Peng Wang

From MaRDI portal
Person:350984

Available identifiers

zbMath Open wang.peng.4MaRDI QIDQ350984

List of research outcomes





PublicationDate of PublicationType
A quantum-secure partial parallel MAC QPCBC2024-12-11Paper
Classification of minimal immersions of conformally flat 3-tori and 4-tori into spheres by the first eigenfunctions2024-10-28Paper
Surface structured mesh generation system based on symmetry preserving parameterization2024-08-22Paper
Symmetric elastic wave cloak design for underground protective structures based on multi-center coordinate transformation2024-05-29Paper
Convolutional neural network based side-channel attacks with customized filters2024-04-19Paper
Quantum attacks on PRFs based on public random permutations2023-08-14Paper
Quantum attacks on Lai-Massey structure2023-07-07Paper
A Note on the Security Framework of Two-key DbHtS MACs2022-12-09Paper
Attacks on beyond-birthday-bound MACs in the quantum setting2022-03-22Paper
Ubiquitous weak-key classes of BRW-polynomial function2018-07-17Paper
Related-key almost universal hash functions: definitions, constructions and applications2018-05-09Paper
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks2015-12-02Paper
Cryptanalysis of three authenticated encryption schemes for wireless sensor networks2015-12-02Paper
Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes2015-10-20Paper
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers2015-01-16Paper
Attacking and fixing the CS mode2014-09-29Paper
CBCR: CBC MAC with rotating transformations2013-07-03Paper
Collision Attacks on Variant of OCB Mode and Its Series2013-05-28Paper
3kf9: enhancing 3GPP-MAC beyond the birthday bound2013-03-19Paper
TrCBC: another look at CBC-MAC2012-05-04Paper
Polye+CTR: a swiss-army-knife mode for block ciphers2011-09-16Paper
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited2010-07-13Paper
Security of Truncated MACs2009-04-29Paper
On the Unprovable Security of 2-Key XCBC2008-07-08Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation2008-04-11Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Cryptanalysis of the TAE mode and its improvement2006-05-19Paper

Research outcomes over time

This page was built for person: Peng Wang