


Остановите войну!
for scientists:


default search action
Wenling Wu
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j43]Xiaodan Li, Wenling Wu:
Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure. Comput. J. 66(1): 160-173 (2023) - [j42]Bolin Wang
, Wenling Wu:
New Key-Independent Structural Properties of AES-Like Permutations. IEEE Internet Things J. 10(1): 575-583 (2023) - 2022
- [j41]Jian Zou
, Zihao Wei, Siwei Sun, Yiyuan Luo, Qian Liu, Wenling Wu:
Some efficient quantum circuit implementations of Camellia. Quantum Inf. Process. 21(4): 131 (2022) - [j40]Jian Zou
, Liji Li, Zihao Wei, Yiyuan Luo, Qian Liu, Wenling Wu:
New quantum circuit implementations of SM4 and SM3. Quantum Inf. Process. 21(5): 181 (2022) - [j39]Zhongya Zhang
, Wenling Wu, Han Sui, Xiaodan Li:
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys. Quantum Inf. Process. 21(6): 219 (2022) - [j38]Jian Zheng
, Jianfeng Wang, Yanping Chen, Shuping Chen, Jingjin Chen, Wenlong Zhong, Wenling Wu:
Effective approximation of high-dimensional space using neural networks. J. Supercomput. 78(3): 4377-4397 (2022) - [c89]Yuhan Zhang, Wenling Wu, Lei Zhang:
Improved Differential Attack on Round-Reduced LEA. ACISP 2022: 67-84 - [c88]Yongxia Mao, Wenling Wu, Bolin Wang, Li Zhang:
Improved Division Property for Ciphers with Complex Linear Layers. ACISP 2022: 106-124 - [c87]Lei Zhang
, Ruichen Wu, Yuhan Zhang, Yafei Zheng, Wenling Wu:
LLLWBC: A New Low-Latency Light-Weight Block Cipher. Inscrypt 2022: 23-42 - [c86]Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA. CT-RSA 2022: 169-195 - 2021
- [j37]Tairong Shi
, Wenling Wu, Bin Hu, Jie Guan, Sengpeng Wang:
Breaking LWC candidates: sESTATE and Elephant in quantum setting. Des. Codes Cryptogr. 89(7): 1405-1432 (2021) - [j36]Jian Zheng
, Jianfeng Wang, Yanping Chen, Shuping Chen, Jingjin Chen, Wenlong Zhong, Wenling Wu:
Neural networks trained with high-dimensional functions approximation data in high-dimensional space. J. Intell. Fuzzy Syst. 41(2): 3739-3750 (2021) - [c85]Xiaodan Li, Wenling Wu:
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. ACISP 2021: 132-150 - [c84]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
On Characterization of Transparency Order for (n, m)-functions. Inscrypt 2021: 351-370 - [c83]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
Transparency Order of (n, m)-Functions - Its Further Characterization and Applications. ISC 2021: 139-157 - 2020
- [c82]Jian Zou, Zihao Wei, Siwei Sun, Ximeng Liu, Wenling Wu:
Quantum Circuit Implementations of AES with Fewer Qubits. ASIACRYPT (2) 2020: 697-726 - [c81]Bolin Wang, Chan Song, Wenling Wu, Lei Zhang:
A New Non-random Property of 4.5-Round PRINCE. ICISC 2020: 199-212 - [e1]Khoa Nguyen
, Wenling Wu, Kwok-Yan Lam, Huaxiong Wang:
Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12505, Springer 2020, ISBN 978-3-030-62575-7 [contents] - [i29]Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Xi, Haoyuan Li, Limin Fan, Wenling Wu:
Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA. IACR Cryptol. ePrint Arch. 2020: 803 (2020)
2010 – 2019
- 2019
- [j35]Yafei Zheng, Wenling Wu:
On the extension and security of key schedule of GOST. IET Inf. Secur. 13(2): 125-132 (2019) - [j34]Lingchen Li
, Wenling Wu, Lei Zhang, Yafei Zheng:
New method to describe the differential distribution table for large S-boxes in MILP and its application. IET Inf. Secur. 13(5): 479-485 (2019) - [i28]Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang:
The Relationship between the Construction and Solution of the MILP Models and Applications. IACR Cryptol. ePrint Arch. 2019: 49 (2019) - [i27]Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong:
Observations on the Quantum Circuit of the SBox of AES. IACR Cryptol. ePrint Arch. 2019: 1245 (2019) - 2018
- [j33]Li Lin, Wenling Wu:
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. Des. Codes Cryptogr. 86(4): 721-741 (2018) - [j32]Jian Zou, Le Dong
, Wenling Wu:
New algorithms for the unbalanced generalised birthday problem. IET Inf. Secur. 12(6): 527-533 (2018) - [j31]Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic:
