Wei Wang

Orcid: 0000-0002-0749-140X

Affiliations:
  • Shandong University, Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, China


According to our database1, Wei Wang authored at least 34 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version).
IACR Cryptol. ePrint Arch., 2023

Full Round Distinguishing and Key-Recovery Attacks on SAND-2.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.
IACR Cryptol. ePrint Arch., 2022

A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis.
IACR Cryptol. ePrint Arch., 2022

Key-Recovery Attacks on CRAFT and WARP (Full Version).
IACR Cryptol. ePrint Arch., 2022

Related-tweakey impossible differential attack on QARMA-128.
Sci. China Inf. Sci., 2022

Improved Truncated Differential Distinguishers of AES with Concrete S-Box.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC.
Inf. Process. Lett., 2021

Improved Attacks on GIFT-64.
IACR Cryptol. ePrint Arch., 2021

Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.
IACR Cryptol. ePrint Arch., 2021

Accelerating the Search of Differential and Linear Characteristics with the SAT Method.
IACR Cryptol. ePrint Arch., 2021

2020
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers.
IACR Trans. Symmetric Cryptol., 2020

Distinguisher on full-round compression function of GOST R.
Inf. Process. Lett., 2020

MILP-aided bit-based division property for primitives with non-bit-permutation linear layers.
IET Inf. Secur., 2020

Cryptanalysis of PRIMATEs.
Sci. China Inf. Sci., 2020

2019
Universal Forgery Attack against GCM-RUP.
IACR Cryptol. ePrint Arch., 2019

2018
More Accurate Differential Properties of LED64 and Midori64.
IACR Trans. Symmetric Cryptol., 2018

MILP-aided bit-based division property for ARX ciphers.
Sci. China Inf. Sci., 2018

Improved automatic search of impossible differentials for camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> layers.
Sci. China Inf. Sci., 2018

2017
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4.
Secur. Commun. Networks, 2017

Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of round-reduced ASCON.
Sci. China Inf. Sci., 2017

Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Linear cryptanalysis of reduced-round SPECK.
Inf. Process. Lett., 2016

MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher.
IACR Cryptol. ePrint Arch., 2016

2011
Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5.
Proceedings of the Information Security and Assurance - International Conference, 2011

2009
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES.
IACR Cryptol. ePrint Arch., 2009

New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256.
IACR Cryptol. ePrint Arch., 2009

Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1.
Proceedings of the Information, Security and Cryptology, 2009

New Distinguishing Attack on MAC Using Secret-Prefix Method.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.
Proceedings of the Advances in Cryptology, 2009

New Birthday Attacks on Some MACs Based on Block Ciphers.
Proceedings of the Advances in Cryptology, 2009

2008
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC.
IACR Cryptol. ePrint Arch., 2008

2007
Improved Impossible Differential Cryptanalysis of CLEFIA.
IACR Cryptol. ePrint Arch., 2007


  Loading...