
Lei Wang 0031
Person information
- affiliation: Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
- affiliation (former): Nanyang Technological University, School of Physical and Mathematical Sciences, Singapore
- affiliation (PhD 2011): University of Electro-Communications, Japan
- not to be confused with: Lei Wang 0020
Other persons with the same name
- Lei Wang — disambiguation page
- Lei Wang 0001
— University of Wollongong, NSW, Australia (and 1 more)
- Lei Wang 0002 — Imperial College London, UK
- Lei Wang 0003
— University of Connecticut, Department of Electrical and Computer Engineering, Storrs, CT, USA
- Lei Wang 0004 — Chinese Academy of Sciences, Institute of Computing Technology, State Key Laboratory of Computer Architecture, Beijing, China
- Lei Wang 0005
— Dalian University of Technology, School of Software, China (and 1 more)
- Lei Wang 0006 — Tongji University, Department of Electronics and Information, Shanghai, China (and 1 more)
- Lei Wang 0007 — Tongji University, Department of Electronics and Information, Shanghai, China
- Lei Wang 0008 — Huawei Technologies Co. (and 2 more)
- Lei Wang 0009
— Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 3 more)
- Lei Wang 0010 — Instagram, Menlo Park, CA, USA (and 3 more)
- Lei Wang 0011
— National University of Defense Technology, College of Computer, Changsha, China
- Lei Wang 0012
— PLA University of Science and Technology, Nanjing, China
- Lei Wang 0013 — Argonne National Laboratory (and 1 more)
- Lei Wang 0014 — University of Saskatchewan
- Lei Wang 0015 — Fujian University of Technology
- Lei Wang 0016 — Tsinghua University, Department of Automation, Beijing, China
- Lei Wang 0017 — Central South University, School of Information Science and Engineering, Changsha, China
- Lei Wang 0018
— Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, Guangdong Provincial Key Laboratory of Robotics and Intelligent System, China (and 4 more)
- Lei Wang 0019 — Civil Aviation University of China, Tianjin
- Lei Wang 0020 — Institute for Infocomm Research, A*STAR, Singapore (and 1 more)
- Lei Wang 0021 — Microsoft (and 1 more)
- Lei Wang 0022
— Louisiana State University, Department of Geography, Baton Rouge, LA, USA (and 1 more)
- Lei Wang 0023 — Zhejiang University, College of Computer Science, China (and 1 more)
- Lei Wang 0024 — Facebook (and 1 more)
- Lei Wang 0025 — Fraunhofer MEVIS - Institut für Bildgestützte Medizin
- Lei Wang 0026 — University of Minnesota
- Lei Wang 0027 — Bell Labs (and 1 more)
- Lei Wang 0029
— Chinese Academy of Sciences, Shenzhen Insitutes of Advanced Technology, Research Centre for Medical Robotics and Minimally Invasive Surgical Devices, China
- Lei Wang 0030
— Xi'an University of Technology, Faculty of Computer Science and Engineering, China (and 1 more)
- Lei Wang 0032
— Northwestern University, Feinberg School of Medicine, Chicago, USA
- Lei Wang 0033 — Microsoft (and 1 more)
- Lei Wang 0034 — ZTE Cooporations, Beijing China (and 1 more)
- Lei Wang 0035
— Dalian University of Technology, Department of Applied Mathematics, China
- Lei Wang 0036 — Beihang University, Key Laboratory of Fluid Mechanics, China
- Lei Wang 0037 — Beihang University, State Key Lab of Virtual Reality Technology and Systems, China
- Lei Wang 0038 — University of Waterloo, Canada
- Lei Wang 0039 — Rutgers University, USA
- Lei Wang 0040 — University of Washington, Seattle, USA (and 1 more)
- Lei Wang 0041 — Texas A&M Univerity, Department of Computer Science and Engineering, College Station, TX, USA
- Lei Wang 0042
— Southeast University, School of Computer Science and Engineering, Nanjing, China (and 1 more)
- Lei Wang 0043
— Peking University, Department of Psychology, Beijing, China
- Lei Wang 0044
— Columbia University, Department of Mechanical Engineering, New York, NY, USA
- Lei Wang 0045
