2009 |
30 | EE | Liting Zhang,
Wenling Wu,
Lei Zhang,
Yanjun Li:
A note on Cook's elastic block cipher.
ASIACCS 2009: 380-383 |
29 | EE | Wentao Zhang,
Wenling Wu,
Dengguo Feng,
Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard.
ISPEC 2009: 324-335 |
28 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu,
Liting Zhang:
On the Correctness of an Approach against Side-Channel Attacks.
ISPEC 2009: 336-344 |
2008 |
27 | EE | Lei Zhang,
Wentao Zhang,
Wenling Wu:
Cryptanalysis of Reduced-Round SMS4 Block Cipher.
ACISP 2008: 216-229 |
26 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu,
Liting Zhang:
On the Unprovable Security of 2-Key XCBC.
ACISP 2008: 230-238 |
25 | EE | Liting Zhang,
Wenling Wu,
Peng Wang:
Extended Models for Message Authentication.
ICISC 2008: 286-301 |
24 | EE | Lei Zhang,
Wenling Wu,
Je Hong Park,
Bon Wook Koo,
Yongjin Yeom:
Improved Impossible Differential Attacks on Large-Block Rijndael.
ISC 2008: 298-315 |
23 | EE | Pin Lin,
Wenling Wu,
Chuankun Wu,
Tian Qiu:
Analysis of Zipper as a Hash Function.
ISPEC 2008: 392-403 |
22 | EE | Peng Wang,
Dengguo Feng,
Changlu Lin,
Wenling Wu:
Security of Truncated MACs.
Inscrypt 2008: 96-114 |
21 | EE | Pin Lin,
Wenling Wu,
Chuankun Wu,
Tian Qiu:
Analysis of All-or-Nothing Hash Functions.
J. Inf. Sci. Eng. 24(5): 1473-1484 (2008) |
2007 |
20 | EE | Hua Chen,
Wenling Wu,
Dengguo Feng:
Differential Fault Analysis on CLEFIA.
ICICS 2007: 284-295 |
19 | EE | Wentao Zhang,
Wenling Wu,
Dengguo Feng:
New Results on Impossible Differential Cryptanalysis of Reduced AES.
ICISC 2007: 239-250 |
18 | EE | Wentao Zhang,
Lei Zhang,
Wenling Wu,
Dengguo Feng:
Related-Key Differential-Linear Attacks on Reduced AES-192.
INDOCRYPT 2007: 73-85 |
17 | EE | Wenling Wu,
Wentao Zhang,
Dengguo Feng:
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia.
J. Comput. Sci. Technol. 22(3): 449-456 (2007) |
16 | EE | ZhenYu Hu,
Dongdai Lin,
Wenling Wu,
Dengguo Feng:
Constructing parallel long-message signcryption scheme from trapdoor permutation.
Science in China Series F: Information Sciences 50(1): 82-98 (2007) |
2006 |
15 | EE | Dayin Wang,
Dongdai Lin,
Wenling Wu:
An Improved Poly1305 MAC.
ACNS 2006: 284-292 |
14 | EE | Zheng Yuan,
Qiaoyan Wen,
Wenling Wu,
Qing Zhang:
An ID-Based Watermarking Scheme for Java Programs.
EUC Workshops 2006: 848-857 |
13 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.
INDOCRYPT 2006: 280-286 |
12 | EE | Dayin Wang,
Dongdai Lin,
Wenling Wu:
OPMAC: One-Key Poly1305 MAC.
Inscrypt 2006: 78-87 |
11 | EE | Wentao Zhang,
Wenling Wu,
Lei Zhang,
Dengguo Feng:
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.
Selected Areas in Cryptography 2006: 15-27 |
10 | EE | Honggang Hu,
Dengguo Feng,
Wenling Wu:
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/.
IEEE Transactions on Information Theory 52(5): 2260-2265 (2006) |
9 | EE | Wenling Wu:
Pseudorandomness of Camellia-Like Scheme.
J. Comput. Sci. Technol. 21(1): 82-88 (2006) |
2005 |
8 | EE | Dayin Wang,
Dongdai Lin,
Wenling Wu:
A Variant of Poly1305 MAC and Its Security Proof.
CIS (2) 2005: 375-380 |
7 | EE | Fengtong Wen,
Wenling Wu,
Qiaoyan Wen:
Error Oracle Attacks on Several Modes of Operation.
CIS (2) 2005: 62-67 |
6 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
HCTR: A Variable-Input-Length Enciphering Mode.
CISC 2005: 175-188 |
5 | EE | Wenling Wu,
Wentao Zhang,
Dengguo Feng:
Integral Cryptanalysis of Reduced FOX Block Cipher.
ICISC 2005: 229-241 |
4 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
On the Security of Tweakable Modes of Operation: TBC and TAE.
ISC 2005: 274-287 |
2004 |
3 | EE | Wenling Wu,
Dengguo Feng,
Hua Chen:
Collision Attack and Pseudorandomness of Reduced-Round Camellia.
Selected Areas in Cryptography 2004: 252-266 |
2000 |
2 | | Wenling Wu,
Dengguo Feng,
Sihan Qing:
Power Analysis of RC6 and Serpent.
SEC 2000: 201-209 |
1999 |
1 | | Wenling Wu,
Bao Li,
Dengguo Feng,
Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms.
ICICS 1999: 13-21 |