default search action
Lei Wang 0031
Person information
- affiliation: Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
- affiliation (former): Nanyang Technological University, School of Physical and Mathematical Sciences, Singapore
- affiliation (PhD 2011): University of Electro-Communications, Japan
- not to be confused with: Lei Wang 0020
Other persons with the same name
- Lei Wang — disambiguation page
- Lei Wang 0001 — University of Wollongong, NSW, Australia (and 2 more)
- Lei Wang 0002 — Imperial College London, UK
- Lei Wang 0003 — University of Connecticut, Department of Electrical and Computer Engineering, Storrs, CT, USA
- Lei Wang 0004 — Chinese Academy of Sciences, Institute of Computing Technology, State Key Laboratory of Computer Architecture, Beijing, China
- Lei Wang 0005 — Dalian University of Technology, School of Software, China (and 1 more)
- Lei Wang 0006 — Tongji University, Department of Electronics and Information, Shanghai, China (and 1 more)
- Lei Wang 0007 — Tongji University, Department of Electronics and Information, Shanghai, China
- Lei Wang 0008 — Huawei Technologies Co. (and 2 more)
- Lei Wang 0009 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 3 more)
- Lei Wang 0010 — Instagram, Menlo Park, CA, USA (and 3 more)
- Lei Wang 0011 — National University of Defense Technology, College of Computer, Changsha, China
- Lei Wang 0012 — PLA University of Science and Technology, Nanjing, China
- Lei Wang 0013 — Argonne National Laboratory (and 1 more)
- Lei Wang 0014 — University of Saskatchewan
- Lei Wang 0015 — Fujian University of Technology
- Lei Wang 0016 — Tsinghua University, Department of Automation, Beijing, China
- Lei Wang 0017 — Central South University, School of Information Science and Engineering, Changsha, China
- Lei Wang 0018 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, Guangdong Provincial Key Laboratory of Robotics and Intelligent System, China (and 4 more)
- Lei Wang 0019 — Civil Aviation University of China, Tianjin
- Lei Wang 0020 — Institute for Infocomm Research, A*STAR, Singapore (and 1 more)
- Lei Wang 0021 — Microsoft (and 1 more)
- Lei Wang 0022 — Louisiana State University, Department of Geography, Baton Rouge, LA, USA (and 1 more)
- Lei Wang 0023 — Zhejiang University, College of Computer Science, China (and 1 more)
- Lei Wang 0024 — Facebook (and 1 more)
- Lei Wang 0025 — Fraunhofer MEVIS - Institut für Bildgestützte Medizin
- Lei Wang 0026 — University of Minnesota
- Lei Wang 0027 — Bell Labs (and 1 more)
- Lei Wang 0028 — Xidian University, Software Engineering Institute, Xi'an, China
- Lei Wang 0029 — Chinese Academy of Sciences, Shenzhen Insitutes of Advanced Technology, Research Centre for Medical Robotics and Minimally Invasive Surgical Devices, China (and 2 more)
- Lei Wang 0030 — Xi'an University of Technology, Faculty of Computer Science and Engineering, China (and 1 more)
- Lei Wang 0032 — Northwestern University, Feinberg School of Medicine, Chicago, USA
- Lei Wang 0033 — Microsoft (and 1 more)
- Lei Wang 0034 — ZTE Cooporations, Beijing China (and 1 more)
- Lei Wang 0035 — Dalian University of Technology, Department of Applied Mathematics, China
- Lei Wang 0036 — Beihang University, Key Laboratory of Fluid Mechanics, China
- Lei Wang 0037 — Beihang University, State Key Lab of Virtual Reality Technology and Systems, China
- Lei Wang 0038 — University of Waterloo, Canada
- Lei Wang 0039 — Rutgers University, USA
- Lei Wang 0040 — University of Washington, Seattle, USA (and 1 more)
- Lei Wang 0041 — Texas A&M Univerity, Department of Computer Science and Engineering, College Station, TX, USA
- Lei Wang 0042 — Southeast University, School of Computer Science and Engineering, Nanjing, China (and 1 more)
- Lei Wang 0043 — Peking University, Department of Psychology, Beijing, China
- Lei Wang 0044 — Columbia University, Department of Mechanical Engineering, New York, NY, USA
- Lei Wang 0045 — Queensland University of Technology, Brisbane, QLD, Australia
- Lei Wang 0046 — British Geological Survey, Keyworth, Nottingham, UK
- Lei Wang 0047 — Bohai University, Department of Mathematics, Jinzhou, China
- Lei Wang 0048 — Huazhong University of Science and Technology, Wuhan, China (and 1 more)
- Lei Wang 0049 — Southwestern University of Finance and Economics, School of Economic Mathematics, Chengdu, China
- Lei Wang 0050 — Nanjing Institute of Technology, School of Automation, China
- Lei Wang 0051 — Henan Polytechnic University, School of Computer Science and Technology, Jiaozuo, China
- Lei Wang 0052 — Harbin Engineering University, College of Automation, Harbin, China
