| 2009 |
| 30 | EE | Liting Zhang,
Wenling Wu,
Lei Zhang,
Yanjun Li:
A note on Cook's elastic block cipher.
ASIACCS 2009: 380-383 |
| 29 | EE | Wentao Zhang,
Wenling Wu,
Dengguo Feng,
Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard.
ISPEC 2009: 324-335 |
| 28 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu,
Liting Zhang:
On the Correctness of an Approach against Side-Channel Attacks.
ISPEC 2009: 336-344 |
| 2008 |
| 27 | EE | Lei Zhang,
Wentao Zhang,
Wenling Wu:
Cryptanalysis of Reduced-Round SMS4 Block Cipher.
ACISP 2008: 216-229 |
| 26 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu,
Liting Zhang:
On the Unprovable Security of 2-Key XCBC.
ACISP 2008: 230-238 |
| 25 | EE | Liting Zhang,
Wenling Wu,
Peng Wang:
Extended Models for Message Authentication.
ICISC 2008: 286-301 |
| 24 | EE | Lei Zhang,
Wenling Wu,
Je Hong Park,
Bon Wook Koo,
Yongjin Yeom:
Improved Impossible Differential Attacks on Large-Block Rijndael.
ISC 2008: 298-315 |
| 23 | EE | Pin Lin,
Wenling Wu,
Chuankun Wu,
Tian Qiu:
Analysis of Zipper as a Hash Function.
ISPEC 2008: 392-403 |
| 22 | EE | Peng Wang,
Dengguo Feng,
Changlu Lin,
Wenling Wu:
Security of Truncated MACs.
Inscrypt 2008: 96-114 |
| 21 | EE | Pin Lin,
Wenling Wu,
Chuankun Wu,
Tian Qiu:
Analysis of All-or-Nothing Hash Functions.
J. Inf. Sci. Eng. 24(5): 1473-1484 (2008) |
| 2007 |
| 20 | EE | Hua Chen,
Wenling Wu,
Dengguo Feng:
Differential Fault Analysis on CLEFIA.
ICICS 2007: 284-295 |
| 19 | EE | Wentao Zhang,
Wenling Wu,
Dengguo Feng:
New Results on Impossible Differential Cryptanalysis of Reduced AES.
ICISC 2007: 239-250 |
| 18 | EE | Wentao Zhang,
Lei Zhang,
Wenling Wu,
Dengguo Feng:
Related-Key Differential-Linear Attacks on Reduced AES-192.
INDOCRYPT 2007: 73-85 |
| 17 | EE | Wenling Wu,
Wentao Zhang,
Dengguo Feng:
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia.
J. Comput. Sci. Technol. 22(3): 449-456 (2007) |
| 16 | EE | ZhenYu Hu,
Dongdai Lin,
Wenling Wu,
Dengguo Feng:
Constructing parallel long-message signcryption scheme from trapdoor permutation.
Science in China Series F: Information Sciences 50(1): 82-98 (2007) |
| 2006 |
| 15 | EE | Dayin Wang,
Dongdai Lin,
Wenling Wu:
An Improved Poly1305 MAC.
ACNS 2006: 284-292 |
| 14 | EE | Zheng Yuan,
Qiaoyan Wen,
Wenling Wu,
Qing Zhang:
An ID-Based Watermarking Scheme for Java Programs.
EUC Workshops 2006: 848-857 |
| 13 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.
INDOCRYPT 2006: 280-286 |
| 12 | EE | Dayin Wang,
Dongdai Lin,
Wenling Wu:
OPMAC: One-Key Poly1305 MAC.
Inscrypt 2006: 78-87 |
| 11 | EE | Wentao Zhang,
Wenling Wu,
Lei Zhang,
Dengguo Feng:
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.
Selected Areas in Cryptography 2006: 15-27 |
| 10 | EE | Honggang Hu,
Dengguo Feng,
Wenling Wu:
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/.
IEEE Transactions on Information Theory 52(5): 2260-2265 (2006) |
| 9 | EE | Wenling Wu:
Pseudorandomness of Camellia-Like Scheme.
J. Comput. Sci. Technol. 21(1): 82-88 (2006) |
| 2005 |
| 8 | EE | Dayin Wang,
Dongdai Lin,
Wenling Wu:
A Variant of Poly1305 MAC and Its Security Proof.
CIS (2) 2005: 375-380 |
| 7 | EE | Fengtong Wen,
Wenling Wu,
Qiaoyan Wen:
Error Oracle Attacks on Several Modes of Operation.
CIS (2) 2005: 62-67 |
| 6 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
HCTR: A Variable-Input-Length Enciphering Mode.
CISC 2005: 175-188 |
| 5 | EE | Wenling Wu,
Wentao Zhang,
Dengguo Feng:
Integral Cryptanalysis of Reduced FOX Block Cipher.
ICISC 2005: 229-241 |
| 4 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
On the Security of Tweakable Modes of Operation: TBC and TAE.
ISC 2005: 274-287 |
| 2004 |
| 3 | EE | Wenling Wu,
Dengguo Feng,
Hua Chen:
Collision Attack and Pseudorandomness of Reduced-Round Camellia.
Selected Areas in Cryptography 2004: 252-266 |
| 2000 |
| 2 | | Wenling Wu,
Dengguo Feng,
Sihan Qing:
Power Analysis of RC6 and Serpent.
SEC 2000: 201-209 |
| 1999 |
| 1 | | Wenling Wu,
Bao Li,
Dengguo Feng,
Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms.
ICICS 1999: 13-21 |