Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wenling Wu
@article{DBLP:journals/cj/ZhangZWMZ24, author = {Li Zhang and Yu Zhang and Wenling Wu and Yongxia Mao and Yafei Zheng}, title = {Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {674--687}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad009}, doi = {10.1093/COMJNL/BXAD009}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangZWMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiW23, author = {Xiaodan Li and Wenling Wu}, title = {Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure}, journal = {Comput. J.}, volume = {66}, number = {1}, pages = {160--173}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxab151}, doi = {10.1093/COMJNL/BXAB151}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWZW23, author = {Li Zhang and Wenling Wu and Yafei Zheng and Bolin Wang}, title = {Cryptanalysis on Reduced-Round 3D and Saturnin}, journal = {Comput. J.}, volume = {66}, number = {4}, pages = {1017--1029}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac116}, doi = {10.1093/COMJNL/BXAC116}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangWZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangWSW23, author = {Zhongya Zhang and Wenling Wu and Han Sui and Bolin Wang}, title = {Post-quantum security on the Lai-Massey scheme}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2687--2704}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01225-5}, doi = {10.1007/S10623-023-01225-5}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangWSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangW23, author = {Bolin Wang and Wenling Wu}, title = {New Key-Independent Structural Properties of AES-Like Permutations}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {1}, pages = {575--583}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3202044}, doi = {10.1109/JIOT.2022.3202044}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaoWZ023, author = {Yongxia Mao and Wenling Wu and Yafei Zheng and Lei Zhang}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Related-Cipher Attacks: Applications to Ballet and {ANT}}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {109--123}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_6}, doi = {10.1007/978-3-031-35486-1\_6}, timestamp = {Wed, 21 Jun 2023 16:37:47 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaoWZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengJHZWQZZST23, author = {Dengguo Feng and Lin Jiao and Yonglin Hao and Qunxiong Zheng and Wenling Wu and Wenfeng Qi and Lei Zhang and Liting Zhang and Siwei Sun and Tian Tian}, title = {{LOL:} {A} Highly Flexible Framework for Designing Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1235}, year = {2023}, url = {https://eprint.iacr.org/2023/1235}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengJHZWQZZST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/JinDWC22, author = {Wengang Jin and Xiaoni Du and Wenling Wu and Zhixiong Chen}, title = {Generic Construction of Boolean Functions with {A} Few Walsh Transform Values of Any Possible Algebraic Degree}, journal = {Adv. Math. Commun.}, volume = {16}, number = {4}, pages = {811--832}, year = {2022}, url = {https://doi.org/10.3934/amc.2022050}, doi = {10.3934/AMC.2022050}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amco/JinDWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZouWSLLW22, author = {Jian Zou and Zihao Wei and Siwei Sun and Yiyuan Luo and Qian Liu and Wenling Wu}, title = {Some efficient quantum circuit implementations of Camellia}, journal = {Quantum Inf. Process.}, volume = {21}, number = {4}, pages = {131}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03477-x}, doi = {10.1007/S11128-022-03477-X}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZouWSLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZouLWLLW22, author = {Jian Zou and Liji Li and Zihao Wei and Yiyuan Luo and Qian Liu and Wenling Wu}, title = {New quantum circuit implementations of {SM4} and {SM3}}, journal = {Quantum Inf. Process.}, volume = {21}, number = {5}, pages = {181}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03518-5}, doi = {10.1007/S11128-022-03518-5}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZouLWLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangWSL22, author = {Zhongya Zhang and Wenling Wu and Han Sui and Xiaodan Li}, title = {Quantum generic attacks on key-alternating Feistel ciphers for shorter keys}, journal = {Quantum Inf. Process.}, volume = {21}, number = {6}, pages = {219}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03505-w}, doi = {10.1007/S11128-022-03505-W}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangWSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ZhengWCCCZW22, author = {Jian Zheng and Jianfeng Wang and Yanping Chen and Shuping Chen and Jingjin Chen and Wenlong Zhong and Wenling Wu}, title = {Effective approximation of high-dimensional space using neural networks}, journal = {J. Supercomput.}, volume = {78}, number = {3}, pages = {4377--4397}, year = {2022}, url = {https://doi.org/10.1007/s11227-021-04038-2}, doi = {10.1007/S11227-021-04038-2}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/ZhengWCCCZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangWZ22, author = {Yuhan Zhang and Wenling Wu and Lei Zhang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Improved Differential Attack on Round-Reduced {LEA}}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {67--84}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_4}, doi = {10.1007/978-3-031-22301-3\_4}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaoWWZ22, author = {Yongxia Mao and Wenling Wu and Bolin Wang and Li Zhang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Improved Division Property for Ciphers with Complex Linear Layers}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {106--124}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_6}, doi = {10.1007/978-3-031-22301-3\_6}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaoWWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangWZZW22, author = {Lei Zhang and Ruichen Wu and Yuhan Zhang and Yafei Zheng and Wenling Wu}, editor = {Yi Deng and Moti Yung}, title = {{LLLWBC:} {A} New Low-Latency Light-Weight Block Cipher}, booktitle = {Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13837}, pages = {23--42}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26553-2\_2}, doi = {10.1007/978-3-031-26553-2\_2}, timestamp = {Tue, 13 Jun 2023 12:14:43 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangWZZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CaoSCCFW22, author = {Weiqiong Cao and Hongsong Shi and Hua Chen and Jiazhe Chen and Limin Fan and Wenling Wu}, editor = {Steven D. Galbraith}, title = {Lattice-Based Fault Attacks on Deterministic Signature Schemes of {ECDSA} and EdDSA}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {169--195}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_8}, doi = {10.1007/978-3-030-95312-6\_8}, timestamp = {Thu, 03 Feb 2022 09:28:38 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/CaoSCCFW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangWM22, author = {Li Zhang and Wenling Wu and Yongxia Mao}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {61--77}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_4}, doi = {10.1007/978-3-031-29371-9\_4}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ZhangWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiWHGW21, author = {Tairong Shi and Wenling Wu and Bin Hu and Jie Guan and Sengpeng Wang}, title = {Breaking {LWC} candidates: sESTATE and Elephant in quantum setting}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1405--1432}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00875-7}, doi = {10.1007/S10623-021-00875-7}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiWHGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ZhengWCCCZW21, author = {Jian Zheng and Jianfeng Wang and Yanping Chen and Shuping Chen and Jingjin Chen and Wenlong Zhong and Wenling Wu}, title = {Neural networks trained with high-dimensional functions approximation data in high-dimensional space}, journal = {J. Intell. Fuzzy Syst.}, volume = {41}, number = {2}, pages = {3739--3750}, year = {2021}, url = {https://doi.org/10.3233/JIFS-211417}, doi = {10.3233/JIFS-211417}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/ZhengWCCCZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiW21, author = {Xiaodan Li and Wenling Wu}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Constructions of Iterative Near-MDS Matrices with the Lowest {XOR} Count}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {132--150}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_7}, doi = {10.1007/978-3-030-90567-5\_7}, timestamp = {Mon, 08 Nov 2021 16:43:35 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhouWZLPW21, author = {Yu Zhou and Yongzhuang Wei and Hailong Zhang and Luyang Li and Enes Pasalic and Wenling Wu}, editor = {Yu Yu and Moti Yung}, title = {On Characterization of Transparency Order for (n, m)-functions}, booktitle = {Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13007}, pages = {351--370}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88323-2\_19}, doi = {10.1007/978-3-030-88323-2\_19}, timestamp = {Tue, 19 Oct 2021 18:32:12 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhouWZLPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhouWZLPW21, author = {Yu Zhou and Yongzhuang Wei and Hailong Zhang and Luyang Li and Enes Pasalic and Wenling Wu}, editor = {Joseph K. Liu and Sokratis K. Katsikas and Weizhi Meng and Willy Susilo and Rolly Intan}, title = {Transparency Order of (n, m)-Functions - Its Further Characterization and Applications}, booktitle = {Information Security - 24th International Conference, {ISC} 2021, Virtual Event, November 10-12, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13118}, pages = {139--157}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91356-4\_8}, doi = {10.1007/978-3-030-91356-4\_8}, timestamp = {Fri, 03 Dec 2021 17:36:27 +0100}, biburl = {https://dblp.org/rec/conf/isw/ZhouWZLPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZouWSLW20, author = {Jian Zou and Zihao Wei and Siwei Sun and Ximeng Liu and Wenling Wu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Quantum Circuit Implementations of {AES} with Fewer Qubits}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {697--726}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_24}, doi = {10.1007/978-3-030-64834-3\_24}, timestamp = {Thu, 10 Dec 2020 10:09:50 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZouWSLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangSWZ20, author = {Bolin Wang and Chan Song and Wenling Wu and Lei Zhang}, editor = {Deukjo Hong}, title = {A New Non-random Property of 4.5-Round {PRINCE}}, booktitle = {Information Security and Cryptology - {ICISC} 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12593}, pages = {199--212}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68890-5\_11}, doi = {10.1007/978-3-030-68890-5\_11}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/WangSWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2020, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4}, doi = {10.1007/978-3-030-62576-4}, isbn = {978-3-030-62575-7}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoSCXLFW20, author = {Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Xi and Haoyuan Li and Limin Fan and Wenling Wu}, title = {Lattice-based Fault Attacks against Deterministic Signatures {ECDSA} and EdDSA}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {803}, year = {2020}, url = {https://eprint.iacr.org/2020/803}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoSCXLFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhengW19, author = {Yafei Zheng and Wenling Wu}, title = {On the extension and security of key schedule of {GOST}}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {2}, pages = {125--132}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5291}, doi = {10.1049/IET-IFS.2018.5291}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhengW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiWZZ19, author = {Lingchen Li and Wenling Wu and Lei Zhang and Yafei Zheng}, title = {New method to describe the differential distribution table for large S-boxes in {MILP} and its application}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {5}, pages = {479--485}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5284}, doi = {10.1049/IET-IFS.2018.5284}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiWZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWZ019, author = {Lingchen Li and Wenling Wu and Yafei Zheng and Lei Zhang}, title = {The Relationship between the Construction and Solution of the {MILP} Models and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2019}, url = {https://eprint.iacr.org/2019/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZouLDWD19, author = {Jian Zou and Yongyang Liu and Chen Dong and Wenling Wu and Le Dong}, title = {Observations on the Quantum Circuit of the SBox of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1245}, year = {2019}, url = {https://eprint.iacr.org/2019/1245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZouLDWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinW18, author = {Li Lin and Wenling Wu}, title = {Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {721--741}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0353-5}, doi = {10.1007/S10623-017-0353-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZouDW18, author = {Jian Zou and Le Dong and Wenling Wu}, title = {New algorithms for the unbalanced generalised birthday problem}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {6}, pages = {527--533}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2017.0495}, doi = {10.1049/IET-IFS.2017.0495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZouDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WeiYWP18, author = {Yongzhuang Wei and Tao Ye and Wenling Wu and Enes Pasalic}, title = {Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {62--79}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.62-79}, doi = {10.13154/TOSC.V2018.I4.62-79}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/WeiYWP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CaoCFFW18, author = {Weiqiong Cao and Hua Chen and Jingyi Feng and Limin Fan and Wenling Wu}, editor = {Junfeng Fan and Benedikt Gierlichs}, title = {Lattice-Based Fault Attacks Against {ECMQV}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10815}, pages = {101--116}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89641-0\_6}, doi = {10.1007/978-3-319-89641-0\_6}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/CaoCFFW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangW17, author = {Lei Zhang and Wenling Wu}, title = {Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function}, journal = {{IET} Inf. Secur.}, volume = {11}, number = {3}, pages = {121--128}, year = {2017}, url = {https://doi.org/10.1049/iet-ifs.2015.0433}, doi = {10.1049/IET-IFS.2015.0433}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WeiPZWW17, author = {Yongzhuang Wei and Enes Pasalic and Fengrong Zhang and Wenling Wu and Cheng{-}Xiang Wang}, title = {New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions}, journal = {Inf. Sci.}, volume = {415}, pages = {377--396}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2017.06.036}, doi = {10.1016/J.INS.2017.06.036}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WeiPZWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LinW17, author = {Li Lin and Wenling Wu}, title = {Meet-in-the-Middle Attacks on Reduced-Round Midori64}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {215--239}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.215-239}, doi = {10.13154/TOSC.V2017.I1.215-239}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LinW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoLGWL17, author = {Zhiyuan Guo and Renzhang Liu and Si Gao and Wenling Wu and Dongdai Lin}, title = {Direct Construction of Optimal Rotational-XOR Diffusion Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {169--187}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.169-187}, doi = {10.13154/TOSC.V2017.I4.169-187}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoLGWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GaoCWFCM17, author = {Si Gao and Hua Chen and Wenling Wu and Limin Fan and Weiqiong Cao and Xiangliang Ma}, editor = {Helena Handschuh}, title = {My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {363--378}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_21}, doi = {10.1007/978-3-319-52153-4\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GaoCWFCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiWZ17a, author = {Lingchen Li and Wenling Wu and Lei Zhang}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {502--508}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_43}, doi = {10.1007/978-3-319-89500-0\_43}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiWZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LinWZ17, author = {Li Lin and Wenling Wu and Yafei Zheng}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {58--76}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_4}, doi = {10.1007/978-3-319-69659-1\_4}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/LinWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangW16, author = {Yanfeng Wang and Wenling Wu}, title = {New criterion for diffusion property and applications to improved {GFS} and {EGFN}}, journal = {Des. Codes Cryptogr.