Yuechuan Wei

Orcid: 0000-0002-4337-6820

According to our database1, Yuechuan Wei authored at least 25 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Progress Review of Wide-Band Common-Mode Filter in High Speed Interconnect System.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2022
Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing.
Symmetry, 2022

FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid.
IEEE Internet Things J., 2022

Integral Distinguisher Search of SLIM Algorithm Based on Bit-Based Division Property.
Proceedings of the CAIBDA 2022, 2022

2021
The Influence of Automatic Gain Control on Narrowband Frequency Domain GPS Anti-Jamming Receiver.
Proceedings of the 21st International Conference on Communication Technology, 2021

2019
Related-key impossible differential cryptanalysis on lightweight cipher TWINE.
J. Ambient Intell. Humaniz. Comput., 2019

A New Fair Electronic Contract Signing Protocol.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019

2018
Differential Fault Attacks on Lightweight Cipher LBlock.
Fundam. Informaticae, 2018

Integral cryptanalysis of SPN ciphers with binary permutations.
Sci. China Inf. Sci., 2018

2017
Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE.
Proceedings of the Advances in Internetworking, 2017

2016
Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack.
Int. J. Technol. Hum. Interact., 2016

New Differential Fault Attack on Lightweight Cipher LBlock.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Research and Design of Dedicated Instruction for Reconfigurable Matrix Multiplication of VLIW Processor.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

New Related-Key Impossible Differential Attack on MIBS-80.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

2015
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Comput. Collect. Intell., 2015

CCA-secure publicly verifiable public key encryption scheme without pairings.
Int. J. Grid Util. Comput., 2015

Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Bit-pattern Based Integral Attack on ICEBERG.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2014
Impossible differential cryptanalysis on cipher E2.
Concurr. Comput. Pract. Exp., 2014

A flux vector splitting scheme for low Mach number flows in preconditioning method.
Appl. Math. Comput., 2014

2012
Improved Related-Key Rectangle Attack on the Full has-160 Encryption Mode.
Int. J. Found. Comput. Sci., 2012

Impossible Differential Cryptanalysis on Tweaked E2.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0.
Proceedings of the 2011 World Congress on Internet Security, 2011

2010
Impossible Differential Cryptanalysis on Feistel Ciphers with <i>SP</i> and <i>SPS</i> Round Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
New Integral Distinguisher for Rijndael-256.
IACR Cryptol. ePrint Arch., 2009


  Loading...