dblp.uni-trier.dewww.dagstuhl.dewww.uni-trier.de

Lei Wang (Selection)

University of Electro-Communications, Japan

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo


28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions. ACNS 2012: 275-292
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta: Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. AFRICACRYPT 2012: 138-154
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta: New Truncated Differential Cryptanalysis on 3D Block Cipher. ISPEC 2012: 109-125
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: 2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160. IACR Cryptology ePrint Archive 2012: 49 (2012)
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta: Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. IEICE Transactions 95-A(1): 100-110 (2012)
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama: (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. CT-RSA 2011: 197-212
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta: Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model. ProvSec 2011: 281-296
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki: Preimage Attack on 23-Step Tiger. IEICE Transactions 94-A(1): 110-120 (2011)
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta: Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model. IEICE Transactions 94-A(1): 57-70 (2011)
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta: Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. ASIACRYPT 2010: 38-55
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki: Finding Preimages of Tiger Up to 23 Steps. FSE 2010: 116-133
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro: Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Transactions 93-A(1): 84-92 (2010)
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro: Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Transactions 93-D(5): 1087-1095 (2010)
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta: How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! ASIACRYPT 2009: 382-398
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang: Preimages for Step-Reduced SHA-2. ASIACRYPT 2009: 578-597
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta: Bit-Free Collision: Application to APOP Attack. IWSEC 2009: 3-21
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta: How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability. IACR Cryptology ePrint Archive 2009: 40 (2009)
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazumaro Aoki: Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. IACR Cryptology ePrint Archive 2009: 479 (2009)
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Lei Wang, Kazuo Ohta: How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models. IACR Cryptology ePrint Archive 2009: 550 (2009)
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta: Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model. IACR Cryptology ePrint Archive 2009: 75 (2009)
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Kazuo Ohta, Noboru Kunihiro: Near-Collision Attacks on MD4: Applied to MD4-Based Protocols. IEICE Transactions 92-A(1): 76-86 (2009)
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication. IEICE Transactions 92-A(1): 96-104 (2009)
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. AFRICACRYPT 2008: 290-307
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. CT-RSA 2008: 1-18
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Kazuo Ohta, Noboru Kunihiro: New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. EUROCRYPT 2008: 237-253
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Noboru Kunihiro, Kazuo Ohta: New Message Differences for Collision Attacks on MD4 and MD5. IEICE Transactions 91-A(1): 55-63 (2008)
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: New Message Difference for MD4. FSE 2007: 329-348
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta: Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares. IEICE Transactions 89-A(5): 1382-1395 (2006)

Selection of 28 from 28 records - Lei Wang has 14 coauthors

Last update 2012-09-10 CET by the DBLP TeamThis material is Open Data Content released under the ODC-BY 1.0 license — See also our legal information page