Wenling Wu

From MaRDI portal
(Redirected from Person:244675)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Vectorial fast correlation attacks2026-03-31Paper
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes
Designs, Codes and Cryptography
2024-11-04Paper
Yoyo attack on 4-round Lai-Massey scheme with secret round functions
Designs, Codes and Cryptography
2024-08-23Paper
Related-cipher attacks: applications to Ballet and ANT2024-01-11Paper
LLLWBC: a new low-latency light-weight block cipher
Information Security and Cryptology
2023-08-21Paper
Post-quantum security on the Lai-Massey scheme
Designs, Codes and Cryptography
2023-07-28Paper
Improved differential attack on round-reduced LEA
Information Security and Privacy
2023-07-26Paper
Generic construction of Boolean functions with a few Walsh transform values of any possible algebraic degree
Advances in Mathematics of Communications
2023-07-07Paper
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count2023-04-13Paper
Quantum circuit implementations of AES with fewer qubits2023-03-21Paper
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
Quantum Information Processing
2022-12-05Paper
New quantum circuit implementations of SM4 and SM3
Quantum Information Processing
2022-12-05Paper
Some efficient quantum circuit implementations of Camellia
Quantum Information Processing
2022-11-29Paper
Transparency order of \((n, m)\)-functions -- its further characterization and applications2022-07-13Paper
Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA2022-07-06Paper
On characterization of transparency order for \((n, m)\)-functions2022-07-01Paper
A new non-random property of 4.5-round PRINCE2022-03-24Paper
Breaking LWC candidates: sESTATE and Elephant in quantum setting
Designs, Codes and Cryptography
2021-06-24Paper
Lattice-based fault attacks against ECMQV
Constructive Side-Channel Analysis and Secure Design
2020-07-20Paper
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions
Information Sciences
2020-07-02Paper
Coordination of advertising free riding in hybrid channel supply chain
Discrete Dynamics in Nature and Society
2019-02-20Paper
Security of SM4 against (related-key) differential cryptanalysis2018-12-07Paper
Linear regression attack with F-test: a new SCARE technique for secret block ciphers2018-10-26Paper
Security of online AE schemes in RUP setting2018-10-26Paper
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
Fast Software Encryption
2018-05-09Paper
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
Designs, Codes and Cryptography
2018-04-10Paper
Biclique attack of block cipher \texttt{SKINNY}
Information Security and Cryptology
2017-05-05Paper
My traces learn what you did in the dark: recovering secret signals without key guesses
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
New criterion for diffusion property and applications to improved GFS and EGFN
Designs, Codes and Cryptography
2016-10-21Paper
Meet-in-the-middle attack on TWINE block cipher2016-08-10Paper
Constructing lightweight optimal diffusion primitives with Feistel structure
Lecture Notes in Computer Science
2016-05-19Paper
Integral attack against bit-oriented block ciphers
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Two lattice-based differential fault attacks against ECDSA with \(w\)NAF algorithm
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Lecture Notes in Computer Science
2016-05-19Paper
New observations on Piccolo block cipher
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Structural evaluation for generalized Feistel structures and applications to LBlock and TWINE
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
Selected Areas in Cryptography
2015-12-04Paper
LHash: a lightweight hash function
Information Security and Cryptology
2015-12-02Paper
Cryptanalysis of the Round-Reduced GOST Hash Function
Information Security and Cryptology
2015-12-02Paper
The DBlock family of block ciphers
Science China Information Sciences
2015-11-20Paper
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
Frontiers of Computer Science
2015-11-20Paper
General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
First multidimensional cryptanalysis on reduced-round \(\mathrm{PRINCE}_{core}\)
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Reflection Cryptanalysis of PRINCE-Like Ciphers
Fast Software Encryption
2015-09-18Paper
Reflection cryptanalysis of PRINCE-like ciphers
Journal of Cryptology
2015-08-03Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function
Cryptography and Communications
2014-10-08Paper
Attacking and fixing the CS mode
Information and Communications Security
2014-09-29Paper
Differential analysis of the extended generalized Feistel networks
Information Processing Letters
2014-08-28Paper
Improved multidimensional zero-correlation linear cryptanalysis and applications to lblock and TWINE
Information Security and Privacy
2014-07-24Paper
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
Applied Cryptography and Network Security
2014-07-07Paper
Security of the SMS4 block cipher against differential cryptanalysis
Journal of Computer Science and Technology
2014-02-06Paper
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
CBCR: CBC MAC with rotating transformations
Science China Information Sciences
2013-07-03Paper
Improved key recovery attacks on reduced-round Salsa20 and ChaCha
Lecture Notes in Computer Science
2013-06-04Paper
Improved integral attacks on Rijndael2013-04-16Paper
3kf9: enhancing 3GPP-MAC beyond the birthday bound
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
(Pseudo) preimage attack on round-reduced Grøstl hash function and others
Fast Software Encryption
2013-01-08Paper
Cryptanalysis of reduced-round KLEIN block cipher
Information Security and Cryptology
2013-01-07Paper
Preimage Attacks on Step-Reduced SM3 Hash Function
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers
Applied Cryptography and Network Security
2012-09-10Paper
Biclique cryptanalysis of reduced-round Piccolo block cipher
Information Security Practice and Experience
2012-06-29Paper
TrCBC: another look at CBC-MAC
Information Processing Letters
2012-05-04Paper
Polye+CTR: a swiss-army-knife mode for block ciphers
Provable Security
2011-09-16Paper
Hyper-Sbox view of AES-like permutations: a generalized distinguisher
Information Security and Cryptology
2011-07-29Paper
LBlock: a lightweight block cipher
Applied Cryptography and Network Security
2011-06-28Paper
BCBC: a more efficient MAC algorithm
Information Security Practice and Experience
2011-05-19Paper
Near-collisions on the reduced-round compression functions of Skein and BLAKE
Cryptology and Network Security
2010-12-07Paper
Proposition of two cipher structures
Information Security and Cryptology
2010-11-23Paper
Some results on cryptanalysis of SMS4 block cipher
International Journal of Applied Cryptography
2010-09-22Paper
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
Fast Software Encryption
2010-07-13Paper
Cryptanalysis of the LANE hash function
Selected Areas in Cryptography
2009-12-09Paper
The state-of-the-art of research on impossible differential cryptanalysis2009-11-11Paper
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
Selected Areas in Cryptography
2009-11-03Paper
Security of Truncated MACs
Information Security and Cryptology
2009-04-29Paper
Related-key impossible differential attacks on reduced-round AES-2562009-03-06Paper
scientific article; zbMATH DE number 5525643 (Why is no real title available?)2009-03-06Paper
OPMAC: One-Key Poly1305 MAC
Information Security and Cryptology
2009-01-15Paper
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/
IEEE Transactions on Information Theory
2008-12-21Paper
Improved Impossible Differential Attacks on Large-Block Rijndael
Lecture Notes in Computer Science
2008-11-20Paper
Cryptanalysis of Reduced-Round SMS4 Block Cipher
Information Security and Privacy
2008-07-08Paper
On the Unprovable Security of 2-Key XCBC
Information Security and Privacy
2008-07-08Paper
New Results on Impossible Differential Cryptanalysis of Reduced AES
Lecture Notes in Computer Science
2008-05-06Paper
Related-Key Differential-Linear Attacks on Reduced AES-192
Lecture Notes in Computer Science
2008-04-11Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
Selected Areas in Cryptography
2007-11-29Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation
Science in China. Series F
2007-08-31Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Linear cryptanalysis of NUSH block cipher
Science in China. Series F
2007-02-20Paper
Collision attack on reduced-round Camellia
Science in China. Series F
2007-02-20Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Pseudorandomness of Camellia-like scheme
Journal of Computer Science and Technology
2006-10-12Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
scientific article; zbMATH DE number 2222203 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2114007 (Why is no real title available?)2004-11-05Paper
scientific article; zbMATH DE number 1424184 (Why is no real title available?)2000-06-07Paper
scientific article; zbMATH DE number 1185627 (Why is no real title available?)1998-10-25Paper
scientific article; zbMATH DE number 1116620 (Why is no real title available?)1998-02-10Paper
scientific article; zbMATH DE number 1116638 (Why is no real title available?)1997-01-01Paper
scientific article; zbMATH DE number 853817 (Why is no real title available?)1996-07-01Paper
scientific article; zbMATH DE number 613187 (Why is no real title available?)1995-08-24Paper


Research outcomes over time


This page was built for person: Wenling Wu