Wenling Wu

From MaRDI portal
Person:244675

Available identifiers

zbMath Open wu.wenlingMaRDI QIDQ244675

List of research outcomes





PublicationDate of PublicationType
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes2024-11-04Paper
Yoyo attack on 4-round Lai-Massey scheme with secret round functions2024-08-23Paper
Related-cipher attacks: applications to Ballet and ANT2024-01-11Paper
LLLWBC: a new low-latency light-weight block cipher2023-08-21Paper
Post-quantum security on the Lai-Massey scheme2023-07-28Paper
Improved differential attack on round-reduced LEA2023-07-26Paper
Generic construction of Boolean functions with a few Walsh transform values of any possible algebraic degree2023-07-07Paper
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count2023-04-13Paper
Quantum circuit implementations of AES with fewer qubits2023-03-21Paper
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys2022-12-05Paper
New quantum circuit implementations of SM4 and SM32022-12-05Paper
Some efficient quantum circuit implementations of Camellia2022-11-29Paper
Transparency order of \((n, m)\)-functions -- its further characterization and applications2022-07-13Paper
Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA2022-07-06Paper
On characterization of transparency order for \((n, m)\)-functions2022-07-01Paper
A new non-random property of 4.5-round PRINCE2022-03-24Paper
Breaking LWC candidates: sESTATE and Elephant in quantum setting2021-06-24Paper
Lattice-based fault attacks against ECMQV2020-07-20Paper
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions2020-07-02Paper
Coordination of advertising free riding in hybrid channel supply chain2019-02-20Paper
Security of SM4 against (related-key) differential cryptanalysis2018-12-07Paper
Linear regression attack with F-test: a new SCARE technique for secret block ciphers2018-10-26Paper
Security of online AE schemes in RUP setting2018-10-26Paper
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE2018-05-09Paper
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/5122018-04-10Paper
Biclique attack of block cipher \texttt{SKINNY}2017-05-05Paper
My traces learn what you did in the dark: recovering secret signals without key guesses2017-04-12Paper
New criterion for diffusion property and applications to improved GFS and EGFN2016-10-21Paper
Meet-in-the-middle attack on TWINE block cipher2016-08-10Paper
Constructing lightweight optimal diffusion primitives with Feistel structure2016-05-19Paper
Integral attack against bit-oriented block ciphers2016-05-19Paper
Two lattice-based differential fault attacks against ECDSA with \(w\)NAF algorithm2016-05-19Paper
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes2016-05-19Paper
New observations on Piccolo block cipher2016-04-08Paper
Structural evaluation for generalized Feistel structures and applications to LBlock and TWINE2016-01-12Paper
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions2015-12-04Paper
LHash: a lightweight hash function2015-12-02Paper
Cryptanalysis of the Round-Reduced GOST Hash Function2015-12-02Paper
The DBlock family of block ciphers2015-11-20Paper
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes2015-11-20Paper
General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher2015-10-16Paper
First multidimensional cryptanalysis on reduced-round \(\mathrm{PRINCE}_{core}\)2015-10-16Paper
Reflection Cryptanalysis of PRINCE-Like Ciphers2015-09-18Paper
Reflection cryptanalysis of PRINCE-like ciphers2015-08-03Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function2014-10-08Paper
Attacking and fixing the CS mode2014-09-29Paper
Differential analysis of the extended generalized Feistel networks2014-08-28Paper
Improved multidimensional zero-correlation linear cryptanalysis and applications to lblock and TWINE2014-07-24Paper
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro2014-07-07Paper
Security of the SMS4 block cipher against differential cryptanalysis2014-02-06Paper
Leaked-state-forgery attack against the authenticated encryption algorithm ALE2013-12-10Paper
CBCR: CBC MAC with rotating transformations2013-07-03Paper
Improved key recovery attacks on reduced-round Salsa20 and ChaCha2013-06-04Paper
Improved integral attacks on Rijndael2013-04-16Paper
3kf9: enhancing 3GPP-MAC beyond the birthday bound2013-03-19Paper
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks2013-03-19Paper
(Pseudo) preimage attack on round-reduced Grøstl hash function and others2013-01-08Paper
Cryptanalysis of reduced-round KLEIN block cipher2013-01-07Paper
Preimage Attacks on Step-Reduced SM3 Hash Function2012-11-01Paper
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers2012-09-10Paper
Biclique cryptanalysis of reduced-round Piccolo block cipher2012-06-29Paper
TrCBC: another look at CBC-MAC2012-05-04Paper
Polye+CTR: a swiss-army-knife mode for block ciphers2011-09-16Paper
Hyper-Sbox view of AES-like permutations: a generalized distinguisher2011-07-29Paper
LBlock: a lightweight block cipher2011-06-28Paper
BCBC: a more efficient MAC algorithm2011-05-19Paper
Near-collisions on the reduced-round compression functions of Skein and BLAKE2010-12-07Paper
Proposition of two cipher structures2010-11-23Paper
Some results on cryptanalysis of SMS4 block cipher2010-09-22Paper
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited2010-07-13Paper
Cryptanalysis of the LANE hash function2009-12-09Paper
The state-of-the-art of research on impossible differential cryptanalysis2009-11-11Paper
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia2009-11-03Paper
Security of Truncated MACs2009-04-29Paper
Related-key impossible differential attacks on reduced-round AES-2562009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110022009-03-06Paper
OPMAC: One-Key Poly1305 MAC2009-01-15Paper
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/2008-12-21Paper
Improved Impossible Differential Attacks on Large-Block Rijndael2008-11-20Paper
Cryptanalysis of Reduced-Round SMS4 Block Cipher2008-07-08Paper
On the Unprovable Security of 2-Key XCBC2008-07-08Paper
New Results on Impossible Differential Cryptanalysis of Reduced AES2008-05-06Paper
Related-Key Differential-Linear Attacks on Reduced AES-1922008-04-11Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation2008-04-11Paper
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-1922007-11-29Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation2007-08-31Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Applied Cryptography and Network Security2007-05-02Paper
Linear cryptanalysis of NUSH block cipher2007-02-20Paper
Collision attack on reduced-round Camellia2007-02-20Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Pseudorandomness of Camellia-like scheme2006-10-12Paper
Selected Areas in Cryptography2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q57010012005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q48257492004-11-05Paper
https://portal.mardi4nfdi.de/entity/Q49453822000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q38384461998-10-25Paper
https://portal.mardi4nfdi.de/entity/Q43762921998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q43763151997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48691001996-07-01Paper
https://portal.mardi4nfdi.de/entity/Q43003481995-08-24Paper

Research outcomes over time

This page was built for person: Wenling Wu