On Characterization of Transparency Order for (n,m)-functions
Zhou, Yu, Wei, Yongzhuang, Zhang, Hailong, Li, Luyang, Pasalic, Enes, Wu, Wenling
Published in Information Security and Cryptology (2021)
Published in Information Security and Cryptology (2021)
Get full text
Book Chapter
Collision Attacks on CAESAR Second-Round Candidate: ELmD
Zhang, Jian, Wu, Wenling, Zheng, Yafei
Published in Information Security Practice and Experience (2016)
Published in Information Security Practice and Experience (2016)
Get full text
Book Chapter
An Efficient One-key Carter-Wegman Message Authentication Code
Jin Xu, Dayin Wang, Dongdai Lin, Wenling Wu
Published in 2006 International Conference on Computational Intelligence and Security (01.11.2006)
Published in 2006 International Conference on Computational Intelligence and Security (01.11.2006)
Get full text
Conference Proceeding
Studies on rare earth allyl compounds. IV. The crystal structure of [Li 2(μ-C 3H 5)(C 4H 8O 2) 3] [Ce(η 3-C 3H 5) 4]
Huang, Zuen, Chen, Mingqin, Qiu, Wenjie, Wu, Wenling
Published in Inorganica Chimica Acta (01.12.1987)
Published in Inorganica Chimica Acta (01.12.1987)
Get full text
Journal Article
Security on LBlock against Biclique Cryptanalysis
Wang, Yanfeng, Wu, Wenling, Yu, Xiaoli, Zhang, Lei
Published in Information Security Applications (2012)
Published in Information Security Applications (2012)
Get full text
Book Chapter
Lattice-Based Fault Attacks Against ECMQV
Cao, Weiqiong, Chen, Hua, Feng, Jingyi, Fan, Limin, Wu, Wenling
Published in Constructive Side-Channel Analysis and Secure Design (2018)
Published in Constructive Side-Channel Analysis and Secure Design (2018)
Get full text
Book Chapter
LHash: A Lightweight Hash Function
Wu, Wenling, Wu, Shuang, Zhang, Lei, Zou, Jian, Dong, Le
Published in Information Security and Cryptology (2014)
Published in Information Security and Cryptology (2014)
Get full text
Book Chapter
BCBC: A More Efficient MAC Algorithm
Liang, Bo, Wu, Wenling, Zhang, Liting
Published in Information Security Practice and Experience (2011)
Published in Information Security Practice and Experience (2011)
Get full text
Book Chapter