Wenying Zhang

Orcid: 0000-0003-4097-6238

Affiliations:
  • Shandong Normal University, School of Information Science and Engineering, Jinan, China
  • Chinese Academy of Sciences, Institute of Software, Beijing, China
  • PLA Information Engineering University, Zhengzhou, China (PhD 2004)


According to our database1, Wenying Zhang authored at least 29 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
PPSKSQ: Towards Efficient and Privacy-Preserving Spatial Keyword Similarity Query in Cloud.
IEEE Trans. Cloud Comput., 2025

2024
Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation.
IEEE Trans. Intell. Transp. Syst., March, 2024

SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions.
IEEE Trans. Inf. Forensics Secur., 2024

Known-Key Attack on GIFT-64 and GIFT-64[g<sub>0<sup>c</sup></sub>] Based on Correlation Matrices.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Vulnerability Analysis of Chinese Digital Passwords Related to ATM PIN Using Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Clustering of differentials in CRAFT with correlation matrices.
Int. J. Intell. Syst., December, 2022

Understanding digit-only financial account passwords: ID card, structure, and security.
Int. J. Intell. Syst., 2022

2021
Genetic Algorithm Assisted State-Recovery Attack on Round-Reduced Xoodyak.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP.
Wirel. Commun. Mob. Comput., 2020

The phantom of differential characteristics.
Des. Codes Cryptogr., 2020

Location-based data access control scheme for Internet of Vehicles.
Comput. Electr. Eng., 2020

2019
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY.
IACR Trans. Symmetric Cryptol., 2019

Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes.
IACR Trans. Symmetric Cryptol., 2019

An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers.
KSII Trans. Internet Inf. Syst., 2019

Division cryptanalysis of block ciphers with a binary diffusion layer.
IET Inf. Secur., 2019

Related-Key Differential Cryptanalysis of the Reduced-Round Block Cipher GIFT.
IEEE Access, 2019

2018
Differential Cryptanalysis on Block Cipher Skinny with MILP Program.
Secur. Commun. Networks, 2018

Searching for perfect diffusion matrices with lightweight coefficients.
J. Inf. Secur. Appl., 2018

Differential-linear cryptanalysis of SIMON32/64.
Int. J. Embed. Syst., 2018

Construction of rotation symmetric bent functions with maximum algebraic degree.
Sci. China Inf. Sci., 2018

2017
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo.
Secur. Commun. Networks, 2017

Optimised the differential trail of the authenticated encryption algorithm Tiaoxin-346.
Int. J. High Perform. Comput. Netw., 2017

2016
Algebraic techniques on searching linear diffusion layers in block cipher.
Secur. Commun. Networks, 2016

2014
Some Observations on the Lightweight Block Cipher Piccolo-80.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2012
A new one-bit difference collision attack on HAVAL-128.
Sci. China Inf. Sci., 2012

2009
Construction and enumeration of Boolean functions with maximum algebraic immunity.
Sci. China Ser. F Inf. Sci., 2009

2008
Impossible Differential Analysis of Reduced Round CLEFIA.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2006
The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function.
Proceedings of the Sequences and Their Applications, 2006

2004
Construction of Cryptographically Important Boolean Permutations.
Appl. Algebra Eng. Commun. Comput., 2004


  Loading...