- Lei Wang 0053 — Anhui Polytechnic University, School of Mechanical and Automotive Engineering, Wuhu, China
- Lei Wang 0054 — Nanjing University of Posts and Telecommunications, School of Computer, China (and 1 more)
- Lei Wang 0055 — Beihang University, School of Automation Science and Electrical Engineering, Beijing, China (and 1 more)
- Lei Wang 0056 — Nanchang Hangkong University, Key Laboratory of Image Processing and Pattern Recognition, China (and 1 more)
- Lei Wang 0057 — Harbin Institute of Technology, School of Transportation Science and Engineering, China
- Lei Wang 0058 — Sichuan University, West China Hospital, Department of Radiology, Chengdu, China
- Lei Wang 0059 — Zhejiang University, Institute of Cyber-Systems and Control, Yuquan Campus, China (and 2 more)
- Lei Wang 0060 — Shanghai Jiao Tong University, Department of Automation, Key Laboratory of System Control and Information Processing, China
- Lei Wang 0061 — Xi'an Jiaotong University, School of Electronics and Information Engineering, China
- Lei Wang 0062 — Chinese Academy of Sciences, Institute of Automation, State Key Laboratory of Management and Control for Complex Systems, Beijing, China
- Lei Wang 0063 — Tongji University, Laboratory of Embedded System and Service Computing, Shanghai, China
- Lei Wang 0064 — Tianjin University, School of Chemical Engineering and Technology, China
- Lei Wang 0065 — Chinese Academy of Sciences, Xinjiang Technical Institute of Physics and Chemistry, China Xinjiang Laboratory of Minority Speech and Language Information Processing, Urumqi, China
- Lei Wang 0066 — South China University of Technology, School of Electric Power, Guangzhou, China
- Lei Wang 0067 — Hunan University, College of Electrical and Information Engineering, Changsha, China (and 1 more)
- Lei Wang 0068 — Wuhan University, School of Electronic Information / Collaborative Innovation Center of Geospatial Technology, China
- Lei Wang 0069 — Xiangtan University, College of Information Engineering / Key Laboratory of Intelligent Computing and Information Processing, China (and 3 more)
- Lei Wang 0070 — NXP Semiconductors, Singapore (and 1 more)
- Lei Wang 0071 — Tsinghua University, Graduate School at Shenzhen, China
- Lei Wang 0072 — Chongqing University, College of Automation / MoE Key Laboratory of Dependable Service in Cyber Physical Society, China
- Lei Wang 0073 — Nanjing Tech University, School of Economics and Management, China (and 1 more)
- Lei Wang 0074 — Southern University of Science and Technology, Department of Electrical and Electronic Engineering, Shenzhen, China
- Lei Wang 0075 — University of Stuttgart, Germany
- Lei Wang 0076 — Essen University, Germany
- Lei Wang 0077 — Chinese Academy of Sciences, Institute of Electronics, Key Laboratory of Technology in Geo-Spatial Information Processing and Application System, Beijing, China
- Lei Wang 0078 — Shandong University, School of Information Science and Engineering, Jinan, China (and 1 more)
- Lei Wang 0079 — Xidian University, School of Electronic Engineering, Xi'an, China
- Lei Wang 0080 — University of Stuttgart, Institute of Technical Biochemistry, Germany
- Lei Wang 0081 — Tsinghua University, School of Aerospace Engineering, Beijing, China
- Lei Wang 0082 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Lei Wang 0083 — China University of Petroleum (East China), College of Geoscience, Qingdao, China
- Lei Wang 0084 — Wuhan University, LIEMARS, Collaborative Innovation Center for Geospatial Technology, China
- Lei Wang 0085 — Beijing Institute of Health Administration and Medical Information, China (and 1 more)
- Lei Wang 0086 — Chinese Academy of Sciences, Northwest Institute of Eco-Environment and Resources, Lanzhou, China
- Lei Wang 0087 — Harbin University of Science and Technology, China
- Lei Wang 0088 — Beihang University, Institute of Solid Mechanics, Beijing, China
- Lei Wang 0089 — Northwestern Polytechnical University, School of Computer Science and Engineering, Xi'an, China
- Lei Wang 0090 — Wuhan University of Technology, School of Mechanical and Electronic Engineering, China
- Lei Wang 0091 — Tianjin Normal University, Tianjin Key Laboratory of Wireless Mobile Communications and Power Transmission, China
- Lei Wang 0092 — China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China
- Lei Wang 0093 — University of Science and Technology Beijing, School of Computer and Communication Engineering, China
- Lei Wang 0094 — Beihang University, Institute of Solid Mechanics, Beijing, China
- Lei Wang 0095 — Jiangsu University, School of Computer Science and Communication Engineering / Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Zhenjiang, China
