Lei Wang

From MaRDI portal
Person:892389

Available identifiers

zbMath Open wang.lei.7MaRDI QIDQ892389

List of research outcomes





PublicationDate of PublicationType
Forgery attacks on several beyond-birthday-bound secure MACs2024-08-30Paper
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers2024-03-18Paper
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls2023-12-08Paper
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework2023-09-07Paper
A New General Method of Searching for Cubes in Cube Attacks2022-12-21Paper
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting2022-04-22Paper
Tweaking key-alternating Feistel block ciphers2021-02-23Paper
Generic attacks on hash combiners2020-06-15Paper
Improved indifferentiability security bound for the prefix-free Merkle-Damgård hash function2019-10-31Paper
Beyond-birthday secure domain-preserving PRFs from a single permutation2019-05-24Paper
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security2018-12-20Paper
Length-preserving encryption based on single-key tweakable block cipher2018-11-07Paper
Functional graph revisited: updates on (second) preimage attacks on hash combiners2017-11-15Paper
How to build fully secure tweakable blockciphers from classical blockciphers2017-02-01Paper
Analysis of the CAESAR candidate silver2016-05-19Paper
Practical Cryptanalysis of PAES2016-04-13Paper
The usage of counter revisited: second-preimage attack on new Russian standardized hash function2016-04-13Paper
Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$2016-04-08Paper
Known-key distinguisher on full \(\mathtt{PRESENT}\)2015-12-10Paper
Meet-in-the-middle technique for integral attacks against Feistel ciphers2015-12-04Paper
The parallel-cut meet-in-the-middle attack2015-11-19Paper
Bitwise partial-sum on HIGHT: a new tool for integral analysis against ARX designs2015-10-16Paper
Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD52015-10-01Paper
The sum can be weaker than each part2015-09-30Paper
Cryptanalysis of Round-Reduced $$\mathtt{LED}$$2015-09-18Paper
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds2015-09-18Paper
Security analysis of \textsc{Prince}2015-09-18Paper
Cryptanalysis of JAMBU2015-09-18Paper
Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs2015-09-18Paper
Message extension attack against authenticated encryptions: application to PANDA2015-02-10Paper
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks2014-10-14Paper
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC2014-09-15Paper
Updates on generic attacks against HMAC and NMAC2014-08-07Paper
Generic universal forgery attack on iterative hash-based MACs2014-05-27Paper
Analysis of BLAKE22014-03-28Paper
An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl2014-03-28Paper
Improved Cryptanalysis of Reduced RIPEMD-1602013-12-10Paper
Cryptanalysis of HMAC/NMAC-Whirlpool2013-12-10Paper
New generic attacks against hash-based MACs2013-12-10Paper
Comprehensive study of integral analysis on 22-round LBlock2013-06-04Paper
Boomerang distinguishers for full HAS-160 compression function2013-04-04Paper
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function2013-04-04Paper
Generic Related-Key Attacks for HMAC2013-03-19Paper
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks2013-03-19Paper
Three-subset meet-in-the-middle attack on reduced XTEA2012-07-23Paper
New truncated differential cryptanalysis on 3D block cipher2012-06-29Paper
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model2011-09-16Paper
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach2011-02-11Paper
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl2010-12-07Paper
Finding preimages of Tiger up to 23 steps2010-07-13Paper
Preimages for step-reduced SHA-22009-12-15Paper
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!2009-12-15Paper
Bit-Free Collision: Application to APOP Attack2009-10-28Paper
New Message Difference for MD42008-09-16Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function2008-06-13Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack2008-04-24Paper
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD52008-04-15Paper

Research outcomes over time

This page was built for person: Lei Wang