Остановите войну!
for scientists:
default search action
Wei Wang 0035
- > Home > Persons > Wei Wang 0035
Publications
- 2023
- [c12]Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2. Inscrypt (2) 2023: 230-250 - [i15]Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version). IACR Cryptol. ePrint Arch. 2023: 1697 (2023) - 2022
- [j15]Juan Du, Wei Wang, Muzhou Li, Meiqin Wang:
Related-tweakey impossible differential attack on QARMA-128. Sci. China Inf. Sci. 65(2) (2022) - [j14]Ling Sun, Wei Wang, Meiqin Wang:
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Trans. Symmetric Cryptol. 2022(1): 212-219 (2022) - [c11]Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang:
A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis. EUROCRYPT (3) 2022: 115-144 - [c10]Chengcheng Chang, Meiqin Wang, Ling Sun, Wei Wang:
Improved Truncated Differential Distinguishers of AES with Concrete S-Box. INDOCRYPT 2022: 422-445 - [i14]Ling Sun, Wei Wang, Meiqin Wang:
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Cryptol. ePrint Arch. 2022: 151 (2022) - [i13]Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang:
A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis. IACR Cryptol. ePrint Arch. 2022: 243 (2022) - [i12]Ling Sun, Wei Wang, Meiqin Wang:
Key-Recovery Attacks on CRAFT and WARP (Full Version). IACR Cryptol. ePrint Arch. 2022: 997 (2022) - 2021
- [j13]Zishen Zhao, Shiyao Chen, Meiqin Wang, Wei Wang:
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC. Inf. Process. Lett. 171: 106124 (2021) - [j12]Ling Sun, Wei Wang, Meiqin Wang:
Accelerating the Search of Differential and Linear Characteristics with the SAT Method. IACR Trans. Symmetric Cryptol. 2021(1): 269-315 (2021) - [j11]Ling Sun, Wei Wang, Meiqin Wang:
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Trans. Symmetric Cryptol. 2021(2): 199-221 (2021) - [c9]Ling Sun, Wei Wang, Meiqin Wang:
Improved Attacks on GIFT-64. SAC 2021: 246-265 - [i11]Ling Sun, Wei Wang, Meiqin Wang:
Accelerating the Search of Differential and Linear Characteristics with the SAT Method. IACR Cryptol. ePrint Arch. 2021: 213 (2021) - [i10]Ling Sun, Wei Wang, Meiqin Wang:
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. IACR Cryptol. ePrint Arch. 2021: 661 (2021) - [i9]Ling Sun, Wei Wang, Meiqin Wang:
Improved Attacks on GIFT-64. IACR Cryptol. ePrint Arch. 2021: 1179 (2021) - 2020
- [j10]Yanbin Li, Meiqin Wang, Wenqing Liu, Wei Wang:
Cryptanalysis of PRIMATEs. Sci. China Inf. Sci. 63(1): 112106 (2020) - [j9]Ling Sun, Wei Wang, Meiqin Wang:
MILP-aided bit-based division property for primitives with non-bit-permutation linear layers. IET Inf. Secur. 14(1): 12-20 (2020) - [j8]Tingting Cui, Wei Wang, Meiqin Wang:
Distinguisher on full-round compression function of GOST R. Inf. Process. Lett. 156: 105902 (2020) - [j7]Ling Sun, David Gérault, Wei Wang, Meiqin Wang:
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers. IACR Trans. Symmetric Cryptol. 2020(3): 262-287 (2020) - [c8]Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack Against GCM-RUP. CT-RSA 2020: 15-34 - 2019
- [i8]Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack against GCM-RUP. IACR Cryptol. ePrint Arch. 2019: 1359 (2019) - 2018
- [j5]Ling Sun, Wei Wang, Ru Liu, Meiqin Wang:
MILP-aided bit-based division property for ARX ciphers. Sci. China Inf. Sci. 61(11): 118102:1-118102:3 (2018) - [j4]Ling Sun, Wei Wang, Meiqin Wang:
More Accurate Differential Properties of LED64 and Midori64. IACR Trans. Symmetric Cryptol. 2018(3): 93-123 (2018) - 2017
- [j3]Yanbin Li, Guoyan Zhang, Wei Wang, Meiqin Wang:
Cryptanalysis of round-reduced ASCON. Sci. China Inf. Sci. 60(3): 38102 (2017) - [j2]Yu Liu, Huicong Liang, Wei Wang, Meiqin Wang:
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4. Secur. Commun. Networks 2017: 1461520:1-1461520:10 (2017) - [c6]Ling Sun, Wei Wang, Meiqin Wang:
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property. ASIACRYPT (1) 2017: 128-157 - [i7]Ling Sun, Wei Wang, Meiqin Wang:
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property. IACR Cryptol. ePrint Arch. 2017: 860 (2017) - 2016
- [j1]Yu Liu, Kai Fu, Wei Wang, Ling Sun, Meiqin Wang:
Linear cryptanalysis of reduced-round SPECK. Inf. Process. Lett. 116(3): 259-266 (2016) - [i6]Ling Sun, Wei Wang, Meiqin Wang:
MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers. IACR Cryptol. ePrint Arch. 2016: 811 (2016) - [i5]Ling Sun, Wei Wang, Ru Liu, Meiqin Wang:
MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher. IACR Cryptol. ePrint Arch. 2016: 1101 (2016) - 2009
- [c2]Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang:
New Distinguishing Attack on MAC Using Secret-Prefix Method. FSE 2009: 363-374 - [i3]Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang:
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256. IACR Cryptol. ePrint Arch. 2009: 484 (2009)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 06:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint