|
Search the dblp DataBase
Wenling Wu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dayin Wang, Dongdai Lin, Wenling Wu
An Improved Poly1305 MAC. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:284-292 [Conf]
- Dayin Wang, Dongdai Lin, Wenling Wu
A Variant of Poly1305 MAC and Its Security Proof. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:375-380 [Conf]
- Fengtong Wen, Wenling Wu, Qiaoyan Wen
Error Oracle Attacks on Several Modes of Operation. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:62-67 [Conf]
- Peng Wang, Dengguo Feng, Wenling Wu
HCTR: A Variable-Input-Length Enciphering Mode. [Citation Graph (0, 0)][DBLP] CISC, 2005, pp:175-188 [Conf]
- Dayin Wang, Dongdai Lin, Wenling Wu
OPMAC: One-Key Poly1305 MAC. [Citation Graph (0, 0)][DBLP] Inscrypt, 2006, pp:78-87 [Conf]
- Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang
An ID-Based Watermarking Scheme for Java Programs. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:848-857 [Conf]
- Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing
Cryptanalysis of some AES Candidate Algorithms. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:13-21 [Conf]
- Wenling Wu, Wentao Zhang, Dengguo Feng
Integral Cryptanalysis of Reduced FOX Block Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:229-241 [Conf]
- Peng Wang, Dengguo Feng, Wenling Wu
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:280-286 [Conf]
- Peng Wang, Dengguo Feng, Wenling Wu
On the Security of Tweakable Modes of Operation: TBC and TAE. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:274-287 [Conf]
- Wenling Wu, Dengguo Feng, Hua Chen
Collision Attack and Pseudorandomness of Reduced-Round Camellia. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2004, pp:252-266 [Conf]
- Wenling Wu, Dengguo Feng, Sihan Qing
Power Analysis of RC6 and Serpent. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:201-209 [Conf]
- Honggang Hu, Dengguo Feng, Wenling Wu
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2260-2265 [Journal]
- Hua Chen, Wenling Wu, Dengguo Feng
Differential Fault Analysis on CLEFIA. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:284-295 [Conf]
- Wentao Zhang, Wenling Wu, Dengguo Feng
New Results on Impossible Differential Cryptanalysis of Reduced AES. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:239-250 [Conf]
- Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2006, pp:15-27 [Conf]
Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. [Citation Graph (, )][DBLP]
On the Unprovable Security of 2-Key XCBC. [Citation Graph (, )][DBLP]
Cryptanalysis of Reduced-Round SMS4 Block Cipher. [Citation Graph (, )][DBLP]
A note on Cook's elastic block cipher. [Citation Graph (, )][DBLP]
Security of Truncated MACs. [Citation Graph (, )][DBLP]
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. [Citation Graph (, )][DBLP]
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. [Citation Graph (, )][DBLP]
Extended Models for Message Authentication. [Citation Graph (, )][DBLP]
Practical Rebound Attack on 12-Round Cheetah-256. [Citation Graph (, )][DBLP]
Related-Key Differential-Linear Attacks on Reduced AES-192. [Citation Graph (, )][DBLP]
Analysis of Zipper as a Hash Function. [Citation Graph (, )][DBLP]
On the Correctness of an Approach against Side-Channel Attacks. [Citation Graph (, )][DBLP]
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. [Citation Graph (, )][DBLP]
Integral Attacks on Reduced-Round ARIA Block Cipher. [Citation Graph (, )][DBLP]
Improved Impossible Differential Attacks on Large-Block Rijndael. [Citation Graph (, )][DBLP]
Cryptanalysis of the LANE Hash Function. [Citation Graph (, )][DBLP]
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. [Citation Graph (, )][DBLP]
Search in 0.139secs, Finished in 0.140secs
|