Shuang Wu

Affiliations:
  • Institute of Software, Chinese Academy of Sciences, Beijing, China


According to our database1, Shuang Wu authored at least 18 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
J. Inf. Sci. Eng., 2014

Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes.
Frontiers Comput. Sci., 2014

2013
LHash: A Lightweight Hash Function (Full Version).
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of the Round-Reduced GOST Hash Function.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

LHash: A Lightweight Hash Function.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.
IACR Cryptol. ePrint Arch., 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Known-Key Distinguisher on Round-Reduced 3D Block Cipher.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Preimage Attacks on Step-Reduced SM3 Hash Function.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
New Disturbance Vector for SHA-0 Collision.
J. Inf. Sci. Eng., 2010

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE.
IACR Cryptol. ePrint Arch., 2010

Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Cryptanalysis of the LANE Hash Function.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Practical Rebound Attack on 12-Round Cheetah-256.
Proceedings of the Information, Security and Cryptology, 2009

2008
Cryptanalysis of the Hash Function LUX-256.
IACR Cryptol. ePrint Arch., 2008


  Loading...