— Queensland University of Technology, Brisbane, QLD, Australia
- Lei Wang 0046
— British Geological Survey, Keyworth, Nottingham, UK
- Lei Wang 0047
— Bohai University, Department of Mathematics, Jinzhou, China
- Lei Wang 0048
— Huazhong University of Science and Technology, Wuhan, China (and 1 more)
- Lei Wang 0049
— Southwestern University of Finance and Economics, School of Economic Mathematics, Chengdu, China
- Lei Wang 0050
— Nanjing Institute of Technology, School of Automation, China
- Lei Wang 0051
— Henan Polytechnic University, School of Computer Science and Technology, Jiaozuo, China
- Lei Wang 0052
— Harbin Engineering University, College of Automation, Harbin, China
- Lei Wang 0053
— Anhui Polytechnic University, School of Mechanical and Automotive Engineering, Wuhu, China
- Lei Wang 0054
— Nanjing University of Posts and Telecommunications, School of Computer, China (and 1 more)
- Lei Wang 0055
— Beihang University, School of Automation Science and Electrical Engineering, Beijing, China (and 1 more)
- Lei Wang 0056
— Nanchang Hangkong University, Key Laboratory of Image Processing and Pattern Recognition, China (and 1 more)
- Lei Wang 0057
— Harbin Institute of Technology, School of Transportation Science and Engineering, China
- Lei Wang 0058 — Sichuan University, West China Hospital, Department of Radiology, Chengdu, China
- Lei Wang 0059
— Zhejiang University, Institute of Cyber-Systems and Control, Yuquan Campus, China (and 2 more)
- Lei Wang 0060
— Shanghai Jiao Tong University, Department of Automation, Key Laboratory of System Control and Information Processing, China
- Lei Wang 0061
— Xi'an Jiaotong University, School of Electronics and Information Engineering, China
- Lei Wang 0062 — Chinese Academy of Sciences, Institute of Automation, State Key Laboratory of Management and Control for Complex Systems, Beijing, China
- Lei Wang 0063 — Tongji University, Laboratory of Embedded System and Service Computing, Shanghai, China
- Lei Wang 0064 — Tianjin University, School of Chemical Engineering and Technology, China
- Lei Wang 0065 — Chinese Academy of Sciences, Xinjiang Technical Institute of Physics and Chemistry, China Xinjiang Laboratory of Minority Speech and Language Information Processing, Urumqi, China
- Lei Wang 0066 — South China University of Technology, School of Electric Power, Guangzhou, China
- Lei Wang 0067
— University of Macau, Department of Electrical and Computer Engineering, Macau
- Lei Wang 0068
— Wuhan University, School of Electronic Information / Collaborative Innovation Center of Geospatial Technology, China
- Lei Wang 0069
— Xiangtan University, College of Information Engineering / Key Laboratory of Intelligent Computing and Information Processing, China (and 3 more)
- Lei Wang 0070
— NXP Semiconductors, Singapore (and 1 more)
- Lei Wang 0071
— Tsinghua University, Graduate School at Shenzhen, China
- Lei Wang 0072
— Chongqing University, College of Automation / MoE Key Laboratory of Dependable Service in Cyber Physical Society, China
- Lei Wang 0073
— Nanjing Tech University, School of Economics and Management, China
- Lei Wang 0074 — Southern University of Science and Technology, Department of Electrical and Electronic Engineering, Shenzhen, China
- Lei Wang 0075 — University of Stuttgart, Germany
- Lei Wang 0076 — Essen University, Germany
- Lei Wang 0077
— Chinese Academy of Sciences, Institute of Electronics, Key Laboratory of Technology in Geo-Spatial Information Processing and Application System, Beijing, China
- Lei Wang 0078
— Shandong University, School of Information Science and Engineering, Jinan, China (and 1 more)
- Lei Wang 0079
— Xidian University, School of Electronic Engineering, Xi'an, China
- Lei Wang 0080
— University of Stuttgart, Institute of Technical Biochemistry, Germany
- Lei Wang 0081
