Peng Wang

From MaRDI portal
Person:350984


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A quantum-secure partial parallel MAC QPCBC
Designs, Codes and Cryptography
2024-12-11Paper
Classification of minimal immersions of conformally flat 3-tori and 4-tori into spheres by the first eigenfunctions
Mathematische Annalen
2024-10-28Paper
Surface structured mesh generation system based on symmetry preserving parameterization
International Journal of Wavelets, Multiresolution and Information Processing
2024-08-22Paper
Symmetric elastic wave cloak design for underground protective structures based on multi-center coordinate transformation
Acta Mechanica
2024-05-29Paper
Convolutional neural network based side-channel attacks with customized filters
 
2024-04-19Paper
Quantum attacks on PRFs based on public random permutations
Lecture Notes in Computer Science
2023-08-14Paper
Quantum attacks on Lai-Massey structure
Post-Quantum Cryptography
2023-07-07Paper
A Note on the Security Framework of Two-key DbHtS MACs
 
2022-12-09Paper
Attacks on beyond-birthday-bound MACs in the quantum setting
 
2022-03-22Paper
Ubiquitous weak-key classes of BRW-polynomial function
 
2018-07-17Paper
Related-key almost universal hash functions: definitions, constructions and applications
Fast Software Encryption
2018-05-09Paper
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks
Information Security and Cryptology
2015-12-02Paper
Cryptanalysis of three authenticated encryption schemes for wireless sensor networks
Information Security and Cryptology
2015-12-02Paper
Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
Information Security and Privacy
2015-10-20Paper
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
Lecture Notes in Computer Science
2015-01-16Paper
Attacking and fixing the CS mode
Information and Communications Security
2014-09-29Paper
CBCR: CBC MAC with rotating transformations
Science China Information Sciences
2013-07-03Paper
Collision Attacks on Variant of OCB Mode and Its Series
Information Security and Cryptology
2013-05-28Paper
3kf9: enhancing 3GPP-MAC beyond the birthday bound
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
TrCBC: another look at CBC-MAC
Information Processing Letters
2012-05-04Paper
Polye+CTR: a swiss-army-knife mode for block ciphers
Provable Security
2011-09-16Paper
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
Fast Software Encryption
2010-07-13Paper
Security of Truncated MACs
Information Security and Cryptology
2009-04-29Paper
On the Unprovable Security of 2-Key XCBC
Information Security and Privacy
2008-07-08Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Cryptanalysis of the TAE mode and its improvement
 
2006-05-19Paper


Research outcomes over time


This page was built for person: Peng Wang