- Lei Wang 0096 — Beijing Jiaotong University, School of Computer and Information Technology, Beijing Key Lab of Traffic Data Analysis and Mining, China
- Lei Wang 0097 — North China Electric Power University, School of Mathematics and Physics, Beijing, China
- Lei Wang 0098 — Wuhan University of Science and Technology, MoE Key Laboratory of Metallurgical Equipment and Control Technology, China
- Lei Wang 0099 — National University of Defense Technology, College of Electronic Science and Technology, Changsha, China
- Lei Wang 0100 — National Marine Data and Information Service, Tianjin, China (and 2 more)
- Lei Wang 0101 — Academy of Broadcasting Science, Information Technology Institute, China
- Lei Wang 0102 — Drexel University, School of Biomedical Engineering / CONQUER, Philadelphia, PA, USA (and 1 more)
- Lei Wang 0103 — Chinese Academy of Sciences, Institute of Tibetan Plateau Research, Beijing, China (and 1 more)
- Lei Wang 0104 — Union College, Department of Computer Science, Schenectady, NY, USA (and 1 more)
- Lei Wang 0105 — Nanjing Normal University, School of Geography / MOE Key Laboratory of Virtual Geographic Environment, China (and 1 more)
- Lei Wang 0106 — Shanghai Jiao Tong University, Department of Electronic Engineering, School of Electronic Information and Electrical Engineering, China
- Lei Wang 0107 — Liaoning Technical University, Department of Basic Teaching, Huludao, China
- Lei Wang 0108 — University of Western Australia, Department of Computer Science and Software Engineering, Crawley, WA, Australia (and 2 more)
- Lei Wang 0109 — South China University of Technology, School of Electric Power Engineering, Guangzhou, China
- Lei Wang 0110 — Northeast Forestry University, College of Wildlife Resources, Harbin, China
- Lei Wang 0111 — University of Twente, The Netherlands
- Lei Wang 0112 — Chinese Academy of Sciences, Institute of Electronics, Key Laboratory of Technology in Geo-Spatial information Processing and Application System, Beijing, China
- Lei Wang 0113 — Harbin Institute of Technology, State Key Laboratory of Robotics and Systems, China
- Lei Wang 0114 — China University of Mining and Technology, School of Mechanical and Electrical Engineering, Xuzhou, China
- Lei Wang 0115 — Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China
- Lei Wang 0116 — University of Electronic Science and Technology of China, Department of Electronic Engineering, Chengdu, China
- Lei Wang 0117 — Wuhan University, LIEMARS, China
- Lei Wang 0118 — Nankai University, School of Statistics and Data Science, LPMC & KLMDASR, Tianjin, China
- Lei Wang 0119 — Jiangnan University, MoE Key Laboratory of Eco-Textiles, Wuxi, China
- Lei Wang 0120 — North China University of Science and Technology, Jitang College, Tangshan, China
- Lei Wang 0121 — Zaozhuang University, College of Information Science and Engineering, China (and 2 more)
- Lei Wang 0122 — Shandong University of Technology, School of Computer Science and Technology, Zibo, China (and 1 more)
- Lei Wang 0123 — Ocean University of China, School of Economics, Qingdao, China (and 1 more)
- Lei Wang 0124 — Soochow University, School of Computer Science and Technology / Joint International Research Laboratory of Machine Learning and Neuromorphic Computing, Suzhou, China
- Lei Wang 0125 — Henry Ford Health Sciences Center, Department of Neurology, Detroit, MI, USA
- Lei Wang 0126 — Beihang University, School of Computer Science and Engineering, Beijing, China
- Lei Wang 0127 — Nanyang Technological University, School of Mechanical and Aerospace Engineering, Singapore
- Lei Wang 0128 — Dalian University of Technology, College of Mechanical Engineering, Liaoning, China
- Lei Wang 0129 — Huazhong University of Science and Technology, Tongji Medical College, Union Hospital, Department of Ultrasound, Wuhan, China
- Lei Wang 0130 — Nanjing University of Information Science and Technology, Teachers and Teaching Development Center, China
- Lei Wang 0131 — Soochow University, School of Electronic and Information Engineering, Suzhou Key Laboratory of Advanced Optical Communication Network Technology, Suzhou, China
- Lei Wang 0132 — Northeast Electric Power University, School of Electrical Engineering, Jilin, China
- Lei Wang 0133 — Harbin Institute of Technology, Center of Ultra-Precision Optoelectronic Instrument Engineering, China
- Lei Wang 0134 — Dalian University of Technology, School of Software, Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, China
- Lei Wang 0135 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Lei Wang 0136 — China Pharmaceutical University, State Key Laboratory of Natural Medicines / Jiangsu Key Laboratory of Drug Design and Optimization, Nanjing, China