— Tsinghua University, School of Aerospace Engineering, Beijing, China
- Lei Wang 0082
— Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Lei Wang 0083
— China University of Petroleum (East China), College of Geoscience, Qingdao, China
- Lei Wang 0084
— Wuhan University, LIEMARS, Collaborative Innovation Center for Geospatial Technology, China
- Lei Wang 0085 — Beijing Institute of Health Administration and Medical Information, China (and 1 more)
- Lei Wang 0086
— Chinese Academy of Sciences, Northwest Institute of Eco-Environment and Resources, Lanzhou, China
- Lei Wang 0087
— Harbin University of Science and Technology, China
- Lei Wang 0088
— Beihang University, Institute of Solid Mechanics, Beijing, China
- Lei Wang 0089
— Northwestern Polytechnical University, School of Computer Science and Engineering, Xi'an, China
- Lei Wang 0090
— Wuhan University of Technology, School of Mechanical and Electronic Engineering, China
- Lei Wang 0091
— Tianjin Normal University, Tianjin Key Laboratory of Wireless Mobile Communications and Power Transmission, China
- Lei Wang 0092
— China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China
- Lei Wang 0093
— University of Science and Technology Beijing, School of Computer and Communication Engineering, China
- Lei Wang 0094
— Beihang University, Institute of Solid Mechanics, Beijing, China
- Lei Wang 0095
— Jiangsu University, School of Computer Science and Communication Engineering / Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Zhenjiang, China
- Lei Wang 0096
— Beijing Jiaotong University, School of Computer and Information Technology, Beijing Key Lab of Traffic Data Analysis and Mining, China
- Lei Wang 0097
— North China Electric Power University, School of Mathematics and Physics, Beijing, China
- Lei Wang 0098
— Wuhan University of Science and Technology, MoE Key Laboratory of Metallurgical Equipment and Control Technology, China
- Lei Wang 0099
— National University of Defense Technology, College of Electronic Science and Technology, Changsha, China
- Lei Wang 0100
— National Marine Data and Information Service, Tianjin, China (and 2 more)
- Lei Wang 0101 — Academy of Broadcasting Science, Information Technology Institute, China
- Lei Wang 0102
— Drexel University, School of Biomedical Engineering / CONQUER, Philadelphia, PA, USA (and 1 more)
- Lei Wang 0103
— Chinese Academy of Sciences, Institute of Tibetan Plateau Research, Beijing, China (and 1 more)
- Lei Wang 0104
— Union College, Department of Computer Science, Schenectady, NY, USA (and 1 more)
- Lei Wang 0105 — Nanjing Normal University, School of Geography / MOE Key Laboratory of Virtual Geographic Environment, China (and 1 more)
- Lei Wang 0106
— Shanghai Jiao Tong University, Department of Electronic Engineering, School of Electronic Information and Electrical Engineering, China
- Lei Wang 0107
— Liaoning Technical University, Department of Basic Teaching, Huludao, China
- Lei Wang 0108
— University of Western Australia, Department of Computer Science and Software Engineering, Crawley, WA, Australia (and 2 more)
- Lei Wang 0109
— South China University of Technology, School of Electric Power Engineering, Guangzhou, China
- Lei Wang 0110
— Northeast Forestry University, College of Wildlife Resources, Harbin, China
- Lei Wang 0111 — University of Twente, The Netherlands
- Lei Wang 0112
— Chinese Academy of Sciences, Institute of Electronics, Key Laboratory of Technology in Geo-Spatial information Processing and Application System, Beijing, China
- Lei Wang 0113
— Harbin Institute of Technology, State Key Laboratory of Robotics and Systems, China
- Lei Wang 0114
— China University of Mining and Technology, School of Mechanical and Electrical Engineering, Xuzhou, China
- Lei Wang 0115
— Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China
- Lei Wang 0116
