Name
Affiliation
Papers
LEI WANG
The University of Electro-Communications
38
Collaborators
Citations 
PageRank 
58
189
17.55
Referers 
Referees 
References 
293
471
479
Search Limit
100471
Title
Citations
PageRank
Year
Revisiting The Security Of Dbhts Macs: Beyond-Birthday-Bound In The Multi-User Setting00.342021
Secure key-alternating Feistel ciphers without key schedule.10.382021
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing00.342020
A New General Method of Searching for Cubes in Cube Attacks.00.342020
Generic Attacks on Hash Combiners.10.342019
Beyond-birthday secure domain-preserving PRFs from a single permutation00.342019
A Novel Speech Enhancement System Based On The Coherence-Based Algorithm And The Differential Beamforming00.342018
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners.00.342017
Generic Internal State Recovery On Strengthened Hmac: N-Bit Secure Hmac Requires Key In All Blocks00.342016
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.50.402016
Practical Forgeries And Distinguishers Against Paes10.352016
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC.00.342016
Cryptanalysis of JAMBU.00.342015
Bitwise Partial-Sum: A New Tool For Integral Analysis Against Arx Designs00.342015
Immune optimization approach solving multi-objective chance-constrained programming.30.382015
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.50.432015
Known-Key Distinguisher on Full PRESENT.50.422015
Analysis of the CAESAR Candidate Silver.10.392015
Message Extension Attack against Authenticated Encryptions: Application to PANDA00.342014
Updates on Generic Attacks against HMAC and NMAC.90.492014
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks.20.372014
Cryptanalysis of Round-Reduced \mathttLED.00.342013
Improved Cryptanalysis of Reduced RIPEMD-160.40.612013
The parallel-cut meet-in-the-middle attack10.362013
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks190.642012
New truncated differential cryptanalysis on 3d block cipher10.362012
Distinguishers beyond three rounds of the RIPEMD-128/-160 compression functions130.562012
Three-subset meet-in-the-middle attack on reduced XTEA40.392012
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach140.622011
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl190.842010
Finding preimages of tiger up to 23 steps50.612010
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model131.122009
Bit-Free Collision: Application to APOP Attack50.432009
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!40.412009
Security of MD5 challenge and response: extension of APOP password recovery attack140.652008
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5280.942008
Password recovery on challenge and response: impossible differential attack on hash function30.432008
New message difference for MD490.572007