}, volume = {81}, number = {3}, pages = {393--412}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0161-8}, doi = {10.1007/S10623-015-0161-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/YaoZW16, author = {Yuan Yao and Bin Zhang and Wenling Wu}, title = {Utilizing Probabilistic Linear Equations in Cube Attacks}, journal = {J. Comput. Sci. Technol.}, volume = {31}, number = {2}, pages = {317--325}, year = {2016}, url = {https://doi.org/10.1007/s11390-016-1629-3}, doi = {10.1007/S11390-016-1629-3}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/YaoZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoWLZ16, author = {Zhiyuan Guo and Wenling Wu and Renzhang Liu and Liting Zhang}, title = {Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and {OPP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {288--306}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.288-306}, doi = {10.13154/TOSC.V2016.I2.288-306}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoWLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GaoCWFFM16, author = {Si Gao and Hua Chen and Wenling Wu and Limin Fan and Jingyi Feng and Xiangliang Ma}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Linear Regression Attack with F-test: {A} New {SCARE} Technique for Secret Block Ciphers}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {3--18}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_1}, doi = {10.1007/978-3-319-48965-0\_1}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/GaoCWFFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhengW16, author = {Yafei Zheng and Wenling Wu}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Biclique Attack of Block Cipher {SKINNY}}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_1}, doi = {10.1007/978-3-319-54705-3\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhengW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WangW16, author = {Yanfeng Wang and Wenling Wu}, editor = {Kazue Sako}, title = {New Observations on Piccolo Block Cipher}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {378--393}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_22}, doi = {10.1007/978-3-319-29485-8\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LinWZ16, author = {Li Lin and Wenling Wu and Yafei Zheng}, editor = {Thomas Peyrin}, title = {Automatic Search for Key-Bridging Technique: Applications to LBlock and {TWINE}}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {247--267}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_13}, doi = {10.1007/978-3-662-52993-5\_13}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LinWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangWZ16, author = {Jian Zhang and Wenling Wu and Yafei Zheng}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Security of {SM4} Against (Related-Key) Differential Cryptanalysis}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {65--78}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_5}, doi = {10.1007/978-3-319-49151-6\_5}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangWZ16a, author = {Jian Zhang and Wenling Wu and Yafei Zheng}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Collision Attacks on {CAESAR} Second-Round Candidate: ELmD}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {122--136}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_9}, doi = {10.1007/978-3-319-49151-6\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangWZ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangW16, author = {Huiling Zhang and Wenling Wu}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Structural Evaluation for Simon-Like Designs Against Integral Attack}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {194--208}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_14}, doi = {10.1007/978-3-319-49151-6\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinWZ16, author = {Li Lin and Wenling Wu and Yafei Zheng}, title = {Automatic Search for Key-Bridging Technique: Applications to LBlock and {TWINE} (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2016}, url = {http://eprint.iacr.org/2016/414}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinW16, author = {Li Lin and Wenling Wu}, title = {Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2016}, url = {http://eprint.iacr.org/2016/722}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLWL16, author = {Zhiyuan Guo and Renzhang Liu and Wenling Wu and Dongdai Lin}, title = {Direct Construction of Lightweight Rotational-XOR {MDS} Diffusion Layers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1036}, year = {2016}, url = {http://eprint.iacr.org/2016/1036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoLWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoCWFCM16, author = {Si Gao and Hua Chen and Wenling Wu and Limin Fan and Weiqiong Cao and Xiangliang Ma}, title = {My traces learn what you did in the dark: recovering secret signals without key guesses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1082}, year = {2016}, url = {http://eprint.iacr.org/2016/1082}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoCWFCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoWLZ16, author = {Zhiyuan Guo and Wenling Wu and Renzhang Liu and Liting Zhang}, title = {Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and {OPP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1098}, year = {2016}, url = {http://eprint.iacr.org/2016/1098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoWLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WuZY15, author = {Wenling Wu and Lei Zhang and Xiaoli Yu}, title = {The DBlock family of block ciphers}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {3}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1007/s11432-014-5219-0}, doi = {10.1007/S11432-014-5219-0}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WuZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DongWWZ15, author = {Le Dong and Yanling Wang and Wenling Wu and Jian Zou}, title = {Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {5}, pages = {277--283}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0402}, doi = {10.1049/IET-IFS.2014.0402}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/DongWWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/SoleimanyBYWNZZ15, author = {Hadi Soleimany and C{\'{e}}line Blondeau and Xiaoli Yu and Wenling Wu and Kaisa Nyberg and Huiling Zhang and Lei Zhang and Yanfeng Wang}, title = {Reflection Cryptanalysis of PRINCE-Like Ciphers}, journal = {J. Cryptol.}, volume = {28}, number = {3}, pages = {718--744}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9175-4}, doi = {10.1007/S00145-013-9175-4}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/SoleimanyBYWNZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoZW15, author = {Yuan Yao and Bin Zhang and Wenling Wu}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {A Single Query Forgery Attack on Raviyoyla v1}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {671}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714645}, doi = {10.1145/2714576.2714645}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YaoZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CaoFZCWHZ15, author = {Weiqiong Cao and Jingyi Feng and Shaofeng Zhu and Hua Chen and Wenling Wu and Xucang Han and Xiaoguang Zheng}, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {Practical Lattice-Based Fault Attack and Countermeasure on {SM2} Signature Algorithm}, booktitle = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, pages = {62--70}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29814-6\_6}, doi = {10.1007/978-3-319-29814-6\_6}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/CaoFZCWHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangWW15, author = {Huiling Zhang and Wenling Wu and Yanfeng Wang}, editor = {Soonhak Kwon and Aaram Yun}, title = {Integral Attack Against Bit-Oriented Block Ciphers}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {102--118}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_7}, doi = {10.1007/978-3-319-30840-1\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ZhangWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CaoFCZWHZ15, author = {Weiqiong Cao and Jingyi Feng and Hua Chen and Shaofeng Zhu and Wenling Wu and Xucang Han and Xiaoguang Zheng}, editor = {Soonhak Kwon and Aaram Yun}, title = {Two Lattice-Based Differential Fault Attacks Against {ECDSA} with wNAF Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {297--313}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_19}, doi = {10.1007/978-3-319-30840-1\_19}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/CaoFCZWHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ZhangW15, author = {Huiling Zhang and Wenling Wu}, editor = {Alex Biryukov and Vipul Goyal}, title = {Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and {TWINE}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9462}, pages = {218--237}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26617-6\_12}, doi = {10.1007/978-3-319-26617-6\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ZhangW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Yao0W15, author = {Yuan Yao and Bin Zhang and Wenling Wu}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Automatic Search for Linear Trails of the {SPECK} Family}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {158--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_9}, doi = {10.1007/978-3-319-23318-5\_9}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Yao0W15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LinWZ15, author = {Li Lin and Wenling Wu and Yafei Zheng}, editor = {Orr Dunkelman and Liam Keliher}, title = {Improved Meet-in-the-Middle Distinguisher on Feistel Schemes}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {122--142}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_7}, doi = {10.1007/978-3-319-31301-6\_7}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/LinWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GuoWG15, author = {Zhiyuan Guo and Wenling Wu and Si Gao}, editor = {Orr Dunkelman and Liam Keliher}, title = {Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {352--372}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_21}, doi = {10.1007/978-3-319-31301-6\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GuoWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinW15, author = {Li Lin and Wenling Wu}, title = {Improved Meet-in-the-Middle Distinguisher on Feistel Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2015}, url = {http://eprint.iacr.org/2015/051}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuWHWW15, author = {Shengbao Wu and Hongjun Wu and Tao Huang and Mingsheng Wang and Wenling Wu}, title = {Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm {ALE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2015}, url = {http://eprint.iacr.org/2015/159}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuWHWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinW15a, author = {Li Lin and Wenling Wu}, title = {Meet-in-the-Middle Attacks on Reduced-Round Midori-64}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1165}, year = {2015}, url = {http://eprint.iacr.org/2015/1165}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GongZWF14, author = {Xinxin Gong and Bin Zhang and Wenling Wu and Dengguo Feng}, title = {Computing Walsh coefficients from the algebraic normal form of a Boolean function}, journal = {Cryptogr. Commun.}, volume = {6}, number = {4}, pages = {335--358}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0103-8}, doi = {10.1007/S12095-014-0103-8}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GongZWF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/DongWWZ14, author = {Le Dong and Wenling Wu and Shuang Wu and Jian Zou}, title = {Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes}, journal = {Frontiers Comput. Sci.}, volume = {8}, number = {3}, pages = {513--525}, year = {2014}, url = {https://doi.org/10.1007/s11704-014-2412-7}, doi = {10.1007/S11704-014-2412-7}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/DongWWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/0012W14, author = {Lei Zhang and Wenling Wu}, title = {Differential analysis of the Extended Generalized Feistel Networks}, journal = {Inf. Process. Lett.}, volume = {114}, number = {12}, pages = {723--727}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2014.07.001}, doi = {10.1016/J.IPL.2014.07.001}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/0012W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ZouWWD14, author = {Jian Zou and Wenling Wu and Shuang Wu and Le Dong}, title = {Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function}, journal = {J. Inf. Sci. Eng.}, volume = {30}, number = {6}, pages = {1789--1806}, year = {2014}, url = {http://www.iis.sinica.edu.tw/page/jise/2014/201411\_07.html}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jise/ZouWWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangW14, author = {Yanfeng Wang and Wenling Wu}, editor = {Willy Susilo and Yi Mu}, title = {Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and {TWINE}}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_1}, doi = {10.1007/978-3-319-08344-5\_1}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangWGY14, author = {Yanfeng Wang and Wenling Wu and Zhiyuan Guo and Xiaoli Yu}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {308--323}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_19}, doi = {10.1007/978-3-319-07536-5\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/WangWGY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiPZW14, author = {Yongzhuang Wei and Enes Pasalic and Fengrong Zhang and Wenling Wu}, title = {Key recovery attacks on Grain family using {BSW} sampling and certain weaknesses of the filtering function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {971}, year = {2014}, url = {http://eprint.iacr.org/2014/971}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiPZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WuWHWW13, author = {Shengbao Wu and Hongjun Wu and Tao Huang and Mingsheng Wang and Wenling Wu}, editor = {Kazue Sako and Palash Sarkar}, title = {Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm {ALE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {377--404}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_20}, doi = {10.1007/978-3-642-42033-7\_20}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WuWHWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuWZZD13, author = {Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {LHash: {A} Lightweight Hash Function}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {291--308}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_19}, doi = {10.1007/978-3-319-12087-4\_19}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WuWZZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZouWW13, author = {Jian Zou and Wenling Wu and Shuang Wu}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Cryptanalysis of the Round-Reduced {GOST} Hash Function}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {309--322}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_20}, doi = {10.1007/978-3-319-12087-4\_20}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZouWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SoleimanyBYWNZZW13, author = {Hadi Soleimany and C{\'{e}}line Blondeau and Xiaoli Yu and Wenling Wu and Kaisa Nyberg and Huiling Zhang and Lei Zhang and Yanfeng Wang}, editor = {Shiho Moriai}, title = {Reflection Cryptanalysis of PRINCE-Like Ciphers}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {71--91}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_5}, doi = {10.1007/978-3-662-43933-3\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SoleimanyBYWNZZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SuiWZW13, author = {Han Sui and Wenling Wu and Liting Zhang and Peng Wang}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Attacking and Fixing the {CS} Mode}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {318--330}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_23}, doi = {10.1007/978-3-319-02726-5\_23}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SuiWZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiLWYHM13, author = {Xiaoqian Li and Bao Li and Wenling Wu and Xiaoli Yu and Ronglin Hao and Bingke Ma}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {First Multidimensional Cryptanalysis on Reduced-Round {\textbackslash}mathrmPRINCE {\_}core}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {158--172}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_10}, doi = {10.1007/978-3-319-12160-4\_10}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiLWYHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LinWW013, author = {Li Lin and Wenling Wu and Yanfeng Wang and Lei Zhang}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {203--223}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_13}, doi = {10.1007/978-3-319-12160-4\_13}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LinWW013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangWZ13, author = {Peng Wang and Wenling Wu and Liting Zhang}, editor = {Robert H. Deng and Tao Feng}, title = {Cryptanalysis of the {OKH} Authenticated Encryption Scheme}, booktitle = {Information Security Practice and Experience - 9th International Conference, {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7863}, pages = {353--360}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38033-4\_25}, doi = {10.1007/978-3-642-38033-4\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWGY13, author = {Yanfeng Wang and Wenling Wu and Zhiyuan Guo and Xiaoli Yu}, title = {Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {775}, year = {2013}, url = {http://eprint.iacr.org/2013/775}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuWZZD13, author = {Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong}, title = {LHash: {A} Lightweight Hash Function (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2013}, url = {http://eprint.iacr.org/2013/867}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuWZZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ZhangWWL12, author = {Liting Zhang and Wenling Wu and Peng Wang and Bo Liang}, title = {TrCBC: Another look at {CBC-MAC}}, journal = {Inf. Process. Lett.}, volume = {112}, number = {7}, pages = {302--307}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.01.005}, doi = {10.1016/J.IPL.2012.01.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ZhangWWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangSWFW12, author = {Wentao Zhang and Bozhan Su and Wenling Wu and Dengguo Feng and Chuankun Wu}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {117--134}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_8}, doi = {10.1007/978-3-642-31284-7\_8}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhangSWFW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZhangWSW12, author = {Liting Zhang and Wenling Wu and Han Sui and Peng Wang}, editor = {Xiaoyun Wang and Kazue Sako}, title = {3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {296--312}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_19}, doi = {10.1007/978-3-642-34961-4\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZhangWSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SasakiWWW12, author = {Yu Sasaki and Lei Wang and Shuang Wu and Wenling Wu}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {562--579}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_34}, doi = {10.1007/978-3-642-34961-4\_34}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SasakiWWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuFWGDZ12, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou}, editor = {Anne Canteaut}, title = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {127--145}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_8}, doi = {10.1007/978-3-642-34047-5\_8}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuFWGDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Shi0FW12, author = {Zhenqing Shi and Bin Zhang and Dengguo Feng and Wenling Wu}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {337--351}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_24}, doi = {10.1007/978-3-642-37682-5\_24}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/Shi0FW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangWY12, author = {Yanfeng Wang and Wenling Wu and Xiaoli Yu}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {337--352}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_23}, doi = {10.1007/978-3-642-29101-2\_23}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WangWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuWW12, author = {Shengbao Wu and Mingsheng Wang and Wenling Wu}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {355--371}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_23}, doi = {10.1007/978-3-642-35999-6\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WuWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangWYZ12, author = {Yanfeng Wang and Wenling Wu and Xiaoli Yu and Lei Zhang}, editor = {Dong Hoon Lee and Moti Yung}, title = {Security on LBlock against Biclique Cryptanalysis}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {1--14}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_1}, doi = {10.1007/978-3-642-35416-8\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WangWYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuFWGDZ12, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou}, title = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2012}, url = {http://eprint.iacr.org/2012/206}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuFWGDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWZ12, author = {Peng Wang and Wenling Wu and Liting Zhang}, title = {Cryptanalysis of the {OKH} Authenticated Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2012}, url = {http://eprint.iacr.org/2012/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZouWWD12, author = {Jian Zou and Wenling Wu and Shuang Wu and Le Dong}, title = {Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Gr{\o}stl}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {686}, year = {2012}, url = {http://eprint.iacr.org/2012/686}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZouWWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangWZW11, author = {Liting Zhang and Wenling Wu and Lei Zhang and Peng Wang}, title = {{CBCR:} {CBC} {MAC} with rotating transformations}, journal = {Sci. China Inf. Sci.}, volume = {54}, number = {11}, pages = {2247--2255}, year = {2011}, url = {https://doi.org/10.1007/s11432-011-4289-5}, doi = {10.1007/S11432-011-4289-5}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangWZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WuZ11, author = {Wenling Wu and Lei Zhang}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {LBlock: {A} Lightweight Block Cipher}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {327--344}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_19}, doi = {10.1007/978-3-642-21554-4\_19}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/WuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YuWLZ11, author = {Xiaoli Yu and Wenling Wu and Yanjun Li and Lei Zhang}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Cryptanalysis of Reduced-Round {KLEIN} Block Cipher}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {237--250}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_18}, doi = {10.1007/978-3-642-34704-7\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YuWLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZouWWSD11, author = {Jian Zou and Wenling Wu and Shuang Wu and Bozhan Su and Le Dong}, editor = {Howon Kim}, title = {Preimage Attacks on Step-Reduced {SM3} Hash Function}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {375--390}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_25}, doi = {10.1007/978-3-642-31912-9\_25}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ZouWWSD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiangWZ11, author = {Bo Liang and Wenling Wu and Liting Zhang}, editor = {Feng Bao and Jian Weng}, title = {{BCBC:} {A} More Efficient {MAC} Algorithm}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {233--246}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_18}, doi = {10.1007/978-3-642-21031-0\_18}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiangWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangWW11, author = {Liting Zhang and Wenling Wu and Peng Wang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {PolyE+CTR: {A} Swiss-Army-Knife Mode for Block Ciphers}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {266--280}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_19}, doi = {10.1007/978-3-642-24316-5\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhangWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiWZ11, author = {Yanjun Li and Wenling Wu and Lei Zhang}, editor = {Souhwan Jung and Moti Yung}, title = {Improved Integral Attacks on Reduced-Round {CLEFIA} Block Cipher}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {28--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_3}, doi = {10.1007/978-3-642-27890-7\_3}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DongWWZ11, author = {Le Dong and Wenling Wu and Shuang Wu and Jian Zou}, editor = {Souhwan Jung and Moti Yung}, title = {Known-Key Distinguisher on Round-Reduced 3D Block Cipher}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {55--69}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_5}, doi = {10.1007/978-3-642-27890-7\_5}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/DongWWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wu011, author = {Wenling Wu and Lei Zhang}, title = {LBlock: {A} Lightweight Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2011}, url = {http://eprint.iacr.org/2011/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wu011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ZhangSWF10, author = {Wentao Zhang and Bozhan Su and Wenling Wu and Dengguo Feng}, title = {Some results on cryptanalysis of {SMS4} block cipher}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {60--67}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033799}, doi = {10.1504/IJACT.2010.033799}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ZhangSWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ZhangWW10, author = {Liting Zhang and Wenling Wu and Peng Wang}, title = {A New Variant of 3GPP-MAC With Provable Security and Higher Efficiency}, journal = {J. Inf. Sci. Eng.}, volume = {26}, number = {4}, pages = {1539--1552}, year = {2010}, url = {http://www.iis.sinica.edu.tw/page/jise/2010/201007\_24.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ZhangWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WuFW10, author = {Shuang Wu and Dengguo Feng and Wenling Wu}, title = {New Disturbance Vector for {SHA-0} Collision}, journal = {J. Inf. Sci. Eng.}, volume = {26}, number = {6}, pages = {2143--2157}, year = {2010}, url = {http://www.iis.sinica.edu.tw/page/jise/2010/201011\_13.html}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jise/WuFW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ChenZWW10, author = {Haining Chen and Yongbin Zhou and Wenling Wu and Na Wang}, title = {Fault Propagation Pattern Based {DFA} on Feistel Ciphers, with Application to Camellia}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {1050--1057}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.192}, doi = {10.1109/CIT.2010.192}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ChenZWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SuWWD10, author = {Bozhan Su and Wenling Wu and Shuang Wu and Le Dong}, editor = {Swee{-}Huay Heng and Rebecca N. Wright and Bok{-}Min Goi}, title = {Near-Collisions on the Reduced-Round Compression Functions of Skein and {BLAKE}}, booktitle = {Cryptology and Network Security - 9th International Conference, {CANS} 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6467}, pages = {124--139}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17619-7\_10}, doi = {10.1007/978-3-642-17619-7\_10}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/SuWWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuFWS10, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Bozhan Su}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Hyper-Sbox View of AES-like Permutations: {A} Generalized Distinguisher}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {155--168}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_12}, doi = {10.1007/978-3-642-21518-6\_12}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WuFWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangWWZWL10, author = {Liting Zhang and Wenling Wu and Peng Wang and Lei Zhang and Shuang Wu and Bo Liang}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: {PGV} Model Revisited}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {250--269}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_14}, doi = {10.1007/978-3-642-13858-4\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangWWZWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiWZ10, author = {Yanjun Li and Wenling Wu and Lei Zhang}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Integral Attacks on Reduced-Round {ARIA} Block Cipher}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {19--29}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_2}, doi = {10.1007/978-3-642-12827-1\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SuWZL10, author = {Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li}, editor = {Yongwha Chung and Moti Yung}, title = {Full-Round Differential Attack on {TWIS} Block Cipher}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {234--242}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_17}, doi = {10.1007/978-3-642-17955-6\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SuWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuWZ10, author = {Bozhan Su and Wenling Wu and Wentao Zhang}, title = {Differential Cryptanalysis of {SMS4} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2010}, url = {http://eprint.iacr.org/2010/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuWZL10, author = {Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li}, title = {Some Observations on {TWIS} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2010}, url = {http://eprint.iacr.org/2010/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuWWD10, author = {Bozhan Su and Wenling Wu and Shuang Wu and Le Dong}, title = {Near-Collisions on the Reduced-Round Compression Functions of Skein and {BLAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2010}, url = {http://eprint.iacr.org/2010/355}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SuWWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangWZL09, author = {Liting Zhang and Wenling Wu and Lei Zhang and Yanjun Li}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {A note on Cook's elastic block cipher}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {380--383}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533110}, doi = {10.1145/1533057.1533110}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangWZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangWZ09, author = {Lei Zhang and Wenling Wu and Liting Zhang}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Proposition of Two Cipher Structures}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {215--229}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_16}, doi = {10.1007/978-3-642-16342-5\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WuZZZ09, author = {Wenling Wu and Lei Zhang and Liting Zhang and Wentao Zhang}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Security Analysis of the {GF-NLFSR} Structure and Four-Cell Block Cipher}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {17--31}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_4}, doi = {10.1007/978-3-642-11145-7\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WuZZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WuFW09, author = {Shuang Wu and Dengguo Feng and Wenling Wu}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Practical Rebound Attack on 12-Round Cheetah-256}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {300--314}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_20}, doi = {10.1007/978-3-642-14423-3\_20}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/WuFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangWFS09, author = {Wentao Zhang and Wenling Wu and Dengguo Feng and Bozhan Su}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Some New Observations on the {SMS4} Block Cipher in the Chinese {WAPI} Standard}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {324--335}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_28}, doi = {10.1007/978-3-642-00843-6\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangWFS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangFWZ09, author = {Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {On the Correctness of an Approach against Side-Channel Attacks}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {336--344}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_29}, doi = {10.1007/978-3-642-00843-6\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangFWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuFW09, author = {Shuang Wu and Dengguo Feng and Wenling Wu}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Cryptanalysis of the {LANE} Hash Function}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {126--140}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_8}, doi = {10.1007/978-3-642-05445-7\_8}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/WuFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZZZ09, author = {Wenling Wu and Lei Zhang and Liting Zhang and Wentao Zhang}, title = {Security Analysis of the {GF-NLFSR} Structure and Four-Cell Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2009}, url = {http://eprint.iacr.org/2009/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LinWWQ08, author = {Pin Lin and Wenling Wu and Chuankun Wu and Tian Qiu}, title = {Analysis of All-or-Nothing Hash Functions}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {5}, pages = {1473--1484}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200809\_12.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LinWWQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangZW08, author = {Lei Zhang and Wentao Zhang and Wenling Wu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Cryptanalysis of Reduced-Round {SMS4} Block Cipher}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {216--229}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_16}, doi = {10.1007/978-3-540-70500-0\_16}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangFWZ08, author = {Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {On the Unprovable Security of 2-Key {XCBC}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {230--238}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_17}, doi = {10.1007/978-3-540-70500-0\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangFWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangFLW08, author = {Peng Wang and Dengguo Feng and Changlu Lin and Wenling Wu}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Security of Truncated MACs}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {96--114}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_10}, doi = {10.1007/978-3-642-01440-6\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangFLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangWW08, author = {Liting Zhang and Wenling Wu and Peng Wang}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {Extended Models for Message Authentication}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {286--301}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_18}, doi = {10.1007/978-3-642-00730-9\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ZhangWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LinWWQ08, author = {Pin Lin and Wenling Wu and Chuankun Wu and Tian Qiu}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Analysis of Zipper as a Hash Function}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {392--403}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_28}, doi = {10.1007/978-3-540-79104-1\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LinWWQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhangWPKY08, author = {Lei Zhang and Wenling Wu and Je Hong Park and Bonwook Koo and Yongjin Yeom}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Improved Impossible Differential Attacks on Large-Block Rijndael}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {298--315}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_21}, doi = {10.1007/978-3-540-85886-7\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhangWPKY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuZZ08, author = {Wenling Wu and Lei Zhang and Wentao Zhang}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {442--456}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_29}, doi = {10.1007/978-3-642-04159-4\_29}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WuZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangFWZ08, author = {Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang}, title = {On the Correctness of An Approach Against Side-channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2008}, url = {http://eprint.iacr.org/2008/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangFWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuFW08, author = {Shuang Wu and Dengguo Feng and Wenling Wu}, title = {Cryptanalysis of the Hash Function {LUX-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2008}, url = {http://eprint.iacr.org/2008/520}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuFW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuLWF07, author = {ZhenYu Hu and Dongdai Lin and Wenling Wu and Dengguo Feng}, title = {Constructing parallel long-message signcryption scheme from trapdoor permutation}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {50}, number = {1}, pages = {82--98}, year = {2007}, url = {https://doi.org/10.1007/s11432-007-2018-x}, doi = {10.1007/S11432-007-2018-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HuLWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LinWW07, author = {Pin Lin and Wenling Wu and Chuankun Wu}, title = {Security Analysis of Double Length Compression Function Based on Block Cipher}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {121--127}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p121-127.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LinWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangLW07, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, title = {Related-Mode Attacks on {CTR} Encryption Mode}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {282--287}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p282-287.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangLW07a, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, title = {Another Look at {PMAC}}, journal = {Int. J. Netw. Secur.}, volume = {5}, number = {1}, pages = {16--20}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n1/ijns-2007-v5-n1-p16-20.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangLW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/WuZF07, author = {Wenling Wu and Wentao Zhang and Dengguo Feng}, title = {Impossible Differential Cryptanalysis of Reduced-Round {ARIA} and Camellia}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {3}, pages = {449--456}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9056-0}, doi = {10.1007/S11390-007-9056-0}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/WuZF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenWF07, author = {Hua Chen and Wenling Wu and Dengguo Feng}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Differential Fault Analysis on {CLEFIA}}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {284--295}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_22}, doi = {10.1007/978-3-540-77048-0\_22}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChenWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangWF07, author = {Wentao Zhang and Wenling Wu and Dengguo Feng}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {New Results on Impossible Differential Cryptanalysis of Reduced {AES}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {239--250}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_19}, doi = {10.1007/978-3-540-76788-6\_19}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ZhangWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ZhangZWF07, author = {Wentao Zhang and Lei Zhang and Wenling Wu and Dengguo Feng}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Related-Key Differential-Linear Attacks on Reduced {AES-192}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {73--85}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_7}, doi = {10.1007/978-3-540-77026-8\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ZhangZWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WuZL06, author = {Wenling Wu and Wentao Zhang and Dongdai Lin}, title = {Security on Generalized Feistel Scheme with {SP} Round Function}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {3}, pages = {215--224}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p215-224.