— University of Electronic Science and Technology of China, Department of Electronic Engineering, Chengdu, China
- Lei Wang 0117
— Wuhan University, LIEMARS, China
- Lei Wang 0118
— Nankai University, School of Statistics and Data Science, LPMC & KLMDASR, Tianjin, China
- Lei Wang 0119
— Jiangnan University, MoE Key Laboratory of Eco-Textiles, Wuxi, China
- Lei Wang 0120
— North China University of Science and Technology, Jitang College, Tangshan, China
- Lei Wang 0121
— Zaozhuang University, College of Information Science and Engineering, China (and 2 more)
- Lei Wang 0122
— Shandong University of Technology, School of Computer Science and Technology, Zibo, China (and 1 more)
- Lei Wang 0123
— Ocean University of China, School of Economics, Qingdao, China (and 1 more)
- Lei Wang 0124 — Soochow University, School of Computer Science and Technology / Joint International Research Laboratory of Machine Learning and Neuromorphic Computing, Suzhou, China
- Lei Wang 0125 — Henry Ford Health Sciences Center, Department of Neurology, Detroit, MI, USA
- Lei Wang 0126 — Beihang University, School of Computer Science and Engineering, Beijing, China
- Lei Wang 0127 — Nanyang Technological University, School of Mechanical and Aerospace Engineering, Singapore
- Lei Wang 0128 — Dalian University of Technology, College of Mechanical Engineering, Liaoning, China
- Lei Wang 0129 — Huazhong University of Science and Technology, Tongji Medical College, Union Hospital, Department of Ultrasound, Wuhan, China
- Lei Wang 0130 — Nanjing University of Information Science and Technology, Teachers and Teaching Development Center, China
- Lei Wang 0131
— Soochow University, School of Electronic and Information Engineering, Suzhou Key Laboratory of Advanced Optical Communication Network Technology, Suzhou, China
- Lei Wang 0132
— Northeast Electric Power University, School of Electrical Engineering, Jilin, China
- Lei Wang 0133
— Harbin Institute of Technology, Center of Ultra-Precision Optoelectronic Instrument Engineering, China
- Lei Wang 0134
— Dalian University of Technology, School of Software, Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, China
- Lei Wang 0135
— Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Lei Wang 0136
— China Pharmaceutical University, State Key Laboratory of Natural Medicines / Jiangsu Key Laboratory of Drug Design and Optimization, Nanjing, China
- Lei Wang 0137
— Heriot-Watt University, School of Engineering and Physical Sciences, Edinburgh, UK (and 4 more)
- Lei Wang 0138
— Chinese Academy of Sciences, Xinjiang Technical Institute of Physics and Chemistry, Urumqi, China
- Lei Wang 0139
— Lanzhou Jiaotong University, School of Economics and Management, China
- Lei Wang 0140
— Beijing University of Posts and Telecommunications, School of Digital Media and Design Arts, China
- Lei Wang 0141
— Hefei University of Technology, School of Electronic Science and Applied Physics, China
- Lei Wang 0142
— China Academy of Aerospace Systems Science and Engineering, Beijing, China
- Lei Wang 0143
— Changsha University of Science and Technology, School of Civil Engineering, China
- Lei Wang 0144
— East China Normal University, Shanghai, China
- Lei Wang 0145
— Zhejiang University, School of Mechanical Engineering, State Key Laboratory of Fluid Power and Mechatronic Systems, Hangzhou, China
- Lei Wang 0146
— Jiangnan University, MoE Key Laboratory of Advanced Process Control for Light Industry, Wuxi, China
- Lei Wang 0147
— Wuhan University, School of Electrical Engineering and Automation, China
- Lei Wang 0148
— Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Lei Wang 0149
— Chinese Academy of Medical Sciences, Institute of Biomedical Engineering, Tianjin, China (and 2 more)
- Lei Wang 0150
— Tongji University, College of Transportation Engineering, MoE Key Laboratory of Road and Traffic Engineering, Shanghai, China
- Lei Wang 0151
— Fudan University, School of Computer Science, Shanghai Key Laboratory of Intelligent Information Processing, Shanghai, China
- Lei Wang 0152
— Nanjing University, Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, China
- Lei Wang 0153
— Xi'an Jiaotong University, School of Mechanical Engineering, State Key Laboratory for Manufacturing Systems Engineering, China
- Lei Wang 0154
— Tianjin University of Technology, Department of Mathematics, China
- Lei Wang 0155
— National University of Defense Technology, College of Information and Communication, Wuhan, China
- Lei Wang 0156
— Chinese Academy of Sciences, Nanjing Institute of Geography and Limnology, Key Laboratory of Watershed Geographic Sciences, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j29]Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai:
Secure key-alternating Feistel ciphers without key schedule. Sci. China Inf. Sci. 64(1) (2021) - 2020
- [j28]Zijian Bao
, Qinghao Wang
, Wenbo Shi
, Lei Wang
, Hong Lei
, Bangdao Chen
:
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues. IEEE Access 8: 170404-170420 (2020) - [j27]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. J. Cryptol. 33(3): 742-823 (2020) - [j26]Ying Zou, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping
, Baocang Wang
:
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. Secur. Commun. Networks 2020: 1238505:1-1238505:11 (2020) - [j25]Ying Zou, Yanting Chai, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks. Secur. Commun. Networks 2020: 4938736:1-4938736:12 (2020) - [j24]Yaobin Shen, Chun Guo, Lei Wang:
Improved Security Bounds for Generalized Feistel Networks. IACR Trans. Symmetric Cryptol. 2020(1): 425-457 (2020) - [c54]Yue Li, Han Liu, Zhiqiang Yang, Qian Ren, Lei Wang, Bangdao Chen:
SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart Contracts. ICDCS 2020: 1219-1222 - [c53]Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. ICICS 2020: 369-385 - [c52]Zhiqiang Yang, Han Liu, Yue Li, Huixuan Zheng, Lei Wang, Bangdao Chen:
Seraph: enabling cross-platform security analysis for EVM and WASM smart contracts. ICSE (Companion Volume) 2020: 21-24 - [c51]Yue Li, Han Liu, Zhiqiang Yang, Bin Wang, Qian Ren, Lei Wang, Bangdao Chen:
Protect Your Smart Contract Against Unfair Payment. SRDS 2020: 61-70 - [i32]Yaobin Shen, Chun Guo, Lei Wang:
Improved Security Bounds for Generalized Feistel Networks. IACR Cryptol. ePrint Arch. 2020: 285 (2020) - [i31]Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai:
Secure Key-Alternating Feistel Ciphers Without Key Schedule. IACR Cryptol. ePrint Arch. 2020: 288 (2020)
2010 – 2019
- 2019
- [j23]Chun Guo, Yaobin Shen, Lei Wang, Dawu Gu:
Beyond-birthday secure domain-preserving PRFs from a single permutation. Des. Codes Cryptogr. 87(6): 1297-1322 (2019) - [j22]Hailun Yan, Xuejia Lai, Lei Wang, Yu Yu, Yiran Xing:
New zero-sum distinguishers on full 24-round Keccak-f using the division property. IET Inf. Secur. 13(5): 469-478 (2019) - [j21]Lin Ding
, Lei Wang, Dawu Gu
, Chenhui Jin, Jie Guan:
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping. Secur. Commun. Networks 2019: 7429320:1-7429320:5 (2019) - [j20]Yaobin Shen, Lei Wang:
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs. IACR Trans. Symmetric Cryptol. 2019(2): 146-168 (2019) - [c50]Ying Zou, Xiangyang Zhang, Lei Wang:
XKX Does Not Preserve Unpredictability. CSAE 2019: 95:1-95:5 - [c49]Lin Ding, Dawu Gu, Lei Wang:
Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers. iSCI 2019: 570-582 - [i30]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2019: 755 (2019) - 2018
- [j19]Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, Dawu Gu:
Similar operation template attack on RSA-CRT as a case study. Sci. China Inf. Sci. 61(3): 032111:1-032111:17 (2018) - [j18]Zhenzhen Bao, Jian Guo
, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Trans. Symmetric Cryptol. 2018(1): 201-253 (2018) - [c48]Chun Guo, Lei Wang:
Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security. ASIACRYPT (1) 2018: 213-243 - [c47]Xiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu, Lei Wang:
Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher. ProvSec 2018: 313-326 - [i29]Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Cryptol. ePrint Arch. 2018: 374 (2018) - [i28]Yaobin Shen, Lei Wang, Dawu Gu:
ISO/IEC 9797-1 Revisited: Beyond Birthday Bound. IACR Cryptol. ePrint Arch. 2018: 468 (2018) - [i27]Chun Guo, Lei Wang:
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security. IACR Cryptol. ePrint Arch. 2018: 816 (2018) - 2017
- [c46]Zhenzhen Bao, Lei Wang, Jian Guo
, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. CRYPTO (2) 2017: 404-427 - [i26]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2017: 534 (2017) - 2016
- [j17]Yu Sasaki, Lei Wang:
Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 22-30 (2016) - [j16]Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Forgeries and Distinguishers against PAES. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 39-48 (2016) - [j15]Yu Sasaki, Lei Wang:
Message Extension Attack against Authenticated Encryptions: Application to PANDA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 49-57 (2016) - [c45]Lei Wang, Jian Guo
, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. ASIACRYPT (1) 2016: 455-483 - [c44]Yusuke Naito, Lei Wang:
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. CT-RSA 2016: 397-412 - [i25]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. IACR Cryptol. ePrint Arch. 2016: 876 (2016) - 2015
- [j14]Ivica Nikolic
, Lei Wang, Shuang Wu:
The parallel-cut meet-in-the-middle attack. Cryptogr. Commun. 7(3): 331-345 (2015) - [j13]Yu Sasaki, Gaoli Wang, Lei Wang:
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 26-38 (2015) - [j12]Yu Sasaki, Lei Wang:
Bitwise Partial-Sum: A New Tool for Integral Analysis against ARX Designs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 49-60 (2015) - [c43]Céline Blondeau, Thomas Peyrin
, Lei Wang:
Known-Key Distinguisher on Full PRESENT. CRYPTO (1) 2015: 455-474 - [c42]Gaëtan Leurent
, Lei Wang:
The Sum Can Be Weaker Than Each Part. EUROCRYPT (1) 2015: 345-367 - [c41]Thomas Peyrin
, Siang Meng Sim
, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. FSE 2015: 264-281 - [c40]Jérémy Jean, Yu Sasaki, Lei Wang:
Analysis of the CAESAR Candidate Silver. SAC 2015: 493-509 - [i24]Gaëtan Leurent, Lei Wang:
The Sum Can Be Weaker Than Each Part. IACR Cryptol. ePrint Arch. 2015: 70 (2015) - [i23]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. IACR Cryptol. ePrint Arch. 2015: 75 (2015) - [i22]Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. IACR Cryptol. ePrint Arch. 2015: 149 (2015) - [i21]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. IACR Cryptol. ePrint Arch. 2015: 372 (2015) - [i20]Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced LED. IACR Cryptol. ePrint Arch. 2015: 429 (2015) - [i19]Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-key Distinguisher on Full PRESENT. IACR Cryptol. ePrint Arch. 2015: 575 (2015) - 2014
- [j11]Yu Sasaki, Lei Wang:
Comprehensive Study of Integral Analysis on LBlock. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 127-138 (2014) - [j10]Yu Sasaki, Lei Wang:
Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 177-190 (2014) - [c39]Yu Sasaki, Lei Wang:
Message Extension Attack against Authenticated Encryptions: Application to PANDA. CANS 2014: 82-97 - [c38]Jian Guo
, Thomas Peyrin
, Yu Sasaki, Lei Wang:
Updates on Generic Attacks against HMAC and NMAC. CRYPTO (1) 2014: 131-148 - [c37]Jian Guo
, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. CT-RSA 2014: 402-423 - [c36]Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta:
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. CT-RSA 2014: 424-443 - [c35]Thomas Peyrin
, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-Based MACs. EUROCRYPT 2014: 147-164 - [c34]Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. FSE 2014: 303-322 - [c33]Jian Guo
, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. FSE 2014: 571-590 - [c32]Jian Guo
, Jérémy Jean, Gaëtan Leurent
, Thomas Peyrin
, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. Selected Areas in Cryptography 2014: 195-211 - [c31]Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Cryptanalysis of PAES. Selected Areas in Cryptography 2014: 228-242 - [c30]Yu Sasaki, Lei Wang:
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. SCN 2014: 324-339 - [i18]Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. IACR Cryptol. ePrint Arch. 2014: 183 (2014) - [i17]Jian Guo, Jérémy Jean, Thomas Peyrin, Lei Wang:
Breaking POET Authentication with a Single Query. IACR Cryptol. ePrint Arch. 2014: 197 (2014) - [i16]Yu Sasaki, Lei Wang:
A Forgery Attack against PANDA-s. IACR Cryptol. ePrint Arch. 2014: 217 (2014) - [i15]Yu Sasaki, Lei Wang:
A Practical Universal Forgery Attack against PAES-8. IACR Cryptol. ePrint Arch. 2014: 218 (2014) - [i14]Thomas Peyrin, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-based MACs. IACR Cryptol. ePrint Arch. 2014: 403 (2014) - [i13]Gaëtan Leurent, Thomas Peyrin, Lei Wang:
New Generic Attacks Against Hash-based MACs. IACR Cryptol. ePrint Arch. 2014: 406 (2014) - [i12]Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. IACR Cryptol. ePrint Arch. 2014: 675 (2014) - [i11]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. IACR Cryptol. ePrint Arch. 2014: 931 (2014) - 2013
- [c29]Gaëtan Leurent
, Thomas Peyrin
, Lei Wang:
New Generic Attacks against Hash-Based MACs. ASIACRYPT (2) 2013: 1-20 - [c28]Jian Guo
, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. ASIACRYPT (2) 2013: 21-40 - [c27]Florian Mendel, Thomas Peyrin
, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT (2) 2013: 484-503 - [c26]Jérémy Jean, Ivica Nikolic, Thomas Peyrin
, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. FSE 2013: 92-111 - [c25]Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced \mathttLED. FSE 2013: 112-129 - [c24]Yu Sasaki, Lei Wang:
Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs. ICISC 2013: 189-202 - [c23]Yusuke Naito, Yu Sasaki, Lei Wang, Kan Yasuda:
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. IWSEC 2013: 83-98 - [c22]Yu Sasaki, Lei Wang:
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. Selected Areas in Cryptography 2013: 493-512 - [c21]Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. SECRYPT 2013: 111-122 - [i10]Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. IACR Cryptol. ePrint Arch. 2013: 467 (2013) - [i9]Ivica Nikolic, Lei Wang, Shuang Wu:
The Parallel-Cut Meet-In-The-Middle Attack. IACR Cryptol. ePrint Arch. 2013: 530 (2013) - [i8]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2013: 600 (2013) - [i7]Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang:
Cryptanalysis of Zorro. IACR Cryptol. ePrint Arch. 2013: 713 (2013) - 2012
- [j9]Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 100-110 (2012) - [c20]Yu Sasaki, Lei Wang:
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions. ACNS 2012: 275-292 - [c19]Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta:
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. AFRICACRYPT 2012: 138-154 - [c18]Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu:
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. ASIACRYPT 2012: 562-579 - [c17]Thomas Peyrin
, Yu Sasaki, Lei Wang:
Generic Related-Key Attacks for HMAC. ASIACRYPT 2012: 580-597 - [c16]Yu Sasaki, Lei Wang:
Comprehensive Study of Integral Analysis on 22-Round LBlock. ICISC 2012: 156-169 - [c15]Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
New Truncated Differential Cryptanalysis on 3D Block Cipher. ISPEC 2012: 109-125 - [c14]Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta:
Boomerang Distinguishers for Full HAS-160 Compression Function. IWSEC 2012: 156-169 - [c13]Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. IWSEC 2012: 170-181 - [c12]Yu Sasaki, Lei Wang:
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. Selected Areas in Cryptography 2012: 234-251 - [i6]Yu Sasaki, Lei Wang:
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160. IACR Cryptol. ePrint Arch. 2012: 49 (2012) - [i5]Thomas Peyrin, Yu Sasaki, Lei Wang:
Generic Related-key Attacks for HMAC. IACR Cryptol. ePrint Arch. 2012: 684 (2012) - 2011
- [j8]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 57-70 (2011) - [j7]Lei Wang, Yu Sasaki:
Preimage Attack on 23-Step Tiger. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 110-120 (2011) - [c11]Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama:
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. CT-RSA 2011: 197-212 - [c10]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model. ProvSec 2011: 281-296 - 2010
- [j6]Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro
:
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 84-92 (2010) - [j5]Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro
:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Trans. Inf. Syst. 93-D(5): 1087-1095 (2010) - [c9]Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta:
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. ASIACRYPT 2010: 38-55 - [c8]Lei Wang, Yu Sasaki:
Finding Preimages of Tiger Up to 23 Steps. FSE 2010: 116-133
2000 – 2009
- 2009
- [j4]Lei Wang, Kazuo Ohta, Noboru Kunihiro
:
Near-Collision Attacks on MD4: Applied to MD4-Based Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 76-86 (2009) - [j3]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
:
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 96-104 (2009) - [c7]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! ASIACRYPT 2009: 382-398 - [c6]Kazumaro Aoki, Jian Guo
, Krystian Matusiewicz, Yu Sasaki, Lei Wang:
Preimages for Step-Reduced SHA-2. ASIACRYPT 2009: 578-597 - [c5]Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Bit-Free Collision: Application to APOP Attack. IWSEC 2009: 3-21 - [i4]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability. IACR Cryptol. ePrint Arch. 2009: 40 (2009) - [i3]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model. IACR Cryptol. ePrint Arch. 2009: 75 (2009) - [i2]Yu Sasaki, Lei Wang, Kazumaro Aoki:
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. IACR Cryptol. ePrint Arch. 2009: 479 (2009) - [i1]Yusuke Naito, Lei Wang, Kazuo Ohta:
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models. IACR Cryptol. ePrint Arch. 2009: 550 (2009) - 2008
- [j2]Yu Sasaki, Lei Wang, Noboru Kunihiro
, Kazuo Ohta:
New Message Differences for Collision Attacks on MD4 and MD5. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 55-63 (2008) - [c4]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
:
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. AFRICACRYPT 2008: 290-307 - [c3]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
:
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. CT-RSA 2008: 1-18 - [c2]Lei Wang, Kazuo Ohta, Noboru Kunihiro
:
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. EUROCRYPT 2008: 237-253 - 2007
- [c1]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Message Difference for MD4. FSE 2007: 329-348 - 2006
- [j1]Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro
, Kazuo Ohta:
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1382-1395 (2006)