Wenling Wu
Orcid: 0000-0001-6244-3489
According to our database1,
Wenling Wu
authored at least 165 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Computers, December, 2024
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes.
Des. Codes Cryptogr., November, 2024
Des. Codes Cryptogr., September, 2024
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori.
Comput. J., February, 2024
IACR Trans. Symmetric Cryptol., 2024
Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACs.
IEEE Trans. Inf. Forensics Secur., 2024
IET Inf. Secur., 2024
Efficient Search for Optimal Permutations of Refined Type-II Generalized Feistel Structures.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure.
Comput. J., January, 2023
IEEE Internet Things J., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
J. Supercomput., 2022
Quantum Inf. Process., 2022
Quantum Inf. Process., 2022
Generic Construction of Boolean Functions with A Few Walsh Transform Values of Any Possible Algebraic Degree.
Adv. Math. Commun., 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
Neural networks trained with high-dimensional functions approximation data in high-dimensional space.
J. Intell. Fuzzy Syst., 2021
Des. Codes Cryptogr., 2021
Transparency Order of (n, m)-Functions - Its Further Characterization and Applications.
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
New method to describe the differential distribution table for large S-boxes in MILP and its application.
IET Inf. Secur., 2019
IACR Cryptol. ePrint Arch., 2019
The Relationship between the Construction and Solution of the MILP Models and Applications.
IACR Cryptol. ePrint Arch., 2019
2018
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.
IACR Trans. Symmetric Cryptol., 2018
IET Inf. Secur., 2018
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512.
Des. Codes Cryptogr., 2018
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions.
Inf. Sci., 2017
Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function.
IET Inf. Secur., 2017
Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers.
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
IACR Trans. Symmetric Cryptol., 2016
J. Comput. Sci. Technol., 2016
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version).
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
My traces learn what you did in the dark: recovering secret signals without key guesses.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes.
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
J. Inf. Sci. Eng., 2014
Inf. Process. Lett., 2014
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function.
IACR Cryptol. ePrint Arch., 2014
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes.
Frontiers Comput. Sci., 2014
Cryptogr. Commun., 2014
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.
IACR Cryptol. ePrint Arch., 2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
J. Inf. Sci. Eng., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Information Security, 2010
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
J. Comput. Sci. Technol., 2007
Int. J. Netw. Secur., 2007
Sci. China Ser. F Inf. Sci., 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
2006
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z<sub>2</sub><sup>l</sup>.
IEEE Trans. Inf. Theory, 2006
Int. J. Netw. Secur., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
2002
2000
Power Analysis of RC6 and Serpent.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999