Name
Affiliation
Papers
WENLING WU
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China 100190
126
Collaborators
Citations 
PageRank 
120
787
69.06
Referers 
Referees 
References 
1036
937
1289
Search Limit
1001000
Title
Citations
PageRank
Year
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys00.342022
New quantum circuit implementations of SM4 and SM300.342022
Some efficient quantum circuit implementations of Camellia00.342022
Breaking Lwc Candidates: Sestate And Elephant In Quantum Setting00.342021
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count00.342021
A New Non-random Property of 4.5-Round PRINCE.00.342020
New method to describe the differential distribution table for large S-boxes in MILP and its application00.342019
Observations on the Quantum Circuit of the SBox of AES.00.342019
The Relationship between the Construction and Solution of the MILP Models and Applications.00.342019
Generalized Nonlinear Invariant Attack And A New Design Criterion For Round Constants00.342018
New algorithms for the unbalanced generalised birthday problem.40.492018
My traces learn what you did in the dark: recovering secret signals without key guesses.20.392017
Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers.00.342017
Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function.00.342017
Direct Construction Of Optimal Rotational-Xor Diffusion Primitives00.342017
Meet-In-The-Middle Attacks On Reduced-Round Midori6420.502017
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions.10.352017
Multi-Key Analysis Of Tweakable Even-Mansour With Applications To Minalpher And Opp00.342016
Biclique Attack of Block Cipher SKINNY.00.342016
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers.00.342016
New Observations on Piccolo Block Cipher.00.342016
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version).00.342016
New criterion for diffusion property and applications to improved GFS and EGFN00.342016
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes.40.432015
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON.00.342015
A Single Query Forgery Attack on Raviyoyla v100.342015
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure.00.342015
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm.00.342015
The DBlock family of block ciphers.40.502015
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes20.382015
Automatic Search for Linear Trails of the SPECK Family80.592015
Integral Attack Against Bit-Oriented Block Ciphers.30.472015
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.10.352014
Differential analysis of the Extended Generalized Feistel Networks10.352014
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes30.392014
LHash: A Lightweight Hash Function (Full Version).10.362013
Lhash: A Lightweight Hash Function50.502013
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core.00.342013
Reflection Cryptanalysis of PRINCE-Like Ciphers.70.542013
Attacking and Fixing the CS Mode00.342013
Cryptanalysis Of The Round-Reduced Gost Hash Function50.422013
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks190.642012
Biclique cryptanalysis of reduced-round piccolo block cipher281.332012
Security on LBlock against Biclique Cryptanalysis.200.882012
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Gr{\o}stl.00.342012
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.311.882012
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers70.552012
(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others (Extended Version).00.342012
Improved key recovery attacks on reduced-round salsa20 and chacha50.492012
TrCBC: Another look at CBC-MAC00.342012
  • 1
  • 2