BibTeX records: Lei Zhang 0012

download as .bib file

@article{DBLP:journals/iet-ifs/LiWZZ19,
  author       = {Lingchen Li and
                  Wenling Wu and
                  Lei Zhang and
                  Yafei Zheng},
  title        = {New method to describe the differential distribution table for large
                  S-boxes in {MILP} and its application},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {479--485},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5284},
  doi          = {10.1049/IET-IFS.2018.5284},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiWZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWZ019,
  author       = {Lingchen Li and
                  Wenling Wu and
                  Yafei Zheng and
                  Lei Zhang},
  title        = {The Relationship between the Construction and Solution of the {MILP}
                  Models and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhangW17,
  author       = {Lei Zhang and
                  Wenling Wu},
  title        = {Analysis of permutation choices for enhanced generalised Feistel structure
                  with SP-type round function},
  journal      = {{IET} Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {121--128},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0433},
  doi          = {10.1049/IET-IFS.2015.0433},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhangW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiWZ17a,
  author       = {Lingchen Li and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Improved Automatic Search Tool for Bit-Oriented Block Ciphers and
                  Its Applications},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {502--508},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_43},
  doi          = {10.1007/978-3-319-89500-0\_43},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiWZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WuZY15,
  author       = {Wenling Wu and
                  Lei Zhang and
                  Xiaoli Yu},
  title        = {The DBlock family of block ciphers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {3},
  pages        = {1--14},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-014-5219-0},
  doi          = {10.1007/S11432-014-5219-0},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WuZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/SoleimanyBYWNZZ15,
  author       = {Hadi Soleimany and
                  C{\'{e}}line Blondeau and
                  Xiaoli Yu and
                  Wenling Wu and
                  Kaisa Nyberg and
                  Huiling Zhang and
                  Lei Zhang and
                  Yanfeng Wang},
  title        = {Reflection Cryptanalysis of PRINCE-Like Ciphers},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {718--744},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9175-4},
  doi          = {10.1007/S00145-013-9175-4},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/SoleimanyBYWNZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/0012W14,
  author       = {Lei Zhang and
                  Wenling Wu},
  title        = {Differential analysis of the Extended Generalized Feistel Networks},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {12},
  pages        = {723--727},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2014.07.001},
  doi          = {10.1016/J.IPL.2014.07.001},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/0012W14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuWZZD13,
  author       = {Wenling Wu and
                  Shuang Wu and
                  Lei Zhang and
                  Jian Zou and
                  Le Dong},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {LHash: {A} Lightweight Hash Function},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {291--308},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_19},
  doi          = {10.1007/978-3-319-12087-4\_19},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/WuWZZD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SoleimanyBYWNZZW13,
  author       = {Hadi Soleimany and
                  C{\'{e}}line Blondeau and
                  Xiaoli Yu and
                  Wenling Wu and
                  Kaisa Nyberg and
                  Huiling Zhang and
                  Lei Zhang and
                  Yanfeng Wang},
  editor       = {Shiho Moriai},
  title        = {Reflection Cryptanalysis of PRINCE-Like Ciphers},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {71--91},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_5},
  doi          = {10.1007/978-3-662-43933-3\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SoleimanyBYWNZZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LinWW013,
  author       = {Li Lin and
                  Wenling Wu and
                  Yanfeng Wang and
                  Lei Zhang},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {General Model of the Single-Key Meet-in-the-Middle Distinguisher on
                  the Word-Oriented Block Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {203--223},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_13},
  doi          = {10.1007/978-3-319-12160-4\_13},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LinWW013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWZZD13,
  author       = {Wenling Wu and
                  Shuang Wu and
                  Lei Zhang and
                  Jian Zou and
                  Le Dong},
  title        = {LHash: {A} Lightweight Hash Function (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/867},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuWZZD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangWYZ12,
  author       = {Yanfeng Wang and
                  Wenling Wu and
                  Xiaoli Yu and
                  Lei Zhang},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Security on LBlock against Biclique Cryptanalysis},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_1},
  doi          = {10.1007/978-3-642-35416-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WangWYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangWZW11,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Lei Zhang and
                  Peng Wang},
  title        = {{CBCR:} {CBC} {MAC} with rotating transformations},
  journal      = {Sci. China Inf. Sci.},
  volume       = {54},
  number       = {11},
  pages        = {2247--2255},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11432-011-4289-5},
  doi          = {10.1007/S11432-011-4289-5},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangWZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WuZ11,
  author       = {Wenling Wu and
                  Lei Zhang},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {LBlock: {A} Lightweight Block Cipher},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {327--344},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_19},
  doi          = {10.1007/978-3-642-21554-4\_19},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YuWLZ11,
  author       = {Xiaoli Yu and
                  Wenling Wu and
                  Yanjun Li and
                  Lei Zhang},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Cryptanalysis of Reduced-Round {KLEIN} Block Cipher},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {237--250},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_18},
  doi          = {10.1007/978-3-642-34704-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YuWLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiWZ11,
  author       = {Yanjun Li and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Improved Integral Attacks on Reduced-Round {CLEFIA} Block Cipher},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {28--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_3},
  doi          = {10.1007/978-3-642-27890-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wu011,
  author       = {Wenling Wu and
                  Lei Zhang},
  title        = {LBlock: {A} Lightweight Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wu011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangWWZWL10,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang and
                  Lei Zhang and
                  Shuang Wu and
                  Bo Liang},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers:
                  {PGV} Model Revisited},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {250--269},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_14},
  doi          = {10.1007/978-3-642-13858-4\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangWWZWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiWZ10,
  author       = {Yanjun Li and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Integral Attacks on Reduced-Round {ARIA} Block Cipher},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {19--29},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_2},
  doi          = {10.1007/978-3-642-12827-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SuWZL10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Full-Round Differential Attack on {TWIS} Block Cipher},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {234--242},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_17},
  doi          = {10.1007/978-3-642-17955-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SuWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuWZL10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  title        = {Some Observations on {TWIS} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangWZL09,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {A note on Cook's elastic block cipher},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {380--383},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533110},
  doi          = {10.1145/1533057.1533110},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangWZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangWZ09,
  author       = {Lei Zhang and
                  Wenling Wu and
                  Liting Zhang},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Proposition of Two Cipher Structures},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {215--229},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_16},
  doi          = {10.1007/978-3-642-16342-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WuZZZ09,
  author       = {Wenling Wu and
                  Lei Zhang and
                  Liting Zhang and
                  Wentao Zhang},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Security Analysis of the {GF-NLFSR} Structure and Four-Cell Block
                  Cipher},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_4},
  doi          = {10.1007/978-3-642-11145-7\_4},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WuZZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZZZ09,
  author       = {Wenling Wu and
                  Lei Zhang and
                  Liting Zhang and
                  Wentao Zhang},
  title        = {Security Analysis of the {GF-NLFSR} Structure and Four-Cell Block
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangZW08,
  author       = {Lei Zhang and
                  Wentao Zhang and
                  Wenling Wu},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Cryptanalysis of Reduced-Round {SMS4} Block Cipher},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {216--229},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_16},
  doi          = {10.1007/978-3-540-70500-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhangWPKY08,
  author       = {Lei Zhang and
                  Wenling Wu and
                  Je Hong Park and
                  Bonwook Koo and
                  Yongjin Yeom},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Improved Impossible Differential Attacks on Large-Block Rijndael},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {298--315},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_21},
  doi          = {10.1007/978-3-540-85886-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhangWPKY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WuZZ08,
  author       = {Wenling Wu and
                  Lei Zhang and
                  Wentao Zhang},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {442--456},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_29},
  doi          = {10.1007/978-3-642-04159-4\_29},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WuZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhangZWF07,
  author       = {Wentao Zhang and
                  Lei Zhang and
                  Wenling Wu and
                  Dengguo Feng},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Related-Key Differential-Linear Attacks on Reduced {AES-192}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_7},
  doi          = {10.1007/978-3-540-77026-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ZhangZWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ZhangWZF06,
  author       = {Wentao Zhang and
                  Wenling Wu and
                  Lei Zhang and
                  Dengguo Feng},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Improved Related-Key Impossible Differential Attacks on Reduced-Round
                  {AES-192}},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_2},
  doi          = {10.1007/978-3-540-74462-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ZhangWZF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics