Peng Wang
Orcid: 0000-0002-8003-4686Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- Chinese Academy of Sciences, Data Assurance and Communication Security Research Center,, Beijing, China
- University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
According to our database1,
Peng Wang
authored at least 44 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Provable Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
2015
Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications.
IACR Cryptol. ePrint Arch., 2015
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
IACR Cryptol. ePrint Arch., 2013
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Provable Security - 5th International Conference, 2011
2010
J. Inf. Sci. Eng., 2010
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2006
Proceedings of the Progress in Cryptology, 2006
2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005