The SCEAS System
Navigation Menu

Search the dblp DataBase


Wenling Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dayin Wang, Dongdai Lin, Wenling Wu
    An Improved Poly1305 MAC. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:284-292 [Conf]
  2. Dayin Wang, Dongdai Lin, Wenling Wu
    A Variant of Poly1305 MAC and Its Security Proof. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:375-380 [Conf]
  3. Fengtong Wen, Wenling Wu, Qiaoyan Wen
    Error Oracle Attacks on Several Modes of Operation. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:62-67 [Conf]
  4. Peng Wang, Dengguo Feng, Wenling Wu
    HCTR: A Variable-Input-Length Enciphering Mode. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:175-188 [Conf]
  5. Dayin Wang, Dongdai Lin, Wenling Wu
    OPMAC: One-Key Poly1305 MAC. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:78-87 [Conf]
  6. Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang
    An ID-Based Watermarking Scheme for Java Programs. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:848-857 [Conf]
  7. Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing
    Cryptanalysis of some AES Candidate Algorithms. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:13-21 [Conf]
  8. Wenling Wu, Wentao Zhang, Dengguo Feng
    Integral Cryptanalysis of Reduced FOX Block Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:229-241 [Conf]
  9. Peng Wang, Dengguo Feng, Wenling Wu
    Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:280-286 [Conf]
  10. Peng Wang, Dengguo Feng, Wenling Wu
    On the Security of Tweakable Modes of Operation: TBC and TAE. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:274-287 [Conf]
  11. Wenling Wu, Dengguo Feng, Hua Chen
    Collision Attack and Pseudorandomness of Reduced-Round Camellia. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:252-266 [Conf]
  12. Wenling Wu, Dengguo Feng, Sihan Qing
    Power Analysis of RC6 and Serpent. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:201-209 [Conf]
  13. Honggang Hu, Dengguo Feng, Wenling Wu
    Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2260-2265 [Journal]
  14. Hua Chen, Wenling Wu, Dengguo Feng
    Differential Fault Analysis on CLEFIA. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:284-295 [Conf]
  15. Wentao Zhang, Wenling Wu, Dengguo Feng
    New Results on Impossible Differential Cryptanalysis of Reduced AES. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:239-250 [Conf]
  16. Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
    Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:15-27 [Conf]

  17. Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. [Citation Graph (, )][DBLP]

  18. On the Unprovable Security of 2-Key XCBC. [Citation Graph (, )][DBLP]

  19. Cryptanalysis of Reduced-Round SMS4 Block Cipher. [Citation Graph (, )][DBLP]

  20. A note on Cook's elastic block cipher. [Citation Graph (, )][DBLP]

  21. Security of Truncated MACs. [Citation Graph (, )][DBLP]

  22. Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. [Citation Graph (, )][DBLP]

  23. Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. [Citation Graph (, )][DBLP]

  24. Extended Models for Message Authentication. [Citation Graph (, )][DBLP]

  25. Practical Rebound Attack on 12-Round Cheetah-256. [Citation Graph (, )][DBLP]

  26. Related-Key Differential-Linear Attacks on Reduced AES-192. [Citation Graph (, )][DBLP]

  27. Analysis of Zipper as a Hash Function. [Citation Graph (, )][DBLP]

  28. On the Correctness of an Approach against Side-Channel Attacks. [Citation Graph (, )][DBLP]

  29. Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. [Citation Graph (, )][DBLP]

  30. Integral Attacks on Reduced-Round ARIA Block Cipher. [Citation Graph (, )][DBLP]

  31. Improved Impossible Differential Attacks on Large-Block Rijndael. [Citation Graph (, )][DBLP]

  32. Cryptanalysis of the LANE Hash Function. [Citation Graph (, )][DBLP]

  33. Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002