Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Torsten Kuhlen
Daniel P. Kennedy
Dan Graur
Boris S. Veroy
Prabhu Goel
Barbara Aquilani
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Chen Ma
Home
/
Author
/
WENLING WU
Author Info
Open Visualization
Name
Affiliation
Papers
WENLING WU
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China 100190
126
Collaborators
Citations
PageRank
120
787
69.06
Referers
Referees
References
1036
937
1289
Search Limit
100
1000
Publications (100 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
0
0.34
2022
New quantum circuit implementations of SM4 and SM3
0
0.34
2022
Some efficient quantum circuit implementations of Camellia
0
0.34
2022
Breaking Lwc Candidates: Sestate And Elephant In Quantum Setting
0
0.34
2021
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count
0
0.34
2021
A New Non-random Property of 4.5-Round PRINCE.
0
0.34
2020
New method to describe the differential distribution table for large S-boxes in MILP and its application
0
0.34
2019
Observations on the Quantum Circuit of the SBox of AES.
0
0.34
2019
The Relationship between the Construction and Solution of the MILP Models and Applications.
0
0.34
2019
Generalized Nonlinear Invariant Attack And A New Design Criterion For Round Constants
0
0.34
2018
New algorithms for the unbalanced generalised birthday problem.
4
0.49
2018
My traces learn what you did in the dark: recovering secret signals without key guesses.
2
0.39
2017
Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers.
0
0.34
2017
Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function.
0
0.34
2017
Direct Construction Of Optimal Rotational-Xor Diffusion Primitives
0
0.34
2017
Meet-In-The-Middle Attacks On Reduced-Round Midori64
2
0.50
2017
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions.
1
0.35
2017
Multi-Key Analysis Of Tweakable Even-Mansour With Applications To Minalpher And Opp
0
0.34
2016
Biclique Attack of Block Cipher SKINNY.
0
0.34
2016
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers.
0
0.34
2016
New Observations on Piccolo Block Cipher.
0
0.34
2016
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version).
0
0.34
2016
New criterion for diffusion property and applications to improved GFS and EGFN
0
0.34
2016
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes.
4
0.43
2015
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON.
0
0.34
2015
A Single Query Forgery Attack on Raviyoyla v1
0
0.34
2015
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure.
0
0.34
2015
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm.
0
0.34
2015
The DBlock family of block ciphers.
4
0.50
2015
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes
2
0.38
2015
Automatic Search for Linear Trails of the SPECK Family
8
0.59
2015
Integral Attack Against Bit-Oriented Block Ciphers.
3
0.47
2015
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
1
0.35
2014
Differential analysis of the Extended Generalized Feistel Networks
1
0.35
2014
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
3
0.39
2014
LHash: A Lightweight Hash Function (Full Version).
1
0.36
2013
Lhash: A Lightweight Hash Function
5
0.50
2013
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core.
0
0.34
2013
Reflection Cryptanalysis of PRINCE-Like Ciphers.
7
0.54
2013
Attacking and Fixing the CS Mode
0
0.34
2013
Cryptanalysis Of The Round-Reduced Gost Hash Function
5
0.42
2013
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
19
0.64
2012
Biclique cryptanalysis of reduced-round piccolo block cipher
28
1.33
2012
Security on LBlock against Biclique Cryptanalysis.
20
0.88
2012
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Gr{\o}stl.
0
0.34
2012
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.
31
1.88
2012
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers
7
0.55
2012
(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others (Extended Version).
0
0.34
2012
Improved key recovery attacks on reduced-round salsa20 and chacha
5
0.49
2012
TrCBC: Another look at CBC-MAC
0
0.34
2012
1
2
50 / page