Peng Wang
Orcid: 0000-0002-8003-4686Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- Chinese Academy of Sciences, Data Assurance and Communication Security Research Center,, Beijing, China
- University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
  According to our database1,
  Peng Wang
  authored at least 48 papers
  between 2005 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
    Cybersecur., December, 2025
    
  
    Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
    
  
  2024
    Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
    
  
    Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
    
  
  2023
    IACR Cryptol. ePrint Arch., 2023
    
  
  2022
    Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
    
  
    Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
    
  
    Proceedings of the Information and Communications Security - 24th International Conference, 2022
    
  
  2021
    Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
    
  
  2020
    IACR Cryptol. ePrint Arch., 2020
    
  
    Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
    
  
  2019
    Proceedings of the Information and Communications Security - 21st International Conference, 2019
    
  
  2018
    Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
    
  
    Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
    
  
  2017
    IACR Cryptol. ePrint Arch., 2017
    
  
    Proceedings of the Provable Security, 2017
    
  
  2016
    IACR Cryptol. ePrint Arch., 2016
    
  
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications.
    
  
    Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
    
  
  2015
Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications.
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes.
    
  
    Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
    
  
  2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
    
  
  2013
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
    
  
    IACR Cryptol. ePrint Arch., 2013
    
  
    Proceedings of the Information Security Practice and Experience, 2013
    
  
    Proceedings of the Information and Communications Security - 15th International Conference, 2013
    
  
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks.
    
  
    Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
    
  
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks.
    
  
    Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
    
  
  2012
    Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
    
  
  2011
    Proceedings of the Provable Security - 5th International Conference, 2011
    
  
  2010
    J. Inf. Sci. Eng., 2010
    
  
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.
    
  
    Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
    
  
  2009
    Proceedings of the Information Security Practice and Experience, 2009
    
  
  2008
    Proceedings of the Information Security and Cryptology, 2008
    
  
    Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
    
  
    Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
    
  
  2006
    Proceedings of the Progress in Cryptology, 2006
    
  
  2005
    Proceedings of the Information Security, 8th International Conference, 2005
    
  
    Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005