Peng Wang

From MaRDI portal
Person:350984

Available identifiers

zbMath Open wang.peng.4MaRDI QIDQ350984

List of research outcomes





PublicationDate of PublicationType
A quantum-secure partial parallel MAC QPCBC2024-12-11Paper
Classification of minimal immersions of conformally flat 3-tori and 4-tori into spheres by the first eigenfunctions2024-10-28Paper
Surface structured mesh generation system based on symmetry preserving parameterization2024-08-22Paper
Symmetric elastic wave cloak design for underground protective structures based on multi-center coordinate transformation2024-05-29Paper
Convolutional neural network based side-channel attacks with customized filters2024-04-19Paper
Quantum attacks on PRFs based on public random permutations2023-08-14Paper
Quantum attacks on Lai-Massey structure2023-07-07Paper
A Note on the Security Framework of Two-key DbHtS MACs2022-12-09Paper
Attacks on beyond-birthday-bound MACs in the quantum setting2022-03-22Paper
Ubiquitous weak-key classes of BRW-polynomial function2018-07-17Paper
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications2018-05-09Paper
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks2015-12-02Paper
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks2015-12-02Paper
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes2015-10-20Paper
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers2015-01-16Paper
Attacking and Fixing the CS Mode2014-09-29Paper
CBCR: CBC MAC with rotating transformations2013-07-03Paper
Collision Attacks on Variant of OCB Mode and Its Series2013-05-28Paper
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound2013-03-19Paper
TrCBC: another look at CBC-MAC2012-05-04Paper
PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers2011-09-16Paper
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited2010-07-13Paper
Security of Truncated MACs2009-04-29Paper
On the Unprovable Security of 2-Key XCBC2008-07-08Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation2008-04-11Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
https://portal.mardi4nfdi.de/entity/Q54695632006-05-19Paper

Research outcomes over time

This page was built for person: Peng Wang