Shengbao Wu

According to our database1, Shengbao Wu authored at least 9 papers between 2010 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE.
IACR Cryptol. ePrint Arch., 2015

2014
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Integral Attacks on Reduced-Round PRESENT.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
Automatic Search of Truncated Impossible Differentials and Applications.
IACR Cryptol. ePrint Arch., 2012

Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers.
Proceedings of the Progress in Cryptology, 2012

2011
Security Evaluation against Differential Cryptanalysis for Block Cipher Structures.
IACR Cryptol. ePrint Arch., 2011

2010
A Flaw in The Internal State Recovery Attack on ALPHA-MAC.
IACR Cryptol. ePrint Arch., 2010


  Loading...