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. IACR Trans. Symmetric Cryptol. 2018(4): 62-79 (2018) - [c80]Weiqiong Cao, Hua Chen, Jingyi Feng, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks Against ECMQV. COSADE 2018: 101-116 - 2017
- [j30]Lei Zhang, Wenling Wu:
Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. IET Inf. Secur. 11(3): 121-128 (2017) - [j29]Yongzhuang Wei, Enes Pasalic
, Fengrong Zhang, Wenling Wu, Cheng-Xiang Wang
:
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions. Inf. Sci. 415: 377-396 (2017) - [j28]Li Lin, Wenling Wu:
Meet-in-the-Middle Attacks on Reduced-Round Midori64. IACR Trans. Symmetric Cryptol. 2017(1): 215-239 (2017) - [j27]Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin:
Direct Construction of Optimal Rotational-XOR Diffusion Primitives. IACR Trans. Symmetric Cryptol. 2017(4): 169-187 (2017) - [c79]Si Gao
, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma:
My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses. CT-RSA 2017: 363-378 - [c78]Lingchen Li
, Wenling Wu, Lei Zhang:
Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. ICICS 2017: 502-508 - [c77]Li Lin, Wenling Wu, Yafei Zheng:
Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers. ISC 2017: 58-76 - 2016
- [j26]Yanfeng Wang, Wenling Wu:
New criterion for diffusion property and applications to improved GFS and EGFN. Des. Codes Cryptogr. 81(3): 393-412 (2016) - [j25]Yuan Yao, Bin Zhang, Wenling Wu:
Utilizing Probabilistic Linear Equations in Cube Attacks. J. Comput. Sci. Technol. 31(2): 317-325 (2016) - [j24]Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang:
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP. IACR Trans. Symmetric Cryptol. 2016(2): 288-306 (2016) - [c76]Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma:
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. CANS 2016: 3-18 - [c75]Yafei Zheng, Wenling Wu:
Biclique Attack of Block Cipher SKINNY. Inscrypt 2016: 3-17 - [c74]Yanfeng Wang, Wenling Wu:
New Observations on Piccolo Block Cipher. CT-RSA 2016: 378-393 - [c73]Li Lin, Wenling Wu, Yafei Zheng:
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. FSE 2016: 247-267 - [c72]Jian Zhang, Wenling Wu, Yafei Zheng:
Security of SM4 Against (Related-Key) Differential Cryptanalysis. ISPEC 2016: 65-78 - [c71]Jian Zhang, Wenling Wu, Yafei Zheng:
Collision Attacks on CAESAR Second-Round Candidate: ELmD. ISPEC 2016: 122-136 - [c70]Huiling Zhang, Wenling Wu:
Structural Evaluation for Simon-Like Designs Against Integral Attack. ISPEC 2016: 194-208 - [i26]Li Lin, Wenling Wu, Yafei Zheng:
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version). IACR Cryptol. ePrint Arch. 2016: 414 (2016) - [i25]Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512. IACR Cryptol. ePrint Arch. 2016: 722 (2016) - [i24]Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin:
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers. IACR Cryptol. ePrint Arch. 2016: 1036 (2016) - [i23]Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma:
My traces learn what you did in the dark: recovering secret signals without key guesses. IACR Cryptol. ePrint Arch. 2016: 1082 (2016) - [i22]Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang:
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP. IACR Cryptol. ePrint Arch. 2016: 1098 (2016) - 2015
- [j23]Wenling Wu, Lei Zhang, Xiaoli Yu:
The DBlock family of block ciphers. Sci. China Inf. Sci. 58(3): 1-14 (2015) - [j22]Le Dong
, Yanling Wang, Wenling Wu, Jian Zou:
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. IET Inf. Secur. 9(5): 277-283 (2015) - [j21]Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg
, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. J. Cryptol. 28(3): 718-744 (2015) - [c69]Yuan Yao, Bin Zhang, Wenling Wu:
A Single Query Forgery Attack on Raviyoyla v1. AsiaCCS 2015: 671 - [c68]Weiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm. ICICS 2015: 62-70 - [c67]Huiling Zhang, Wenling Wu, Yanfeng Wang:
Integral Attack Against Bit-Oriented Block Ciphers. ICISC 2015: 102-118 - [c66]Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm. ICISC 2015: 297-313 - [c65]Huiling Zhang, Wenling Wu:
Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. INDOCRYPT 2015: 218-237 - [c64]Yuan Yao, Bin Zhang, Wenling Wu:
Automatic Search for Linear Trails of the SPECK Family. ISC 2015: 158-176 - [c63]Li Lin, Wenling Wu, Yafei Zheng:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. SAC 2015: 122-142 - [c62]Zhiyuan Guo, Wenling Wu, Si Gao:
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure. SAC 2015: 352-372 - [i21]Li Lin, Wenling Wu:
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. IACR Cryptol. ePrint Arch. 2015: 51 (2015) - [i20]Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. IACR Cryptol. ePrint Arch. 2015: 159 (2015) - [i19]Li Lin, Wenling Wu:
Meet-in-the-Middle Attacks on Reduced-Round Midori-64. IACR Cryptol. ePrint Arch. 2015: 1165 (2015) - 2014
- [j20]Xinxin Gong, Bin Zhang, Wenling Wu, Dengguo Feng:
Computing Walsh coefficients from the algebraic normal form of a Boolean function. Cryptogr. Commun. 6(4): 335-358 (2014) - [j19]Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. Frontiers Comput. Sci. 8(3): 513-525 (2014) - [j18]Lei Zhang, Wenling Wu:
Differential analysis of the Extended Generalized Feistel Networks. Inf. Process. Lett. 114(12): 723-727 (2014) - [j17]Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. J. Inf. Sci. Eng. 30(6): 1789-1806 (2014) - [c61]Yanfeng Wang, Wenling Wu:
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. ACISP 2014: 1-16 - [c60]Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu:
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. ACNS 2014: 308-323 - [i18]Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Wenling Wu:
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function. IACR Cryptol. ePrint Arch. 2014: 971 (2014) - 2013
- [c59]Shengbao Wu, Hongjun Wu
, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE. ASIACRYPT (1) 2013: 377-404 - [c58]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function. Inscrypt 2013: 291-308 - [c57]Jian Zou, Wenling Wu, Shuang Wu:
Cryptanalysis of the Round-Reduced GOST Hash Function. Inscrypt 2013: 309-322 - [c56]Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg
, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. FSE 2013: 71-91 - [c55]Han Sui, Wenling Wu, Liting Zhang, Peng Wang:
Attacking and Fixing the CS Mode. ICICS 2013: 318-330 - [c54]Xiaoqian Li, Bao Li, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma:
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core. ICISC 2013: 158-172 - [c53]Li Lin, Wenling Wu, Yanfeng Wang, Lei Zhang:
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. ICISC 2013: 203-223 - [c52]Peng Wang, Wenling Wu, Liting Zhang:
Cryptanalysis of the OKH Authenticated Encryption Scheme. ISPEC 2013: 353-360 - [i17]Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu:
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. IACR Cryptol. ePrint Arch. 2013: 775 (2013) - [i16]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function (Full Version). IACR Cryptol. ePrint Arch. 2013: 867 (2013) - 2012
- [j16]Liting Zhang, Wenling Wu, Peng Wang, Bo Liang:
TrCBC: Another look at CBC-MAC. Inf. Process. Lett. 112(7): 302-307 (2012) - [c51]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu:
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. ACNS 2012: 117-134 - [c50]Liting Zhang, Wenling Wu, Han Sui, Peng Wang:
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. ASIACRYPT 2012: 296-312 - [c49]Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu:
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. ASIACRYPT 2012: 562-579 - [c48]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. FSE 2012: 127-145 - [c47]Zhenqing Shi, Bin Zhang, Dengguo Feng, Wenling Wu:
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. ICISC 2012: 337-351 - [c46]Yanfeng Wang, Wenling Wu, Xiaoli Yu:
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher. ISPEC 2012: 337-352 - [c45]Shengbao Wu, Mingsheng Wang, Wenling Wu:
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions. Selected Areas in Cryptography 2012: 355-371 - [c44]Yanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang:
Security on LBlock against Biclique Cryptanalysis. WISA 2012: 1-14 - [i15]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). IACR Cryptol. ePrint Arch. 2012: 206 (2012) - [i14]Peng Wang, Wenling Wu, Liting Zhang:
Cryptanalysis of the OKH Authenticated Encryption Scheme. IACR Cryptol. ePrint Arch. 2012: 580 (2012) - [i13]Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. IACR Cryptol. ePrint Arch. 2012: 686 (2012) - 2011
- [j15]Liting Zhang, Wenling Wu, Lei Zhang, Peng Wang:
CBCR: CBC MAC with rotating transformations. Sci. China Inf. Sci. 54(11): 2247-2255 (2011) - [c43]Wenling Wu, Lei Zhang:
LBlock: A Lightweight Block Cipher. ACNS 2011: 327-344 - [c42]Xiaoli Yu, Wenling Wu, Yanjun Li, Lei Zhang:
Cryptanalysis of Reduced-Round KLEIN Block Cipher. Inscrypt 2011: 237-250 - [c41]Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su, Le Dong:
Preimage Attacks on Step-Reduced SM3 Hash Function. ICISC 2011: 375-390 - [c40]Bo Liang, Wenling Wu, Liting Zhang:
BCBC: A More Efficient MAC Algorithm. ISPEC 2011: 233-246 - [c39]Liting Zhang, Wenling Wu, Peng Wang:
PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers. ProvSec 2011: 266-280 - [c38]Yanjun Li, Wenling Wu, Lei Zhang:
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher. WISA 2011: 28-39 - [c37]Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-Key Distinguisher on Round-Reduced 3D Block Cipher. WISA 2011: 55-69 - [i12]Wenling Wu, Lei Zhang:
LBlock: A Lightweight Block Cipher. IACR Cryptol. ePrint Arch. 2011: 345 (2011) - 2010
- [j14]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng:
Some results on cryptanalysis of SMS4 block cipher. Int. J. Appl. Cryptogr. 2(1): 60-67 (2010) - [j13]Liting Zhang, Wenling Wu, Peng Wang:
A New Variant of 3GPP-MAC With Provable Security and Higher Efficiency. J. Inf. Sci. Eng. 26(4): 1539-1552 (2010) - [j12]Shuang Wu, Dengguo Feng, Wenling Wu:
New Disturbance Vector for SHA-0 Collision. J. Inf. Sci. Eng. 26(6): 2143-2157 (2010) - [c36]Haining Chen, Yongbin Zhou, Wenling Wu, Na Wang:
Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. CIT 2010: 1050-1057 - [c35]Bozhan Su, Wenling Wu, Shuang Wu, Le Dong:
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. CANS 2010: 124-139 - [c34]Shuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su:
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. Inscrypt 2010: 155-168 - [c33]Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, Bo Liang:
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. FSE 2010: 250-269 - [c32]Yanjun Li, Wenling Wu, Lei Zhang:
Integral Attacks on Reduced-Round ARIA Block Cipher. ISPEC 2010: 19-29 - [c31]Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li:
Full-Round Differential Attack on TWIS Block Cipher. WISA 2010: 234-242 - [i11]Bozhan Su, Wenling Wu, Wentao Zhang:
Differential Cryptanalysis of SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2010: 62 (2010) - [i10]Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li:
Some Observations on TWIS Block Cipher. IACR Cryptol. ePrint Arch. 2010: 66 (2010) - [i9]Bozhan Su, Wenling Wu, Shuang Wu, Le Dong:
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. IACR Cryptol. ePrint Arch. 2010: 355 (2010)
2000 – 2009
- 2009
- [c30]Liting Zhang, Wenling Wu, Lei Zhang, Yanjun Li:
A note on Cook's elastic block cipher. AsiaCCS 2009: 380-383 - [c29]Lei Zhang, Wenling Wu, Liting Zhang:
Proposition of Two Cipher Structures. Inscrypt 2009: 215-229 - [c28]Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang:
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. ICICS 2009: 17-31 - [c27]Shuang Wu, Dengguo Feng, Wenling Wu:
Practical Rebound Attack on 12-Round Cheetah-256. ICISC 2009: 300-314 - [c26]Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335 - [c25]Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Correctness of an Approach against Side-Channel Attacks. ISPEC 2009: 336-344 - [c24]