- Lei Wang 0137 — Heriot-Watt University, School of Engineering and Physical Sciences, Edinburgh, UK (and 4 more)
- Lei Wang 0139 — Lanzhou Jiaotong University, School of Economics and Management, China
- Lei Wang 0140 — Beijing University of Posts and Telecommunications, School of Digital Media and Design Arts, China
- Lei Wang 0141 — Hefei University of Technology, School of Electronic Science and Applied Physics, China
- Lei Wang 0142 — China Academy of Aerospace Systems Science and Engineering, Beijing, China
- Lei Wang 0143 — Changsha University of Science and Technology, School of Civil Engineering, China
- Lei Wang 0144 — East China Normal University, Shanghai, China
- Lei Wang 0145 — Zhejiang University, School of Mechanical Engineering, State Key Laboratory of Fluid Power and Mechatronic Systems, Hangzhou, China
- Lei Wang 0146 — Jiangnan University, MoE Key Laboratory of Advanced Process Control for Light Industry, Wuxi, China
- Lei Wang 0147 — Wuhan University, School of Electrical Engineering and Automation, China
- Lei Wang 0148 — Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Lei Wang 0149 — Chinese Academy of Medical Sciences, Institute of Biomedical Engineering, Tianjin, China (and 2 more)
- Lei Wang 0150 — Tongji University, College of Transportation Engineering, MoE Key Laboratory of Road and Traffic Engineering, Shanghai, China
- Lei Wang 0151 — Fudan University, School of Computer Science, Shanghai Key Laboratory of Intelligent Information Processing, Shanghai, China
- Lei Wang 0152 — Nanjing University, Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, China
- Lei Wang 0153 — Xi'an Jiaotong University, School of Mechanical Engineering, State Key Laboratory for Manufacturing Systems Engineering, China
- Lei Wang 0154 — Tianjin University of Technology, Department of Mathematics, China
- Lei Wang 0155 — National University of Defense Technology, College of Information and Communication, Wuhan, China
- Lei Wang 0156 — Chinese Academy of Sciences, Nanjing Institute of Geography and Limnology, Key Laboratory of Watershed Geographic Sciences, China (and 1 more)
- Lei Wang 0157 — Shaanxi University of Technology, Shaanxi Key Laboratory of Industrial Automation, Hanzhong, China
- Lei Wang 0158 — China Medical University, Division of Biomedical Engineering, China
- Lei Wang 0159 — Waseda University, Graduate School of Information, Production, and Systems, Japan
- Lei Wang 0160 — Huawei Technologies Co. Ltd., Hangzhou, China (and 2 more)
- Lei Wang 0161 — Toll Collection Center for Shaanxi Freeway, Xi'an, China
- Lei Wang 0162 — Tsinghua University, Department of Precision Instrument, Beijing, China
- Lei Wang 0163 — Wenzhou Medical University, Eye Hospital, School of Ophthalmology and Optometry, China (and 1 more)
- Lei Wang 0164 — Zhejiang University, School of Management, Department of Data Science and Engineering Management, Neuromanagement Lab, Hangzhou, China
- Lei Wang 0165 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Lei Wang 0166 — Tongji University, Shanghai, China (and 1 more)
- Lei Wang 0167 — Xi'an Polytechnic University, School of Electronics and Information, Branch of Shaanxi AI Joint Laboratory, China
- Lei Wang 0168 — Hefei University of Technology, Department of Biomedical Engineering, Anhui Province Key Laboratory of Measuring Theory and Precision Instrument, China
- Lei Wang 0169 — Ordos Institute of Technology, China (and 1 more)
- Lei Wang 0170 — Chinese Academy of Sciences, Aerospace Information Research Institute, State Key Laboratory of Remote Sensing Science, Beijing, China
- Lei Wang 0171 — China Institute of Water Resources and Hydropower Research, State Key Laboratory of Watershed Water Cycle Simulation and Regulation, Beijing, China
- Lei Wang 0172 — Shandong University, School of Physical Education, Jinan, China
- Lei Wang 0173 — Beijing University of Technology, Faculty of Information Technology, Beijing Key Laboratory of Computational Intelligence and Intelligent System, China
- Lei Wang 0174 — Guilin University of Electronic Technology, School of Business, China (and 1 more)
- Lei Wang 0175 — Henan Polytechnic Institute, Department of Basic Science Teaching, Nanyang, China
- Lei Wang 0176 — Capital Normal University, School of Management, Beijing, China
- Lei Wang 0177 — Beijing Institute of Technology, School of Mechatronical Engineering, Beijing Advanced Innovation Center for Intelligent Robots and Systems, China
- Lei Wang 0178 — Criminal Investigation Police University of China, Department of Public Order, Shenyang, China (and 1 more)
- Lei Wang 0179 — Radboud University, Donders Centre for Neuroscience, Department of Biophysics, Nijmegen, The Netherlands (and 1 more)
- Lei Wang 0180 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China
- Lei Wang 0181 — Ohio State University, Department of Civil, Environmental and Geodetic Engineering, Columbus, OH, USA (and 3 more)
- Lei Wang 0182 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 1 more)
- Lei Wang 0183 — Chinese Academy of Sciences, Suzhou Institute of Biomedical Engineering and Technology, China
- Lei Wang 0184 — Shandong University, School of Control Science and Engineering, Jinan, China (and 1 more)
- Lei Wang 0185 — Singapore Management University, School of Information Systems, Singapore
- Lei Wang 0186 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Lei Wang 0187 — China Information and Communication Technologies Group Corporation, CICT, National Optoelectronics Innovation Center, NOEIC, Wuhan, China (and 1 more)
- Lei Wang 0188 — Shandong University, School of Management, Jinan, China
- Lei Wang 0189 — Tianjin University, School of Mechanical Engineering, China
- Lei Wang 0190 — Northeastern University, College of Information Science and Engineering, Shenyang, China
- Lei Wang 0191 — Nanchang Institute of Technology, School of Information Engineering, China
- Lei Wang 0192 — Hong Kong Polytechnic University, Department of Building and Real Estate, Hong Kong (and 1 more)
- Lei Wang 0193 — Nankai University, Tianjin, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes. IEEE Trans. Computers 73(2): 613-620 (2024) - [j37]Qian Ren, Yue Li, Yingjun Wu, Yuchen Wu, Hong Lei, Lei Wang, Bangdao Chen:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. IEEE Trans. Inf. Forensics Secur. 19: 88-103 (2024) - [j36]Kai Zhang, Senpeng Wang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Tairong Shi:
Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers. IEEE Trans. Inf. Theory 70(8): 6025-6040 (2024) - [c63]Xiangyang Zhang, Yaobin Shen, Lei Wang:
Security Analysis of CMAC in the Multi-user Model. ISC (1) 2024: 67-86 - 2023
- [j35]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu:
A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis. Sci. China Inf. Sci. 66(3) (2023) - [j34]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework. Des. Codes Cryptogr. 91(9): 2845-2878 (2023) - [j33]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers. IEEE Trans. Inf. Theory 69(2): 1282-1294 (2023) - [c62]Yaobin Shen, François-Xavier Standaert, Lei Wang:
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. ASIACRYPT (3) 2023: 169-189 - [c61]Chun Guo, Lei Wang, Dongdai Lin:
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls. EUROCRYPT (4) 2023: 408-439 - [i38]Chun Guo, Lei Wang, Dongdai Lin:
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls. IACR Cryptol. ePrint Arch. 2023: 226 (2023) - [i37]Yaobin Shen, François-Xavier Standaert, Lei Wang:
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. IACR Cryptol. ePrint Arch. 2023: 1431 (2023) - 2022
- [c60]Qian Ren, Yingjun Wu, Han Liu, Yue Li, Anne Victor, Hong Lei, Lei Wang, Bangdao Chen:
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation. ACSAC 2022: 117-131 - [i36]Qian Ren, Yingjun Wu, Yue Li, Han Liu, Hong Lei, Lei Wang, Bangdao Chen:
TENET: Towards Self-sovereign and Fair Multi-party Computation Ecology Empowered by Decentralized TEE Network. CoRR abs/2202.10206 (2022) - 2021
- [j32]Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai:
Secure key-alternating Feistel ciphers without key schedule. Sci. China Inf. Sci. 64(1) (2021) - [j31]Lin Ding, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
Improved Guess and Determine attack on the MASHA stream cipher. Sci. China Inf. Sci. 64(9) (2021) - [j30]Lin Ding, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks. J. Inf. Secur. Appl. 63: 103015 (2021) - [c59]Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting. CRYPTO (3) 2021: 309-336 - [i35]Qian Ren, Han Liu, Yue Li, Hong Lei, Lei Wang, Bangdao Chen:
CLOAK: Towards Practical Development and Deployment of Confidential Smart Contracts. CoRR abs/2106.13926 (2021) - [i34]Yaobin Shen, Lei Wang, Dawu Gu:
LedMAC: More Efficient Variants of LightMAC. IACR Cryptol. ePrint Arch. 2021: 1210 (2021) - 2020
- [j29]Zijian Bao, Qinghao Wang, Wenbo Shi, Lei Wang, Hong Lei, Bangdao Chen:
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues. IEEE Access 8: 170404-170420 (2020) - [j28]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. J. Cryptol. 33(3): 742-823 (2020) - [j27]Ying Zou, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. Secur. Commun. Networks 2020: 1238505:1-1238505:11 (2020) - [j26]Ying Zou, Yanting Chai, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks. Secur. Commun. Networks 2020: 4938736:1-4938736:12 (2020) - [j25]Yaobin Shen, Chun Guo, Lei Wang:
Improved Security Bounds for Generalized Feistel Networks. IACR Trans. Symmetric Cryptol. 2020(1): 425-457 (2020) - [c58]Hailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai:
Tweaking Key-Alternating Feistel Block Ciphers. ACNS (1) 2020: 69-88 - [c57]Yue Li, Han Liu, Zhiqiang Yang, Qian Ren, Lei Wang, Bangdao Chen:
SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart Contracts. ICDCS 2020: 1219-1222 - [c56]Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. ICICS 2020: 369-385 - [c55]Zhiqiang Yang, Han Liu, Yue Li, Huixuan Zheng, Lei Wang, Bangdao Chen:
Seraph: enabling cross-platform security analysis for EVM and WASM smart contracts. ICSE (Companion Volume) 2020: 21-24 - [c54]Yue Li, Han Liu, Zhiqiang Yang, Bin Wang, Qian Ren, Lei Wang, Bangdao Chen:
Protect Your Smart Contract Against Unfair Payment. SRDS 2020: 61-70 - [i33]Yaobin Shen, Chun Guo, Lei Wang:
Improved Security Bounds for Generalized Feistel Networks. IACR Cryptol. ePrint Arch. 2020: 285 (2020) - [i32]Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai:
Secure Key-Alternating Feistel Ciphers Without Key Schedule. IACR Cryptol. ePrint Arch. 2020: 288 (2020) - [i31]Yaobin Shen, Lei Wang, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting. IACR Cryptol. ePrint Arch. 2020: 1523 (2020)
2010 – 2019
- 2019
- [j24]Kamel Ammour, Lei Wang, Dawu Gu:
Pseudo random oracle of Merkle-Damgård hash functions revisited. Sci. China Inf. Sci. 62(3): 32112:1-32112:15 (2019) - [j23]Chun Guo, Yaobin Shen, Lei Wang, Dawu Gu:
Beyond-birthday secure domain-preserving PRFs from a single permutation. Des. Codes Cryptogr. 87(6): 1297-1322 (2019) - [j22]Hailun Yan, Xuejia Lai, Lei Wang, Yu Yu, Yiran Xing:
New zero-sum distinguishers on full 24-round Keccak-f using the division property. IET Inf. Secur. 13(5): 469-478 (2019) - [j21]Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping. Secur. Commun. Networks 2019: 7429320:1-7429320:5 (2019) - [j20]Yaobin Shen, Lei Wang:
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs. IACR Trans. Symmetric Cryptol. 2019(2): 146-168 (2019) - [c53]Ying Zou, Xiangyang Zhang, Lei Wang:
XKX Does Not Preserve Unpredictability. CSAE 2019: 95:1-95:5 - [c52]Lin Ding, Dawu Gu, Lei Wang:
New Key Recovery Attack on the MICKEY Family of Stream Ciphers. FCS 2019: 239-249 - [c51]Lin Ding, Dawu Gu, Lei Wang:
Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers. iSCI 2019: 570-582 - [i30]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2019: 755 (2019) - 2018
- [j19]Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, Dawu Gu:
Similar operation template attack on RSA-CRT as a case study. Sci. China Inf. Sci. 61(3): 032111:1-032111:17 (2018) - [j18]Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Trans. Symmetric Cryptol. 2018(1): 201-253 (2018) - [c50]Chun Guo, Lei Wang:
Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security. ASIACRYPT (1) 2018: 213-243 - [c49]Kamel Ammour, Lei Wang:
Improved Indifferentiability Security Bound for the Prefix-Free Merkle-Damgård Hash Function. Inscrypt 2018: 200-219 - [c48]Xiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu, Lei Wang:
Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher. ProvSec 2018: 313-326 - [c47]Yasir Nawaz, Lei Wang, Kamel Ammour:
Processing Analysis of Confidential Modes of Operation. SpaCCS 2018: 98-110 - [i29]Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Cryptol. ePrint Arch. 2018: 374 (2018) - [i28]Yaobin Shen, Lei Wang, Dawu Gu:
ISO/IEC 9797-1 Revisited: Beyond Birthday Bound. IACR Cryptol. ePrint Arch. 2018: 468 (2018) - [i27]Chun Guo, Lei Wang:
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security. IACR Cryptol. ePrint Arch. 2018: 816 (2018) - 2017
- [c46]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. CRYPTO (2) 2017: 404-427 - [i26]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2017: 534 (2017) - 2016
- [j17]Yu Sasaki, Lei Wang:
Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 22-30 (2016) - [j16]Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Forgeries and Distinguishers against PAES. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 39-48 (2016) - [j15]Yu Sasaki, Lei Wang:
Message Extension Attack against Authenticated Encryptions: Application to PANDA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 49-57 (2016) - [c45]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. ASIACRYPT (1) 2016: 455-483 - [c44]Yusuke Naito, Lei Wang:
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. CT-RSA 2016: 397-412 - [i25]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. IACR Cryptol. ePrint Arch. 2016: 876 (2016) - 2015
- [j14]Ivica Nikolic, Lei Wang, Shuang Wu:
The parallel-cut meet-in-the-middle attack. Cryptogr. Commun. 7(3): 331-345 (2015) - [j13]Yu Sasaki, Gaoli Wang, Lei Wang:
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 26-38 (2015) - [j12]Yu Sasaki, Lei Wang:
Bitwise Partial-Sum: A New Tool for Integral Analysis against ARX Designs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 49-60 (2015) - [c43]Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-Key Distinguisher on Full PRESENT. CRYPTO (1) 2015: 455-474 - [c42]Gaëtan Leurent, Lei Wang:
The Sum Can Be Weaker Than Each Part. EUROCRYPT (1) 2015: 345-367 - [c41]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. FSE 2015: 264-281 - [c40]Jérémy Jean, Yu Sasaki, Lei Wang:
Analysis of the CAESAR Candidate Silver. SAC 2015: 493-509 - [i24]Gaëtan Leurent, Lei Wang:
The Sum Can Be Weaker Than Each Part. IACR Cryptol. ePrint Arch. 2015: 70 (2015) - [i23]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. IACR Cryptol. ePrint Arch. 2015: 75 (2015) - [i22]Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. IACR Cryptol. ePrint Arch. 2015: 149 (2015) - [i21]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. IACR Cryptol. ePrint Arch. 2015: 372 (2015) - [i20]Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced LED. IACR Cryptol. ePrint Arch. 2015: 429 (2015) - [i19]Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-key Distinguisher on Full PRESENT. IACR Cryptol. ePrint Arch. 2015: 575 (2015) - 2014
- [j11]Yu Sasaki, Lei Wang:
Comprehensive Study of Integral Analysis on LBlock. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 127-138 (2014) - [j10]Yu Sasaki, Lei Wang:
Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 177-190 (2014) - [c39]Yu Sasaki, Lei Wang:
Message Extension Attack against Authenticated Encryptions: Application to PANDA. CANS 2014: 82-97 - [c38]Jian Guo, Thomas Peyrin, Yu Sasaki, Lei Wang:
Updates on Generic Attacks against HMAC and NMAC. CRYPTO (1) 2014: 131-148 - [c37]Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. CT-RSA 2014: 402-423 - [c36]Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta:
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. CT-RSA 2014: 424-443 - [c35]Thomas Peyrin, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-Based MACs. EUROCRYPT 2014: 147-164 - [c34]Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. FSE 2014: 303-322 - [c33]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. FSE 2014: 571-590 - [c32]Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. Selected Areas in Cryptography 2014: 195-211 - [c31]Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Cryptanalysis of PAES. Selected Areas in Cryptography 2014: 228-242 - [c30]Yu Sasaki, Lei Wang:
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. SCN 2014: 324-339 - [i18]Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. IACR Cryptol. ePrint Arch. 2014: 183 (2014) - [i17]Jian Guo, Jérémy Jean, Thomas Peyrin, Lei Wang:
Breaking POET Authentication with a Single Query. IACR Cryptol. ePrint Arch. 2014: 197 (2014) - [i16]Yu Sasaki, Lei Wang:
A Forgery Attack against PANDA-s. IACR Cryptol. ePrint Arch. 2014: 217 (2014) - [i15]Yu Sasaki, Lei Wang:
A Practical Universal Forgery Attack against PAES-8. IACR Cryptol. ePrint Arch. 2014: 218 (2014) - [i14]Thomas Peyrin, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-based MACs. IACR Cryptol. ePrint Arch. 2014: 403 (2014) - [i13]Gaëtan Leurent, Thomas Peyrin, Lei Wang:
New Generic Attacks Against Hash-based MACs. IACR Cryptol. ePrint Arch. 2014: 406 (2014) - [i12]Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. IACR Cryptol. ePrint Arch. 2014: 675 (2014) - [i11]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. IACR Cryptol. ePrint Arch. 2014: 931 (2014) - 2013
- [c29]Gaëtan Leurent, Thomas Peyrin, Lei Wang:
New Generic Attacks against Hash-Based MACs. ASIACRYPT (2) 2013: 1-20 - [c28]Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. ASIACRYPT (2) 2013: 21-40 - [c27]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT (2) 2013: 484-503 - [c26]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. FSE 2013: 92-111 - [c25]Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced \mathttLED. FSE 2013: 112-129 - [c24]Yu Sasaki, Lei Wang:
Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs. ICISC 2013: 189-202 - [c23]Yusuke Naito, Yu Sasaki, Lei Wang, Kan Yasuda:
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. IWSEC 2013: 83-98 - [c22]Yu Sasaki, Lei Wang:
