Wenling Wu

From MaRDI portal
Person:244675

Available identifiers

zbMath Open wu.wenlingMaRDI QIDQ244675

List of research outcomes

PublicationDate of PublicationType
LLLWBC: a new low-latency light-weight block cipher2023-08-21Paper
Post-quantum security on the Lai-Massey scheme2023-07-28Paper
Improved differential attack on round-reduced LEA2023-07-26Paper
Generic construction of Boolean functions with a few Walsh transform values of any possible algebraic degree2023-07-07Paper
Quantum circuit implementations of AES with fewer qubits2023-03-21Paper
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys2022-12-05Paper
New quantum circuit implementations of SM4 and SM32022-12-05Paper
Some efficient quantum circuit implementations of Camellia2022-11-29Paper
Transparency order of \((n, m)\)-functions -- its further characterization and applications2022-07-13Paper
Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA2022-07-06Paper
On characterization of transparency order for \((n, m)\)-functions2022-07-01Paper
A new non-random property of 4.5-round PRINCE2022-03-24Paper
Breaking LWC candidates: sESTATE and Elephant in quantum setting2021-06-24Paper
Lattice-Based Fault Attacks Against ECMQV2020-07-20Paper
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions2020-07-02Paper
Coordination of advertising free riding in hybrid channel supply chain2019-02-20Paper
Security of SM4 against (related-key) differential cryptanalysis2018-12-07Paper
Linear regression attack with F-test: a new SCARE technique for secret block ciphers2018-10-26Paper
Security of online AE schemes in RUP setting2018-10-26Paper
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE2018-05-09Paper
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/5122018-04-10Paper
Biclique Attack of Block Cipher SKINNY2017-05-05Paper
My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses2017-04-12Paper
New criterion for diffusion property and applications to improved GFS and EGFN2016-10-21Paper
https://portal.mardi4nfdi.de/entity/Q29932142016-08-10Paper
Integral Attack Against Bit-Oriented Block Ciphers2016-05-19Paper
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm2016-05-19Paper
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes2016-05-19Paper
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure2016-05-19Paper
New Observations on Piccolo Block Cipher2016-04-08Paper
Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE2016-01-12Paper
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions2015-12-04Paper
LHash: A Lightweight Hash Function2015-12-02Paper
Cryptanalysis of the Round-Reduced GOST Hash Function2015-12-02Paper
The DBlock family of block ciphers2015-11-20Paper
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes2015-11-20Paper
First Multidimensional Cryptanalysis on Reduced-Round $$\mathrm{PRINCE }_{core}$$2015-10-16Paper
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher2015-10-16Paper
Reflection Cryptanalysis of PRINCE-Like Ciphers2015-09-18Paper
Reflection cryptanalysis of PRINCE-like ciphers2015-08-03Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function2014-10-08Paper
Attacking and Fixing the CS Mode2014-09-29Paper
Differential analysis of the extended generalized Feistel networks2014-08-28Paper
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE2014-07-24Paper
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro2014-07-07Paper
Security of the SMS4 block cipher against differential cryptanalysis2014-02-06Paper
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE2013-12-10Paper
CBCR: CBC MAC with rotating transformations2013-07-03Paper
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha2013-06-04Paper
https://portal.mardi4nfdi.de/entity/Q49150202013-04-16Paper
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound2013-03-19Paper
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks2013-03-19Paper
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others2013-01-08Paper
Cryptanalysis of Reduced-Round KLEIN Block Cipher2013-01-07Paper
Preimage Attacks on Step-Reduced SM3 Hash Function2012-11-01Paper
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers2012-09-10Paper
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher2012-06-29Paper
TrCBC: another look at CBC-MAC2012-05-04Paper
PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers2011-09-16Paper
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher2011-07-29Paper
LBlock: A Lightweight Block Cipher2011-06-28Paper
BCBC: A More Efficient MAC Algorithm2011-05-19Paper
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE2010-12-07Paper
Proposition of Two Cipher Structures2010-11-23Paper
Some results on cryptanalysis of SMS4 block cipher2010-09-22Paper
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited2010-07-13Paper
Cryptanalysis of the LANE Hash Function2009-12-09Paper
https://portal.mardi4nfdi.de/entity/Q36403882009-11-11Paper
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia2009-11-03Paper
Security of Truncated MACs2009-04-29Paper
https://portal.mardi4nfdi.de/entity/Q36109372009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110022009-03-06Paper
OPMAC: One-Key Poly1305 MAC2009-01-15Paper
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/2008-12-21Paper
Improved Impossible Differential Attacks on Large-Block Rijndael2008-11-20Paper
Cryptanalysis of Reduced-Round SMS4 Block Cipher2008-07-08Paper
On the Unprovable Security of 2-Key XCBC2008-07-08Paper
New Results on Impossible Differential Cryptanalysis of Reduced AES2008-05-06Paper
Related-Key Differential-Linear Attacks on Reduced AES-1922008-04-11Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation2008-04-11Paper
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-1922007-11-29Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation2007-08-31Paper
Applied Cryptography and Network Security2007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Linear cryptanalysis of NUSH block cipher2007-02-20Paper
Collision attack on reduced-round Camellia2007-02-20Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Pseudorandomness of Camellia-like scheme2006-10-12Paper
Selected Areas in Cryptography2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q57010012005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q48257492004-11-05Paper
https://portal.mardi4nfdi.de/entity/Q49453822000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q38384461998-10-25Paper
https://portal.mardi4nfdi.de/entity/Q43762921998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q43763151997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48691001996-07-01Paper
https://portal.mardi4nfdi.de/entity/Q43003481995-08-24Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Wenling Wu