BibTeX records: Wenling Wu

download as .bib file

@article{DBLP:journals/cj/ZhangZWMZ24,
  author       = {Li Zhang and
                  Yu Zhang and
                  Wenling Wu and
                  Yongxia Mao and
                  Yafei Zheng},
  title        = {Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers:
                  Application To uBlock And Midori},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {674--687},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad009},
  doi          = {10.1093/COMJNL/BXAD009},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangZWMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiW23,
  author       = {Xiaodan Li and
                  Wenling Wu},
  title        = {Constructing Binary Matrices with Good Implementation Properties for
                  Low-Latency Block Ciphers based on Lai-Massey Structure},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {1},
  pages        = {160--173},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxab151},
  doi          = {10.1093/COMJNL/BXAB151},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangWZW23,
  author       = {Li Zhang and
                  Wenling Wu and
                  Yafei Zheng and
                  Bolin Wang},
  title        = {Cryptanalysis on Reduced-Round 3D and Saturnin},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {4},
  pages        = {1017--1029},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac116},
  doi          = {10.1093/COMJNL/BXAC116},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangWZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangWSW23,
  author       = {Zhongya Zhang and
                  Wenling Wu and
                  Han Sui and
                  Bolin Wang},
  title        = {Post-quantum security on the Lai-Massey scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2687--2704},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01225-5},
  doi          = {10.1007/S10623-023-01225-5},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangWSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangW23,
  author       = {Bolin Wang and
                  Wenling Wu},
  title        = {New Key-Independent Structural Properties of AES-Like Permutations},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {1},
  pages        = {575--583},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3202044},
  doi          = {10.1109/JIOT.2022.3202044},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaoWZ023,
  author       = {Yongxia Mao and
                  Wenling Wu and
                  Yafei Zheng and
                  Lei Zhang},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Related-Cipher Attacks: Applications to Ballet and {ANT}},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {109--123},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_6},
  doi          = {10.1007/978-3-031-35486-1\_6},
  timestamp    = {Wed, 21 Jun 2023 16:37:47 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaoWZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengJHZWQZZST23,
  author       = {Dengguo Feng and
                  Lin Jiao and
                  Yonglin Hao and
                  Qunxiong Zheng and
                  Wenling Wu and
                  Wenfeng Qi and
                  Lei Zhang and
                  Liting Zhang and
                  Siwei Sun and
                  Tian Tian},
  title        = {{LOL:} {A} Highly Flexible Framework for Designing Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1235},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1235},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengJHZWQZZST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/JinDWC22,
  author       = {Wengang Jin and
                  Xiaoni Du and
                  Wenling Wu and
                  Zhixiong Chen},
  title        = {Generic Construction of Boolean Functions with {A} Few Walsh Transform
                  Values of Any Possible Algebraic Degree},
  journal      = {Adv. Math. Commun.},
  volume       = {16},
  number       = {4},
  pages        = {811--832},
  year         = {2022},
  url          = {https://doi.org/10.3934/amc.2022050},
  doi          = {10.3934/AMC.2022050},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amco/JinDWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZouWSLLW22,
  author       = {Jian Zou and
                  Zihao Wei and
                  Siwei Sun and
                  Yiyuan Luo and
                  Qian Liu and
                  Wenling Wu},
  title        = {Some efficient quantum circuit implementations of Camellia},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {4},
  pages        = {131},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03477-x},
  doi          = {10.1007/S11128-022-03477-X},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZouWSLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZouLWLLW22,
  author       = {Jian Zou and
                  Liji Li and
                  Zihao Wei and
                  Yiyuan Luo and
                  Qian Liu and
                  Wenling Wu},
  title        = {New quantum circuit implementations of {SM4} and {SM3}},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {5},
  pages        = {181},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03518-5},
  doi          = {10.1007/S11128-022-03518-5},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZouLWLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangWSL22,
  author       = {Zhongya Zhang and
                  Wenling Wu and
                  Han Sui and
                  Xiaodan Li},
  title        = {Quantum generic attacks on key-alternating Feistel ciphers for shorter
                  keys},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {6},
  pages        = {219},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03505-w},
  doi          = {10.1007/S11128-022-03505-W},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangWSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ZhengWCCCZW22,
  author       = {Jian Zheng and
                  Jianfeng Wang and
                  Yanping Chen and
                  Shuping Chen and
                  Jingjin Chen and
                  Wenlong Zhong and
                  Wenling Wu},
  title        = {Effective approximation of high-dimensional space using neural networks},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {3},
  pages        = {4377--4397},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11227-021-04038-2},
  doi          = {10.1007/S11227-021-04038-2},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/ZhengWCCCZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangWZ22,
  author       = {Yuhan Zhang and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Improved Differential Attack on Round-Reduced {LEA}},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {67--84},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_4},
  doi          = {10.1007/978-3-031-22301-3\_4},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaoWWZ22,
  author       = {Yongxia Mao and
                  Wenling Wu and
                  Bolin Wang and
                  Li Zhang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Improved Division Property for Ciphers with Complex Linear Layers},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {106--124},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_6},
  doi          = {10.1007/978-3-031-22301-3\_6},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaoWWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangWZZW22,
  author       = {Lei Zhang and
                  Ruichen Wu and
                  Yuhan Zhang and
                  Yafei Zheng and
                  Wenling Wu},
  editor       = {Yi Deng and
                  Moti Yung},
  title        = {{LLLWBC:} {A} New Low-Latency Light-Weight Block Cipher},
  booktitle    = {Information Security and Cryptology - 18th International Conference,
                  Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13837},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26553-2\_2},
  doi          = {10.1007/978-3-031-26553-2\_2},
  timestamp    = {Tue, 13 Jun 2023 12:14:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangWZZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CaoSCCFW22,
  author       = {Weiqiong Cao and
                  Hongsong Shi and
                  Hua Chen and
                  Jiazhe Chen and
                  Limin Fan and
                  Wenling Wu},
  editor       = {Steven D. Galbraith},
  title        = {Lattice-Based Fault Attacks on Deterministic Signature Schemes of
                  {ECDSA} and EdDSA},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {169--195},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_8},
  doi          = {10.1007/978-3-030-95312-6\_8},
  timestamp    = {Thu, 03 Feb 2022 09:28:38 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CaoSCCFW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangWM22,
  author       = {Li Zhang and
                  Wenling Wu and
                  Yongxia Mao},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {61--77},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_4},
  doi          = {10.1007/978-3-031-29371-9\_4},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiWHGW21,
  author       = {Tairong Shi and
                  Wenling Wu and
                  Bin Hu and
                  Jie Guan and
                  Sengpeng Wang},
  title        = {Breaking {LWC} candidates: sESTATE and Elephant in quantum setting},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1405--1432},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00875-7},
  doi          = {10.1007/S10623-021-00875-7},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiWHGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/ZhengWCCCZW21,
  author       = {Jian Zheng and
                  Jianfeng Wang and
                  Yanping Chen and
                  Shuping Chen and
                  Jingjin Chen and
                  Wenlong Zhong and
                  Wenling Wu},
  title        = {Neural networks trained with high-dimensional functions approximation
                  data in high-dimensional space},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {41},
  number       = {2},
  pages        = {3739--3750},
  year         = {2021},
  url          = {https://doi.org/10.3233/JIFS-211417},
  doi          = {10.3233/JIFS-211417},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/ZhengWCCCZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiW21,
  author       = {Xiaodan Li and
                  Wenling Wu},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Constructions of Iterative Near-MDS Matrices with the Lowest {XOR}
                  Count},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {132--150},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_7},
  doi          = {10.1007/978-3-030-90567-5\_7},
  timestamp    = {Mon, 08 Nov 2021 16:43:35 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhouWZLPW21,
  author       = {Yu Zhou and
                  Yongzhuang Wei and
                  Hailong Zhang and
                  Luyang Li and
                  Enes Pasalic and
                  Wenling Wu},
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {On Characterization of Transparency Order for (n, m)-functions},
  booktitle    = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  pages        = {351--370},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2\_19},
  doi          = {10.1007/978-3-030-88323-2\_19},
  timestamp    = {Tue, 19 Oct 2021 18:32:12 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhouWZLPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhouWZLPW21,
  author       = {Yu Zhou and
                  Yongzhuang Wei and
                  Hailong Zhang and
                  Luyang Li and
                  Enes Pasalic and
                  Wenling Wu},
  editor       = {Joseph K. Liu and
                  Sokratis K. Katsikas and
                  Weizhi Meng and
                  Willy Susilo and
                  Rolly Intan},
  title        = {Transparency Order of (n, m)-Functions - Its Further Characterization
                  and Applications},
  booktitle    = {Information Security - 24th International Conference, {ISC} 2021,
                  Virtual Event, November 10-12, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13118},
  pages        = {139--157},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91356-4\_8},
  doi          = {10.1007/978-3-030-91356-4\_8},
  timestamp    = {Fri, 03 Dec 2021 17:36:27 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ZhouWZLPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZouWSLW20,
  author       = {Jian Zou and
                  Zihao Wei and
                  Siwei Sun and
                  Ximeng Liu and
                  Wenling Wu},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Quantum Circuit Implementations of {AES} with Fewer Qubits},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {697--726},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_24},
  doi          = {10.1007/978-3-030-64834-3\_24},
  timestamp    = {Thu, 10 Dec 2020 10:09:50 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZouWSLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangSWZ20,
  author       = {Bolin Wang and
                  Chan Song and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Deukjo Hong},
  title        = {A New Non-random Property of 4.5-Round {PRINCE}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2020 - 23rd International
                  Conference, Seoul, South Korea, December 2-4, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12593},
  pages        = {199--212},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68890-5\_11},
  doi          = {10.1007/978-3-030-68890-5\_11},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/WangSWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2020,
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4},
  doi          = {10.1007/978-3-030-62576-4},
  isbn         = {978-3-030-62575-7},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoSCXLFW20,
  author       = {Weiqiong Cao and
                  Hongsong Shi and
                  Hua Chen and
                  Wei Xi and
                  Haoyuan Li and
                  Limin Fan and
                  Wenling Wu},
  title        = {Lattice-based Fault Attacks against Deterministic Signatures {ECDSA}
                  and EdDSA},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {803},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/803},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoSCXLFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhengW19,
  author       = {Yafei Zheng and
                  Wenling Wu},
  title        = {On the extension and security of key schedule of {GOST}},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {125--132},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5291},
  doi          = {10.1049/IET-IFS.2018.5291},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhengW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiWZZ19,
  author       = {Lingchen Li and
                  Wenling Wu and
                  Lei Zhang and
                  Yafei Zheng},
  title        = {New method to describe the differential distribution table for large
                  S-boxes in {MILP} and its application},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {479--485},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5284},
  doi          = {10.1049/IET-IFS.2018.5284},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiWZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWZ019,
  author       = {Lingchen Li and
                  Wenling Wu and
                  Yafei Zheng and
                  Lei Zhang},
  title        = {The Relationship between the Construction and Solution of the {MILP}
                  Models and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZouLDWD19,
  author       = {Jian Zou and
                  Yongyang Liu and
                  Chen Dong and
                  Wenling Wu and
                  Le Dong},
  title        = {Observations on the Quantum Circuit of the SBox of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1245},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZouLDWD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinW18,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256
                  and Kalyna-256/512},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {721--741},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0353-5},
  doi          = {10.1007/S10623-017-0353-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZouDW18,
  author       = {Jian Zou and
                  Le Dong and
                  Wenling Wu},
  title        = {New algorithms for the unbalanced generalised birthday problem},
  journal      = {{IET} Inf. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {527--533},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ifs.2017.0495},
  doi          = {10.1049/IET-IFS.2017.0495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZouDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WeiYWP18,
  author       = {Yongzhuang Wei and
                  Tao Ye and
                  Wenling Wu and
                  Enes Pasalic},
  title        = {Generalized Nonlinear Invariant Attack and a New Design Criterion
                  for Round Constants},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {62--79},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.62-79},
  doi          = {10.13154/TOSC.V2018.I4.62-79},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/WeiYWP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CaoCFFW18,
  author       = {Weiqiong Cao and
                  Hua Chen and
                  Jingyi Feng and
                  Limin Fan and
                  Wenling Wu},
  editor       = {Junfeng Fan and
                  Benedikt Gierlichs},
  title        = {Lattice-Based Fault Attacks Against {ECMQV}},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 9th International
                  Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10815},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89641-0\_6},
  doi          = {10.1007/978-3-319-89641-0\_6},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CaoCFFW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhangW17,
  author       = {Lei Zhang and
                  Wenling Wu},
  title        = {Analysis of permutation choices for enhanced generalised Feistel structure
                  with SP-type round function},
  journal      = {{IET} Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {121--128},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0433},
  doi          = {10.1049/IET-IFS.2015.0433},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhangW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WeiPZWW17,
  author       = {Yongzhuang Wei and
                  Enes Pasalic and
                  Fengrong Zhang and
                  Wenling Wu and
                  Cheng{-}Xiang Wang},
  title        = {New constructions of resilient functions with strictly almost optimal
                  nonlinearity via non-overlap spectra functions},
  journal      = {Inf. Sci.},
  volume       = {415},
  pages        = {377--396},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2017.06.036},
  doi          = {10.1016/J.INS.2017.06.036},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WeiPZWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LinW17,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Meet-in-the-Middle Attacks on Reduced-Round Midori64},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {215--239},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.215-239},
  doi          = {10.13154/TOSC.V2017.I1.215-239},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LinW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoLGWL17,
  author       = {Zhiyuan Guo and
                  Renzhang Liu and
                  Si Gao and
                  Wenling Wu and
                  Dongdai Lin},
  title        = {Direct Construction of Optimal Rotational-XOR Diffusion Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {169--187},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.169-187},
  doi          = {10.13154/TOSC.V2017.I4.169-187},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoLGWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GaoCWFCM17,
  author       = {Si Gao and
                  Hua Chen and
                  Wenling Wu and
                  Limin Fan and
                  Weiqiong Cao and
                  Xiangliang Ma},
  editor       = {Helena Handschuh},
  title        = {My Traces Learn What You Did in the Dark: Recovering Secret Signals
                  Without Key Guesses},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_21},
  doi          = {10.1007/978-3-319-52153-4\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GaoCWFCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiWZ17a,
  author       = {Lingchen Li and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Improved Automatic Search Tool for Bit-Oriented Block Ciphers and
                  Its Applications},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {502--508},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_43},
  doi          = {10.1007/978-3-319-89500-0\_43},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiWZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LinWZ17,
  author       = {Li Lin and
                  Wenling Wu and
                  Yafei Zheng},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Improved Automatic Search Tool for Related-Key Differential Characteristics
                  on Byte-Oriented Block Ciphers},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {58--76},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_4},
  doi          = {10.1007/978-3-319-69659-1\_4},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/LinWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangW16,
  author       = {Yanfeng Wang and
                  Wenling Wu},
  title        = {New criterion for diffusion property and applications to improved
                  {GFS} and {EGFN}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {81},
  number       = {3},
  pages        = {393--412},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0161-8},
  doi          = {10.1007/S10623-015-0161-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/YaoZW16,
  author       = {Yuan Yao and
                  Bin Zhang and
                  Wenling Wu},
  title        = {Utilizing Probabilistic Linear Equations in Cube Attacks},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {31},
  number       = {2},
  pages        = {317--325},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11390-016-1629-3},
  doi          = {10.1007/S11390-016-1629-3},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/YaoZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoWLZ16,
  author       = {Zhiyuan Guo and
                  Wenling Wu and
                  Renzhang Liu and
                  Liting Zhang},
  title        = {Multi-key Analysis of Tweakable Even-Mansour with Applications to
                  Minalpher and {OPP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {288--306},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.288-306},
  doi          = {10.13154/TOSC.V2016.I2.288-306},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoWLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GaoCWFFM16,
  author       = {Si Gao and
                  Hua Chen and
                  Wenling Wu and
                  Limin Fan and
                  Jingyi Feng and
                  Xiangliang Ma},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Linear Regression Attack with F-test: {A} New {SCARE} Technique for
                  Secret Block Ciphers},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {3--18},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_1},
  doi          = {10.1007/978-3-319-48965-0\_1},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GaoCWFFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhengW16,
  author       = {Yafei Zheng and
                  Wenling Wu},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Biclique Attack of Block Cipher {SKINNY}},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_1},
  doi          = {10.1007/978-3-319-54705-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhengW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangW16,
  author       = {Yanfeng Wang and
                  Wenling Wu},
  editor       = {Kazue Sako},
  title        = {New Observations on Piccolo Block Cipher},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {378--393},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_22},
  doi          = {10.1007/978-3-319-29485-8\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LinWZ16,
  author       = {Li Lin and
                  Wenling Wu and
                  Yafei Zheng},
  editor       = {Thomas Peyrin},
  title        = {Automatic Search for Key-Bridging Technique: Applications to LBlock
                  and {TWINE}},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_13},
  doi          = {10.1007/978-3-662-52993-5\_13},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LinWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangWZ16,
  author       = {Jian Zhang and
                  Wenling Wu and
                  Yafei Zheng},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Security of {SM4} Against (Related-Key) Differential Cryptanalysis},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {65--78},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_5},
  doi          = {10.1007/978-3-319-49151-6\_5},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangWZ16a,
  author       = {Jian Zhang and
                  Wenling Wu and
                  Yafei Zheng},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Collision Attacks on {CAESAR} Second-Round Candidate: ELmD},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {122--136},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_9},
  doi          = {10.1007/978-3-319-49151-6\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangWZ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangW16,
  author       = {Huiling Zhang and
                  Wenling Wu},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Structural Evaluation for Simon-Like Designs Against Integral Attack},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {194--208},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_14},
  doi          = {10.1007/978-3-319-49151-6\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinWZ16,
  author       = {Li Lin and
                  Wenling Wu and
                  Yafei Zheng},
  title        = {Automatic Search for Key-Bridging Technique: Applications to LBlock
                  and {TWINE} (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/414},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinW16,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256
                  and Kalyna-256/512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/722},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLWL16,
  author       = {Zhiyuan Guo and
                  Renzhang Liu and
                  Wenling Wu and
                  Dongdai Lin},
  title        = {Direct Construction of Lightweight Rotational-XOR {MDS} Diffusion
                  Layers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1036},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoCWFCM16,
  author       = {Si Gao and
                  Hua Chen and
                  Wenling Wu and
                  Limin Fan and
                  Weiqiong Cao and
                  Xiangliang Ma},
  title        = {My traces learn what you did in the dark: recovering secret signals
                  without key guesses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1082},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1082},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoCWFCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoWLZ16,
  author       = {Zhiyuan Guo and
                  Wenling Wu and
                  Renzhang Liu and
                  Liting Zhang},
  title        = {Multi-key Analysis of Tweakable Even-Mansour with Applications to
                  Minalpher and {OPP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1098},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoWLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WuZY15,
  author       = {Wenling Wu and
                  Lei Zhang and
                  Xiaoli Yu},
  title        = {The DBlock family of block ciphers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {3},
  pages        = {1--14},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-014-5219-0},
  doi          = {10.1007/S11432-014-5219-0},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WuZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DongWWZ15,
  author       = {Le Dong and
                  Yanling Wang and
                  Wenling Wu and
                  Jian Zou},
  title        = {Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel
                  networks with single substitution-permutation functions and near-collision
                  attacks on its hashing modes},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {277--283},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0402},
  doi          = {10.1049/IET-IFS.2014.0402},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DongWWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/SoleimanyBYWNZZ15,
  author       = {Hadi Soleimany and
                  C{\'{e}}line Blondeau and
                  Xiaoli Yu and
                  Wenling Wu and
                  Kaisa Nyberg and
                  Huiling Zhang and
                  Lei Zhang and
                  Yanfeng Wang},
  title        = {Reflection Cryptanalysis of PRINCE-Like Ciphers},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {718--744},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9175-4},
  doi          = {10.1007/S00145-013-9175-4},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/SoleimanyBYWNZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YaoZW15,
  author       = {Yuan Yao and
                  Bin Zhang and
                  Wenling Wu},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {A Single Query Forgery Attack on Raviyoyla v1},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {671},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714645},
  doi          = {10.1145/2714576.2714645},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YaoZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CaoFZCWHZ15,
  author       = {Weiqiong Cao and
                  Jingyi Feng and
                  Shaofeng Zhu and
                  Hua Chen and
                  Wenling Wu and
                  Xucang Han and
                  Xiaoguang Zheng},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {Practical Lattice-Based Fault Attack and Countermeasure on {SM2} Signature
                  Algorithm},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {62--70},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_6},
  doi          = {10.1007/978-3-319-29814-6\_6},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/CaoFZCWHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangWW15,
  author       = {Huiling Zhang and
                  Wenling Wu and
                  Yanfeng Wang},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Integral Attack Against Bit-Oriented Block Ciphers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {102--118},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_7},
  doi          = {10.1007/978-3-319-30840-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CaoFCZWHZ15,
  author       = {Weiqiong Cao and
                  Jingyi Feng and
                  Hua Chen and
                  Shaofeng Zhu and
                  Wenling Wu and
                  Xucang Han and
                  Xiaoguang Zheng},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Two Lattice-Based Differential Fault Attacks Against {ECDSA} with
                  wNAF Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {297--313},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_19},
  doi          = {10.1007/978-3-319-30840-1\_19},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/CaoFCZWHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhangW15,
  author       = {Huiling Zhang and
                  Wenling Wu},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {Structural Evaluation for Generalized Feistel Structures and Applications
                  to LBlock and {TWINE}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {218--237},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_12},
  doi          = {10.1007/978-3-319-26617-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ZhangW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Yao0W15,
  author       = {Yuan Yao and
                  Bin Zhang and
                  Wenling Wu},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Automatic Search for Linear Trails of the {SPECK} Family},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {158--176},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_9},
  doi          = {10.1007/978-3-319-23318-5\_9},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Yao0W15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LinWZ15,
  author       = {Li Lin and
                  Wenling Wu and
                  Yafei Zheng},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Improved Meet-in-the-Middle Distinguisher on Feistel Schemes},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {122--142},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_7},
  doi          = {10.1007/978-3-319-31301-6\_7},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LinWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuoWG15,
  author       = {Zhiyuan Guo and
                  Wenling Wu and
                  Si Gao},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Constructing Lightweight Optimal Diffusion Primitives with Feistel
                  Structure},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {352--372},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_21},
  doi          = {10.1007/978-3-319-31301-6\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GuoWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinW15,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Improved Meet-in-the-Middle Distinguisher on Feistel Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/051},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWHWW15,
  author       = {Shengbao Wu and
                  Hongjun Wu and
                  Tao Huang and
                  Mingsheng Wang and
                  Wenling Wu},
  title        = {Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm
                  {ALE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/159},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuWHWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinW15a,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Meet-in-the-Middle Attacks on Reduced-Round Midori-64},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1165},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1165},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GongZWF14,
  author       = {Xinxin Gong and
                  Bin Zhang and
                  Wenling Wu and
                  Dengguo Feng},
  title        = {Computing Walsh coefficients from the algebraic normal form of a Boolean
                  function},
  journal      = {Cryptogr. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {335--358},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12095-014-0103-8},
  doi          = {10.1007/S12095-014-0103-8},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/GongZWF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/DongWWZ14,
  author       = {Le Dong and
                  Wenling Wu and
                  Shuang Wu and
                  Jian Zou},
  title        = {Known-key distinguishers on type-1 Feistel scheme and near-collision
                  attacks on its hashing modes},
  journal      = {Frontiers Comput. Sci.},
  volume       = {8},
  number       = {3},
  pages        = {513--525},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11704-014-2412-7},
  doi          = {10.1007/S11704-014-2412-7},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/DongWWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/0012W14,
  author       = {Lei Zhang and
                  Wenling Wu},
  title        = {Differential analysis of the Extended Generalized Feistel Networks},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {12},
  pages        = {723--727},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2014.07.001},
  doi          = {10.1016/J.IPL.2014.07.001},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/0012W14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ZouWWD14,
  author       = {Jian Zou and
                  Wenling Wu and
                  Shuang Wu and
                  Le Dong},
  title        = {Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced
                  Grostl Hash Function},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {30},
  number       = {6},
  pages        = {1789--1806},
  year         = {2014},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2014/201411\_07.html},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jise/ZouWWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangW14,
  author       = {Yanfeng Wang and
                  Wenling Wu},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Improved Multidimensional Zero-Correlation Linear Cryptanalysis and
                  Applications to LBlock and {TWINE}},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_1},
  doi          = {10.1007/978-3-319-08344-5\_1},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangWGY14,
  author       = {Yanfeng Wang and
                  Wenling Wu and
                  Zhiyuan Guo and
                  Xiaoli Yu},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Differential Cryptanalysis and Linear Distinguisher of Full-Round
                  Zorro},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {308--323},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_19},
  doi          = {10.1007/978-3-319-07536-5\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WangWGY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiPZW14,
  author       = {Yongzhuang Wei and
                  Enes Pasalic and
                  Fengrong Zhang and
                  Wenling Wu},
  title        = {Key recovery attacks on Grain family using {BSW} sampling and certain
                  weaknesses of the filtering function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {971},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/971},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiPZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WuWHWW13,
  author       = {Shengbao Wu and
                  Hongjun Wu and
                  Tao Huang and
                  Mingsheng Wang and
                  Wenling Wu},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm
                  {ALE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {377--404},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_20},
  doi          = {10.1007/978-3-642-42033-7\_20},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WuWHWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuWZZD13,
  author       = {Wenling Wu and
                  Shuang Wu and
                  Lei Zhang and
                  Jian Zou and
                  Le Dong},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {LHash: {A} Lightweight Hash Function},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {291--308},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_19},
  doi          = {10.1007/978-3-319-12087-4\_19},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/WuWZZD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZouWW13,
  author       = {Jian Zou and
                  Wenling Wu and
                  Shuang Wu},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Cryptanalysis of the Round-Reduced {GOST} Hash Function},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {309--322},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_20},
  doi          = {10.1007/978-3-319-12087-4\_20},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZouWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SoleimanyBYWNZZW13,
  author       = {Hadi Soleimany and
                  C{\'{e}}line Blondeau and
                  Xiaoli Yu and
                  Wenling Wu and
                  Kaisa Nyberg and
                  Huiling Zhang and
                  Lei Zhang and
                  Yanfeng Wang},
  editor       = {Shiho Moriai},
  title        = {Reflection Cryptanalysis of PRINCE-Like Ciphers},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {71--91},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_5},
  doi          = {10.1007/978-3-662-43933-3\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SoleimanyBYWNZZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SuiWZW13,
  author       = {Han Sui and
                  Wenling Wu and
                  Liting Zhang and
                  Peng Wang},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Attacking and Fixing the {CS} Mode},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {318--330},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_23},
  doi          = {10.1007/978-3-319-02726-5\_23},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SuiWZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiLWYHM13,
  author       = {Xiaoqian Li and
                  Bao Li and
                  Wenling Wu and
                  Xiaoli Yu and
                  Ronglin Hao and
                  Bingke Ma},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {First Multidimensional Cryptanalysis on Reduced-Round {\textbackslash}mathrmPRINCE
                  {\_}core},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_10},
  doi          = {10.1007/978-3-319-12160-4\_10},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiLWYHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LinWW013,
  author       = {Li Lin and
                  Wenling Wu and
                  Yanfeng Wang and
                  Lei Zhang},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {General Model of the Single-Key Meet-in-the-Middle Distinguisher on
                  the Word-Oriented Block Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {203--223},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_13},
  doi          = {10.1007/978-3-319-12160-4\_13},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LinWW013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangWZ13,
  author       = {Peng Wang and
                  Wenling Wu and
                  Liting Zhang},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {Cryptanalysis of the {OKH} Authenticated Encryption Scheme},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {353--360},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_25},
  doi          = {10.1007/978-3-642-38033-4\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWGY13,
  author       = {Yanfeng Wang and
                  Wenling Wu and
                  Zhiyuan Guo and
                  Xiaoli Yu},
  title        = {Differential Cryptanalysis and Linear Distinguisher of Full-Round
                  Zorro},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {775},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/775},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWZZD13,
  author       = {Wenling Wu and
                  Shuang Wu and
                  Lei Zhang and
                  Jian Zou and
                  Le Dong},
  title        = {LHash: {A} Lightweight Hash Function (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/867},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuWZZD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ZhangWWL12,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang and
                  Bo Liang},
  title        = {TrCBC: Another look at {CBC-MAC}},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {7},
  pages        = {302--307},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.01.005},
  doi          = {10.1016/J.IPL.2012.01.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ZhangWWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangSWFW12,
  author       = {Wentao Zhang and
                  Bozhan Su and
                  Wenling Wu and
                  Dengguo Feng and
                  Chuankun Wu},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Extending Higher-Order Integral: An Efficient Unified Algorithm of
                  Constructing Integral Distinguishers for Block Ciphers},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {117--134},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_8},
  doi          = {10.1007/978-3-642-31284-7\_8},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangSWFW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhangWSW12,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Han Sui and
                  Peng Wang},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {296--312},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_19},
  doi          = {10.1007/978-3-642-34961-4\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhangWSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiWWW12,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Shuang Wu and
                  Wenling Wu},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Investigating Fundamental Security Requirements on Whirlpool: Improved
                  Preimage and Collision Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {562--579},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_34},
  doi          = {10.1007/978-3-642-34961-4\_34},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SasakiWWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuFWGDZ12,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu and
                  Jian Guo and
                  Le Dong and
                  Jian Zou},
  editor       = {Anne Canteaut},
  title        = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function
                  and Others},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_8},
  doi          = {10.1007/978-3-642-34047-5\_8},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuFWGDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Shi0FW12,
  author       = {Zhenqing Shi and
                  Bin Zhang and
                  Dengguo Feng and
                  Wenling Wu},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {337--351},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_24},
  doi          = {10.1007/978-3-642-37682-5\_24},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/Shi0FW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangWY12,
  author       = {Yanfeng Wang and
                  Wenling Wu and
                  Xiaoli Yu},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {337--352},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_23},
  doi          = {10.1007/978-3-642-29101-2\_23},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WangWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WuWW12,
  author       = {Shengbao Wu and
                  Mingsheng Wang and
                  Wenling Wu},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash
                  Functions},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {355--371},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_23},
  doi          = {10.1007/978-3-642-35999-6\_23},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WuWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangWYZ12,
  author       = {Yanfeng Wang and
                  Wenling Wu and
                  Xiaoli Yu and
                  Lei Zhang},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Security on LBlock against Biclique Cryptanalysis},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_1},
  doi          = {10.1007/978-3-642-35416-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WangWYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuFWGDZ12,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu and
                  Jian Guo and
                  Le Dong and
                  Jian Zou},
  title        = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function
                  and Others (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/206},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuFWGDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWZ12,
  author       = {Peng Wang and
                  Wenling Wu and
                  Liting Zhang},
  title        = {Cryptanalysis of the {OKH} Authenticated Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZouWWD12,
  author       = {Jian Zou and
                  Wenling Wu and
                  Shuang Wu and
                  Le Dong},
  title        = {Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced
                  Gr{\o}stl},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {686},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/686},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZouWWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangWZW11,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Lei Zhang and
                  Peng Wang},
  title        = {{CBCR:} {CBC} {MAC} with rotating transformations},
  journal      = {Sci. China Inf. Sci.},
  volume       = {54},
  number       = {11},
  pages        = {2247--2255},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11432-011-4289-5},
  doi          = {10.1007/S11432-011-4289-5},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangWZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WuZ11,
  author       = {Wenling Wu and
                  Lei Zhang},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {LBlock: {A} Lightweight Block Cipher},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {327--344},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_19},
  doi          = {10.1007/978-3-642-21554-4\_19},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YuWLZ11,
  author       = {Xiaoli Yu and
                  Wenling Wu and
                  Yanjun Li and
                  Lei Zhang},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Cryptanalysis of Reduced-Round {KLEIN} Block Cipher},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {237--250},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_18},
  doi          = {10.1007/978-3-642-34704-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YuWLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZouWWSD11,
  author       = {Jian Zou and
                  Wenling Wu and
                  Shuang Wu and
                  Bozhan Su and
                  Le Dong},
  editor       = {Howon Kim},
  title        = {Preimage Attacks on Step-Reduced {SM3} Hash Function},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {375--390},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_25},
  doi          = {10.1007/978-3-642-31912-9\_25},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ZouWWSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiangWZ11,
  author       = {Bo Liang and
                  Wenling Wu and
                  Liting Zhang},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {{BCBC:} {A} More Efficient {MAC} Algorithm},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {233--246},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_18},
  doi          = {10.1007/978-3-642-21031-0\_18},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiangWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangWW11,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {PolyE+CTR: {A} Swiss-Army-Knife Mode for Block Ciphers},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {266--280},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_19},
  doi          = {10.1007/978-3-642-24316-5\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiWZ11,
  author       = {Yanjun Li and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Improved Integral Attacks on Reduced-Round {CLEFIA} Block Cipher},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {28--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_3},
  doi          = {10.1007/978-3-642-27890-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DongWWZ11,
  author       = {Le Dong and
                  Wenling Wu and
                  Shuang Wu and
                  Jian Zou},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Known-Key Distinguisher on Round-Reduced 3D Block Cipher},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_5},
  doi          = {10.1007/978-3-642-27890-7\_5},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/DongWWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wu011,
  author       = {Wenling Wu and
                  Lei Zhang},
  title        = {LBlock: {A} Lightweight Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wu011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ZhangSWF10,
  author       = {Wentao Zhang and
                  Bozhan Su and
                  Wenling Wu and
                  Dengguo Feng},
  title        = {Some results on cryptanalysis of {SMS4} block cipher},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {60--67},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033799},
  doi          = {10.1504/IJACT.2010.033799},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ZhangSWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ZhangWW10,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang},
  title        = {A New Variant of 3GPP-MAC With Provable Security and Higher Efficiency},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {26},
  number       = {4},
  pages        = {1539--1552},
  year         = {2010},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2010/201007\_24.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ZhangWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WuFW10,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu},
  title        = {New Disturbance Vector for {SHA-0} Collision},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {26},
  number       = {6},
  pages        = {2143--2157},
  year         = {2010},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2010/201011\_13.html},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jise/WuFW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ChenZWW10,
  author       = {Haining Chen and
                  Yongbin Zhou and
                  Wenling Wu and
                  Na Wang},
  title        = {Fault Propagation Pattern Based {DFA} on Feistel Ciphers, with Application
                  to Camellia},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {1050--1057},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.192},
  doi          = {10.1109/CIT.2010.192},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ChenZWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SuWWD10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Shuang Wu and
                  Le Dong},
  editor       = {Swee{-}Huay Heng and
                  Rebecca N. Wright and
                  Bok{-}Min Goi},
  title        = {Near-Collisions on the Reduced-Round Compression Functions of Skein
                  and {BLAKE}},
  booktitle    = {Cryptology and Network Security - 9th International Conference, {CANS}
                  2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6467},
  pages        = {124--139},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17619-7\_10},
  doi          = {10.1007/978-3-642-17619-7\_10},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/SuWWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuFWS10,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu and
                  Bozhan Su},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Hyper-Sbox View of AES-like Permutations: {A} Generalized Distinguisher},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {155--168},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_12},
  doi          = {10.1007/978-3-642-21518-6\_12},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/WuFWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangWWZWL10,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang and
                  Lei Zhang and
                  Shuang Wu and
                  Bo Liang},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers:
                  {PGV} Model Revisited},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {250--269},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_14},
  doi          = {10.1007/978-3-642-13858-4\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangWWZWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiWZ10,
  author       = {Yanjun Li and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Integral Attacks on Reduced-Round {ARIA} Block Cipher},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {19--29},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_2},
  doi          = {10.1007/978-3-642-12827-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SuWZL10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Full-Round Differential Attack on {TWIS} Block Cipher},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {234--242},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_17},
  doi          = {10.1007/978-3-642-17955-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SuWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuWZ10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Wentao Zhang},
  title        = {Differential Cryptanalysis of {SMS4} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuWZL10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  title        = {Some Observations on {TWIS} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuWWD10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Shuang Wu and
                  Le Dong},
  title        = {Near-Collisions on the Reduced-Round Compression Functions of Skein
                  and {BLAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/355},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SuWWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangWZL09,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {A note on Cook's elastic block cipher},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {380--383},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533110},
  doi          = {10.1145/1533057.1533110},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangWZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangWZ09,
  author       = {Lei Zhang and
                  Wenling Wu and
                  Liting Zhang},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Proposition of Two Cipher Structures},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {215--229},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_16},
  doi          = {10.1007/978-3-642-16342-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WuZZZ09,
  author       = {Wenling Wu and
                  Lei Zhang and
                  Liting Zhang and
                  Wentao Zhang},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Security Analysis of the {GF-NLFSR} Structure and Four-Cell Block
                  Cipher},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_4},
  doi          = {10.1007/978-3-642-11145-7\_4},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WuZZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WuFW09,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Practical Rebound Attack on 12-Round Cheetah-256},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {300--314},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_20},
  doi          = {10.1007/978-3-642-14423-3\_20},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/WuFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangWFS09,
  author       = {Wentao Zhang and
                  Wenling Wu and
                  Dengguo Feng and
                  Bozhan Su},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Some New Observations on the {SMS4} Block Cipher in the Chinese {WAPI}
                  Standard},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {324--335},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_28},
  doi          = {10.1007/978-3-642-00843-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangWFS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangFWZ09,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu and
                  Liting Zhang},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {On the Correctness of an Approach against Side-Channel Attacks},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {336--344},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_29},
  doi          = {10.1007/978-3-642-00843-6\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangFWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WuFW09,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Cryptanalysis of the {LANE} Hash Function},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_8},
  doi          = {10.1007/978-3-642-05445-7\_8},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WuFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZZZ09,
  author       = {Wenling Wu and
                  Lei Zhang and
                  Liting Zhang and
                  Wentao Zhang},
  title        = {Security Analysis of the {GF-NLFSR} Structure and Four-Cell Block
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LinWWQ08,
  author       = {Pin Lin and
                  Wenling Wu and
                  Chuankun Wu and
                  Tian Qiu},
  title        = {Analysis of All-or-Nothing Hash Functions},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {24},
  number       = {5},
  pages        = {1473--1484},
  year         = {2008},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200809\_12.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LinWWQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangZW08,
  author       = {Lei Zhang and
                  Wentao Zhang and
                  Wenling Wu},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Cryptanalysis of Reduced-Round {SMS4} Block Cipher},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {216--229},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_16},
  doi          = {10.1007/978-3-540-70500-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangFWZ08,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu and
                  Liting Zhang},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {On the Unprovable Security of 2-Key {XCBC}},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {230--238},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_17},
  doi          = {10.1007/978-3-540-70500-0\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangFWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangFLW08,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Changlu Lin and
                  Wenling Wu},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Security of Truncated MACs},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {96--114},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_10},
  doi          = {10.1007/978-3-642-01440-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangFLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangWW08,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {Extended Models for Message Authentication},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {286--301},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_18},
  doi          = {10.1007/978-3-642-00730-9\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LinWWQ08,
  author       = {Pin Lin and
                  Wenling Wu and
                  Chuankun Wu and
                  Tian Qiu},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Analysis of Zipper as a Hash Function},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {392--403},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_28},
  doi          = {10.1007/978-3-540-79104-1\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LinWWQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhangWPKY08,
  author       = {Lei Zhang and
                  Wenling Wu and
                  Je Hong Park and
                  Bonwook Koo and
                  Yongjin Yeom},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Improved Impossible Differential Attacks on Large-Block Rijndael},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {298--315},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_21},
  doi          = {10.1007/978-3-540-85886-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhangWPKY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WuZZ08,
  author       = {Wenling Wu and
                  Lei Zhang and
                  Wentao Zhang},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {442--456},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_29},
  doi          = {10.1007/978-3-642-04159-4\_29},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WuZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangFWZ08,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu and
                  Liting Zhang},
  title        = {On the Correctness of An Approach Against Side-channel attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangFWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuFW08,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu},
  title        = {Cryptanalysis of the Hash Function {LUX-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/520},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuFW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuLWF07,
  author       = {ZhenYu Hu and
                  Dongdai Lin and
                  Wenling Wu and
                  Dengguo Feng},
  title        = {Constructing parallel long-message signcryption scheme from trapdoor
                  permutation},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {50},
  number       = {1},
  pages        = {82--98},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11432-007-2018-x},
  doi          = {10.1007/S11432-007-2018-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuLWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LinWW07,
  author       = {Pin Lin and
                  Wenling Wu and
                  Chuankun Wu},
  title        = {Security Analysis of Double Length Compression Function Based on Block
                  Cipher},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {121--127},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p121-127.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LinWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangLW07,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  title        = {Related-Mode Attacks on {CTR} Encryption Mode},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {282--287},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p282-287.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangLW07a,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  title        = {Another Look at {PMAC}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {16--20},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n1/ijns-2007-v5-n1-p16-20.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangLW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/WuZF07,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dengguo Feng},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round {ARIA} and
                  Camellia},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {3},
  pages        = {449--456},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9056-0},
  doi          = {10.1007/S11390-007-9056-0},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/WuZF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenWF07,
  author       = {Hua Chen and
                  Wenling Wu and
                  Dengguo Feng},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Differential Fault Analysis on {CLEFIA}},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {284--295},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_22},
  doi          = {10.1007/978-3-540-77048-0\_22},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChenWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangWF07,
  author       = {Wentao Zhang and
                  Wenling Wu and
                  Dengguo Feng},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {New Results on Impossible Differential Cryptanalysis of Reduced {AES}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {239--250},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_19},
  doi          = {10.1007/978-3-540-76788-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhangZWF07,
  author       = {Wentao Zhang and
                  Lei Zhang and
                  Wenling Wu and
                  Dengguo Feng},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Related-Key Differential-Linear Attacks on Reduced {AES-192}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_7},
  doi          = {10.1007/978-3-540-77026-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ZhangZWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WuZL06,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dongdai Lin},
  title        = {Security on Generalized Feistel Scheme with {SP} Round Function},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {215--224},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p215-224.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WuZL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/Wu06,
  author       = {Wenling Wu},
  title        = {Pseudorandomness of Camellia-Like Scheme},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {21},
  number       = {1},
  pages        = {82--88},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11390-006-0082-0},
  doi          = {10.1007/S11390-006-0082-0},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/Wu06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HuFW06,
  author       = {Honggang Hu and
                  Dengguo Feng and
                  Wenling Wu},
  title        = {Incomplete exponential sums over galois rings with applications to
                  some binary sequences derived from Z\({}_{\mbox{2}}\)\({}^{\mbox{l}}\)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {5},
  pages        = {2260--2265},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.872850},
  doi          = {10.1109/TIT.2006.872850},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/HuFW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangLW06,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {An Improved Poly1305 {MAC}},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {284--292},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_19},
  doi          = {10.1007/11767480\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WangLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangLW06,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {{OPMAC:} One-Key Poly1305 {MAC}},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {78--87},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_7},
  doi          = {10.1007/11937807\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/YuanWWZ06,
  author       = {Zheng Yuan and
                  Qiaoyan Wen and
                  Wenling Wu and
                  Qing Zhang},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {An \emph{ID}-Based Watermarking Scheme for Java Programs},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {848--857},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_85},
  doi          = {10.1007/11807964\_85},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/YuanWWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangFW06,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Symmetric Nonce Respecting Security Model and the {MEM} Mode of Operation},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {280--286},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_20},
  doi          = {10.1007/11941378\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WangFW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ZhangWZF06,
  author       = {Wentao Zhang and
                  Wenling Wu and
                  Lei Zhang and
                  Dengguo Feng},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Improved Related-Key Impossible Differential Attacks on Reduced-Round
                  {AES-192}},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_2},
  doi          = {10.1007/978-3-540-74462-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ZhangWZF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangFW06,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu},
  title        = {Cryptanalysis of the {MEM} Mode of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangFW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZF06,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dengguo Feng},
  title        = {Impossible Differential Cryptanalysis of {ARIA} and Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WuF05,
  author       = {Wenling Wu and
                  Dengguo Feng},
  title        = {Collision attack on reduced-round Camellia},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {48},
  number       = {1},
  pages        = {78--90},
  year         = {2005},
  url          = {https://doi.org/10.1360/03yf0293},
  doi          = {10.1360/03YF0293},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WuF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WenWW05,
  author       = {Fengtong Wen and
                  Wenling Wu and
                  Qiaoyan Wen},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Error Oracle Attacks on Several Modes of Operation},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {62--67},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_9},
  doi          = {10.1007/11596981\_9},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WenWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLW05,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {A Variant of Poly1305 {MAC} and Its Security Proof},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {375--380},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_55},
  doi          = {10.1007/11596981\_55},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/WangLW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangFW05,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {{HCTR:} {A} Variable-Input-Length Enciphering Mode},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {175--188},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_15},
  doi          = {10.1007/11599548\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangFW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WuZF05,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dengguo Feng},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Integral Cryptanalysis of Reduced {FOX} Block Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {229--241},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_20},
  doi          = {10.1007/11734727\_20},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WuZF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangFW05,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {On the Security of Tweakable Modes of Operation: {TBC} and {TAE}},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {274--287},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_20},
  doi          = {10.1007/11556992\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangFW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZF05,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dengguo Feng},
  title        = {Improved Integral Cryptanalysis of {FOX} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WuFC04,
  author       = {Wenling Wu and
                  Dengguo Feng and
                  Hua Chen},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {Collision Attack and Pseudorandomness of Reduced-Round Camellia},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_18},
  doi          = {10.1007/978-3-540-30564-4\_18},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WuFC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZL04,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dongdai Lin},
  title        = {Security on Generalized Feistel Scheme with {SP} Round Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuF03,
  author       = {Wenling Wu and
                  Dengguo Feng},
  title        = {Collision Attack on Reduced-Round Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WuF02,
  author       = {Wenling Wu and
                  Dengguo Feng},
  title        = {Linear cryptanalysis of {NUSH} block cipher},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {45},
  number       = {1},
  pages        = {59--67},
  year         = {2002},
  url          = {https://doi.org/10.1360/02yf9005},
  doi          = {10.1360/02YF9005},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WuF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WenlingDS00,
  author       = {Wenling Wu and
                  Dengguo Feng and
                  Sihan Qing},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {Power Analysis of {RC6} and Serpent},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {201--209},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Thu, 09 Jun 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/WenlingDS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WuLFQ99,
  author       = {Wenling Wu and
                  Bao Li and
                  Dengguo Feng and
                  Sihan Qing},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Cryptanalysis of some {AES} Candidate Algorithms},
  booktitle    = {Information and Communication Security, Second International Conference,
                  ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1726},
  pages        = {13--21},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-47942-0\_3},
  doi          = {10.1007/978-3-540-47942-0\_3},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WuLFQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics