hybrid channel supply chain2019-02-20Paper
Security of SM4 against (related-key) differential cryptanalysis2018-12-07Paper
Linear regression attack with F-test: a new SCARE technique for secret block ciphers2018-10-26Paper
Security of online AE schemes in RUP setting2018-10-26Paper
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE2018-05-09Paper
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/5122018-04-10Paper
Biclique Attack of Block Cipher SKINNY2017-05-05Paper
My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses2017-04-12Paper
New criterion for diffusion property and applications to improved GFS and EGFN2016-10-21Paper
https://portal.mardi4nfdi.de/entity/Q29932142016-08-10Paper
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure2016-05-19Paper
Integral Attack Against Bit-Oriented Block Ciphers2016-05-19Paper
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm2016-05-19Paper
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes2016-05-19Paper
New Observations on Piccolo Block Cipher2016-04-08Paper
Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE2016-01-12Paper
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions2015-12-04Paper
LHash: A Lightweight Hash Function2015-12-02Paper
Cryptanalysis of the Round-Reduced GOST Hash Function2015-12-02Paper
The DBlock family of block ciphers2015-11-20Paper
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes2015-11-20Paper
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher2015-10-16Paper
First Multidimensional Cryptanalysis on Reduced-Round $$\mathrm{PRINCE }_{core}$$2015-10-16Paper
Reflection Cryptanalysis of PRINCE-Like Ciphers2015-09-18Paper
Reflection cryptanalysis of PRINCE-like ciphers2015-08-03Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function2014-10-08Paper
Attacking and Fixing the CS Mode2014-09-29Paper
Differential analysis of the extended generalized Feistel networks2014-08-28Paper
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE2014-07-24Paper
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro2014-07-07Paper
Security of the SMS4 block cipher against differential cryptanalysis2014-02-06Paper
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE2013-12-10Paper
CBCR: CBC MAC with rotating transformations2013-07-03Paper
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha2013-06-04Paper
https://portal.mardi4nfdi.de/entity/Q49150202013-04-16Paper
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound2013-03-19Paper
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks2013-03-19Paper
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others2013-01-08Paper
Cryptanalysis of Reduced-Round KLEIN Block Cipher2013-01-07Paper
Preimage Attacks on Step-Reduced SM3 Hash Function2012-11-01Paper
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers2012-09-10Paper
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher2012-06-29Paper
TrCBC: another look at CBC-MAC2012-05-04Paper
PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers2011-09-16Paper
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher2011-07-29Paper
LBlock: A Lightweight Block Cipher2011-06-28Paper
BCBC: A More Efficient MAC Algorithm2011-05-19Paper
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE2010-12-07Paper
Proposition of Two Cipher Structures2010-11-23Paper
Some results on cryptanalysis of SMS4 block cipher2010-09-22Paper
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited2010-07-13Paper
Cryptanalysis of the LANE Hash Function2009-12-09Paper
The state-of-the-art of research on impossible differential cryptanalysis2009-11-11Paper
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia2009-11-03Paper
Security of Truncated MACs2009-04-29Paper
Related-key impossible differential attacks on reduced-round AES-2562009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110022009-03-06Paper
OPMAC: One-Key Poly1305 MAC2009-01-15Paper
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/2008-12-21Paper
Improved Impossible Differential Attacks on Large-Block Rijndael2008-11-20Paper
Cryptanalysis of Reduced-Round SMS4 Block Cipher2008-07-08Paper
On the Unprovable Security of 2-Key XCBC2008-07-08Paper
New Results on Impossible Differential Cryptanalysis of Reduced AES2008-05-06Paper
Related-Key Differential-Linear Attacks on Reduced AES-1922008-04-11Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation2008-04-11Paper
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-1922007-11-29Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation2007-08-31Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Applied Cryptography and Network Security2007-05-02Paper
Linear cryptanalysis of NUSH block cipher2007-02-20Paper
Collision attack on reduced-round Camellia2007-02-20Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Pseudorandomness of Camellia-like scheme2006-10-12Paper
Selected Areas in Cryptography2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q57010012005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q48257492004-11-05Paper
https://portal.mardi4nfdi.de/entity/Q49453822000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q38384461998-10-25Paper
https://portal.mardi4nfdi.de/entity/Q43762921998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q43763151997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48691001996-07-01Paper
https://portal.mardi4nfdi.de/entity/Q43003481995-08-24Paper

Research outcomes over time

This page was built for person: Wenling Wu