Wei Li

Orcid: 0000-0003-0887-3116

Affiliations:
  • Donghua University, School of Computer Science and Technology, Shanghai, China
  • Shanghai Jiao Tong University, China (PhD 2009)


According to our database1, Wei Li authored at least 42 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Ciphertext-only fault analysis of GIFT lightweight cryptosystem.
Sci. China Inf. Sci., 2022

2021
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Compact Deep Neural Networks via Soft and Smooth Filter Pruning.
Proceedings of the Design Studies and Intelligence Engineering, 2021

2020
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256.
Comput. J., 2020

New insights on linear cryptanalysis.
Sci. China Inf. Sci., 2020

Ciphertext-only fault analysis on the Midori lightweight cryptosystem.
Sci. China Inf. Sci., 2020

Improved Cryptanalysis of Reduced-Version QARMA-64/128.
IEEE Access, 2020

2019
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019

New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario.
KSII Trans. Internet Inf. Syst., 2019

Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC.
Comput. J., 2019

Improved impossible differential cryptanalysis of large-block Rijndael.
Sci. China Inf. Sci., 2019

2018
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2018

Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
KSII Trans. Internet Inf. Syst., 2018

Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128.
Comput. J., 2018

Improved meet-in-the-middle attacks on reduced-round Piccolo.
Sci. China Inf. Sci., 2018

Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs.
Sci. China Inf. Sci., 2018

2017
Security Analysis of the Whirlpool Hash Function in the Cloud of Things.
KSII Trans. Internet Inf. Syst., 2017

2016
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2016

Improved impossible differential attack on reduced version of Camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> functions.
IET Inf. Secur., 2016

2015
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers.
Secur. Commun. Networks, 2015

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things.
KSII Trans. Internet Inf. Syst., 2015

2013
Differential Fault Analysis on the MD5 Compression Function.
J. Comput., 2013

Research and Appliance of the Zero-burden based SoS Comprehensive Evaluation Method.
Proceedings of the Complex Adaptive Systems 2013 Conference, 2013

2012
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256.
J. Syst. Softw., 2012

Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher.
J. Networks, 2012

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network.
Int. J. Comput. Intell. Syst., 2012

Improved Impossible Differential Attack on Reduced Version of Camellia-192/256.
IACR Cryptol. ePrint Arch., 2012

Impossible Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information Security Practice and Experience, 2012

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Linear Fault Analysis of Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher.
J. Comput., 2011

Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256.
IACR Cryptol. ePrint Arch., 2011

Fault Detection of the MacGuffin Cipher against Differential Fault Attack.
Proceedings of the Trusted Systems - Third International Conference, 2011

Linear Cryptanalysis of ARIA Block Cipher.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Differential fault analysis on Camellia.
J. Syst. Softw., 2010

2009
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin.
J. Syst. Softw., 2009

An Extension of Differential Fault Analysis on AES.
Proceedings of the Third International Conference on Network and System Security, 2009

Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network.
Proceedings of the Advances in Neural Networks, 2009

Differential-Multiple Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
Differential fault analysis on the ARIA algorithm.
Inf. Sci., 2008

2007
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.
Proceedings of the Provable Security, 2007


  Loading...