Shuang Wu
Affiliations:- Institute of Software, Chinese Academy of Sciences, Beijing, China
According to our database1,
Shuang Wu
authored at least 25 papers
between 2008 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
2008
2009
2010
2011
2012
2013
2014
2015
0
1
2
3
4
5
6
7
4
2
3
2
2
1
3
2
2
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
2014
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
J. Inf. Sci. Eng., 2014
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes.
Frontiers Comput. Sci., 2014
2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.
IACR Cryptol. ePrint Arch., 2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Information, Security and Cryptology, 2009
2008