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WuZL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/Wu06, author = {Wenling Wu}, title = {Pseudorandomness of Camellia-Like Scheme}, journal = {J. Comput. Sci. Technol.}, volume = {21}, number = {1}, pages = {82--88}, year = {2006}, url = {https://doi.org/10.1007/s11390-006-0082-0}, doi = {10.1007/S11390-006-0082-0}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/Wu06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HuFW06, author = {Honggang Hu and Dengguo Feng and Wenling Wu}, title = {Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z\({}_{\mbox{2}}\)\({}^{\mbox{l}}\)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {5}, pages = {2260--2265}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.872850}, doi = {10.1109/TIT.2006.872850}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/HuFW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangLW06, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {An Improved Poly1305 {MAC}}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {284--292}, year = {2006}, url = {https://doi.org/10.1007/11767480\_19}, doi = {10.1007/11767480\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/WangLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangLW06, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {{OPMAC:} One-Key Poly1305 {MAC}}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {78--87}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_7}, doi = {10.1007/11937807\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/YuanWWZ06, author = {Zheng Yuan and Qiaoyan Wen and Wenling Wu and Qing Zhang}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {An \emph{ID}-Based Watermarking Scheme for Java Programs}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {848--857}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_85}, doi = {10.1007/11807964\_85}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/YuanWWZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WangFW06, author = {Peng Wang and Dengguo Feng and Wenling Wu}, editor = {Rana Barua and Tanja Lange}, title = {Symmetric Nonce Respecting Security Model and the {MEM} Mode of Operation}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {280--286}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_20}, doi = {10.1007/11941378\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/WangFW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ZhangWZF06, author = {Wentao Zhang and Wenling Wu and Lei Zhang and Dengguo Feng}, editor = {Eli Biham and Amr M. Youssef}, title = {Improved Related-Key Impossible Differential Attacks on Reduced-Round {AES-192}}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {15--27}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_2}, doi = {10.1007/978-3-540-74462-7\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ZhangWZF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangFW06, author = {Peng Wang and Dengguo Feng and Wenling Wu}, title = {Cryptanalysis of the {MEM} Mode of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2006}, url = {http://eprint.iacr.org/2006/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangFW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZF06, author = {Wenling Wu and Wentao Zhang and Dengguo Feng}, title = {Impossible Differential Cryptanalysis of {ARIA} and Camellia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2006}, url = {http://eprint.iacr.org/2006/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WuF05, author = {Wenling Wu and Dengguo Feng}, title = {Collision attack on reduced-round Camellia}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {48}, number = {1}, pages = {78--90}, year = {2005}, url = {https://doi.org/10.1360/03yf0293}, doi = {10.1360/03YF0293}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WuF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WenWW05, author = {Fengtong Wen and Wenling Wu and Qiaoyan Wen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Error Oracle Attacks on Several Modes of Operation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {62--67}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_9}, doi = {10.1007/11596981\_9}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/WenWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLW05, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Variant of Poly1305 {MAC} and Its Security Proof}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {375--380}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_55}, doi = {10.1007/11596981\_55}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangFW05, author = {Peng Wang and Dengguo Feng and Wenling Wu}, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {{HCTR:} {A} Variable-Input-Length Enciphering Mode}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, pages = {175--188}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548\_15}, doi = {10.1007/11599548\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangFW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WuZF05, author = {Wenling Wu and Wentao Zhang and Dengguo Feng}, editor = {Dongho Won and Seungjoo Kim}, title = {Integral Cryptanalysis of Reduced {FOX} Block Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {229--241}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_20}, doi = {10.1007/11734727\_20}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WuZF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangFW05, author = {Peng Wang and Dengguo Feng and Wenling Wu}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {On the Security of Tweakable Modes of Operation: {TBC} and {TAE}}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {274--287}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_20}, doi = {10.1007/11556992\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangFW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZF05, author = {Wenling Wu and Wentao Zhang and Dengguo Feng}, title = {Improved Integral Cryptanalysis of {FOX} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2005}, url = {http://eprint.iacr.org/2005/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuFC04, author = {Wenling Wu and Dengguo Feng and Hua Chen}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {Collision Attack and Pseudorandomness of Reduced-Round Camellia}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {252--266}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_18}, doi = {10.1007/978-3-540-30564-4\_18}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WuFC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZL04, author = {Wenling Wu and Wentao Zhang and Dongdai Lin}, title = {Security on Generalized Feistel Scheme with {SP} Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2004}, url = {http://eprint.iacr.org/2004/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuF03, author = {Wenling Wu and Dengguo Feng}, title = {Collision Attack on Reduced-Round Camellia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2003}, url = {http://eprint.iacr.org/2003/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WuF02, author = {Wenling Wu and Dengguo Feng}, title = {Linear cryptanalysis of {NUSH} block cipher}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {45}, number = {1}, pages = {59--67}, year = {2002}, url = {https://doi.org/10.1360/02yf9005}, doi = {10.1360/02YF9005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WuF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/WenlingDS00, author = {Wenling Wu and Dengguo Feng and Sihan Qing}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {Power Analysis of {RC6} and Serpent}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {201--209}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 09 Jun 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/WenlingDS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WuLFQ99, author = {Wenling Wu and Bao Li and Dengguo Feng and Sihan Qing}, editor = {Vijay Varadharajan and Yi Mu}, title = {Cryptanalysis of some {AES} Candidate Algorithms}, booktitle = {Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1726}, pages = {13--21}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-47942-0\_3}, doi = {10.1007/978-3-540-47942-0\_3}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/WuLFQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.