Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher
Wu, Shuang, Feng, Dengguo, Wu, Wenling, Su, Bozhan
Published in Information Security and Cryptology (2011)
Published in Information Security and Cryptology (2011)
Get full text
Book Chapter
Identification of HBsAg-specific antibodies from a mammalian cell displayed full-length human antibody library of healthy immunized donor
Li, Chang-Zheng, Liang, Zhong-Kun, Chen, Zhen-Rui, Lou, Hai-Bo, Zhou, Ye, Zhang, Zhe-Huan, Yu, Fei, Liu, Shuwen, Zhou, Yuanping, Wu, Shuguang, Zheng, Wenling, Tan, Wanlong, Jiang, Shibo, Zhou, Chen
Published in Cellular & molecular immunology (01.03.2012)
Published in Cellular & molecular immunology (01.03.2012)
Get full text
Journal Article
Cryptanalysis of the OKH Authenticated Encryption Scheme
Wang, Peng, Wu, Wenling, Zhang, Liting
Published in Information Security Practice and Experience (2013)
Published in Information Security Practice and Experience (2013)
Get full text
Book Chapter
Reflection Cryptanalysis of PRINCE-Like Ciphers
Soleimany, Hadi, Blondeau, Céline, Yu, Xiaoli, Wu, Wenling, Nyberg, Kaisa, Zhang, Huiling, Zhang, Lei, Wang, Yanfeng
Published in Fast Software Encryption (2014)
Published in Fast Software Encryption (2014)
Get full text
Book Chapter
Cryptanalysis of Reduced-Round KLEIN Block Cipher
Yu, Xiaoli, Wu, Wenling, Li, Yanjun, Zhang, Lei
Published in Information Security and Cryptology (2012)
Published in Information Security and Cryptology (2012)
Get full text
Book Chapter
Preimage Attacks on Step-Reduced SM3 Hash Function
Zou, Jian, Wu, Wenling, Wu, Shuang, Su, Bozhan, Dong, Le
Published in Information Security and Cryptology - ICISC 2011 (2012)
Published in Information Security and Cryptology - ICISC 2011 (2012)
Get full text
Book Chapter
Attacking and Fixing the CS Mode
Sui, Han, Wu, Wenling, Zhang, Liting, Wang, Peng
Published in Information and Communications Security (2013)
Published in Information and Communications Security (2013)
Get full text
Book Chapter
Full-Round Differential Attack on TWIS Block Cipher
Su, Bozhan, Wu, Wenling, Zhang, Lei, Li, Yanjun
Published in Information Security Applications (2011)
Published in Information Security Applications (2011)
Get full text
Book Chapter
On the Unprovable Security of 2-Key XCBC
Wang, Peng, Feng, Dengguo, Wu, Wenling, Zhang, Liting
Published in Information Security and Privacy (2008)
Published in Information Security and Privacy (2008)
Get full text
Book Chapter