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. Selected Areas in Cryptography 2013: 493-512 - [c21]Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. SECRYPT 2013: 111-122 - [i10]Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. IACR Cryptol. ePrint Arch. 2013: 467 (2013) - [i9]Ivica Nikolic, Lei Wang, Shuang Wu:
The Parallel-Cut Meet-In-The-Middle Attack. IACR Cryptol. ePrint Arch. 2013: 530 (2013) - [i8]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2013: 600 (2013) - [i7]Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang:
Cryptanalysis of Zorro. IACR Cryptol. ePrint Arch. 2013: 713 (2013) - 2012
- [j9]Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 100-110 (2012) - [c20]Yu Sasaki, Lei Wang:
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions. ACNS 2012: 275-292 - [c19]Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta:
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. AFRICACRYPT 2012: 138-154 - [c18]Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu:
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. ASIACRYPT 2012: 562-579 - [c17]Thomas Peyrin, Yu Sasaki, Lei Wang:
Generic Related-Key Attacks for HMAC. ASIACRYPT 2012: 580-597 - [c16]Yu Sasaki, Lei Wang:
Comprehensive Study of Integral Analysis on 22-Round LBlock. ICISC 2012: 156-169 - [c15]Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
New Truncated Differential Cryptanalysis on 3D Block Cipher. ISPEC 2012: 109-125 - [c14]Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta:
Boomerang Distinguishers for Full HAS-160 Compression Function. IWSEC 2012: 156-169 - [c13]Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. IWSEC 2012: 170-181 - [c12]Yu Sasaki, Lei Wang:
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. Selected Areas in Cryptography 2012: 234-251 - [i6]Yu Sasaki, Lei Wang:
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160. IACR Cryptol. ePrint Arch. 2012: 49 (2012) - [i5]Thomas Peyrin, Yu Sasaki, Lei Wang:
Generic Related-key Attacks for HMAC. IACR Cryptol. ePrint Arch. 2012: 684 (2012) - 2011
- [j8]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 57-70 (2011) - [j7]Lei Wang, Yu Sasaki:
Preimage Attack on 23-Step Tiger. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 110-120 (2011) - [c11]Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama:
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. CT-RSA 2011: 197-212 - [c10]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model. ProvSec 2011: 281-296 - 2010
- [j6]Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro:
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 84-92 (2010) - [j5]Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Trans. Inf. Syst. 93-D(5): 1087-1095 (2010) - [c9]Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta:
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. ASIACRYPT 2010: 38-55 - [c8]Lei Wang, Yu Sasaki:
Finding Preimages of Tiger Up to 23 Steps. FSE 2010: 116-133
2000 – 2009
- 2009
- [j4]Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Near-Collision Attacks on MD4: Applied to MD4-Based Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 76-86 (2009) - [j3]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 96-104 (2009) - [c7]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! ASIACRYPT 2009: 382-398 - [c6]Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang:
Preimages for Step-Reduced SHA-2. ASIACRYPT 2009: 578-597 - [c5]Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Bit-Free Collision: Application to APOP Attack. IWSEC 2009: 3-21 - [i4]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability. IACR Cryptol. ePrint Arch. 2009: 40 (2009) - [i3]Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model. IACR Cryptol. ePrint Arch. 2009: 75 (2009) - [i2]Yu Sasaki, Lei Wang, Kazumaro Aoki:
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. IACR Cryptol. ePrint Arch. 2009: 479 (2009) - [i1]Yusuke Naito, Lei Wang, Kazuo Ohta:
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models. IACR Cryptol. ePrint Arch. 2009: 550 (2009) - 2008
- [j2]Yu Sasaki, Lei Wang, Noboru Kunihiro, Kazuo Ohta:
New Message Differences for Collision Attacks on MD4 and MD5. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 55-63 (2008) - [c4]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. AFRICACRYPT 2008: 290-307 - [c3]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. CT-RSA 2008: 1-18 - [c2]Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. EUROCRYPT 2008: 237-253 - 2007
- [c1]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Message Difference for MD4. FSE 2007: 329-348 - 2006
- [j1]Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta:
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1382-1395 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint