Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block ciphers S Sun, L Hu, P Wang, K Qiao, X Ma, L Song Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 488 | 2014 |
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined … S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu Cryptology ePrint Archive, 2014 | 159 | 2014 |
HCTR: A variable-input-length enciphering mode P Wang, D Feng, W Wu International Conference on Information Security and Cryptology, 175-188, 2005 | 132 | 2005 |
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks S Sun, L Hu, L Song, Y Xie, P Wang International Conference on Information Security and Cryptology, 39-51, 2013 | 87 | 2013 |
3kf9: enhancing 3GPP-MAC beyond the birthday bound L Zhang, W Wu, H Sui, P Wang Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 61 | 2012 |
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications. S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song IACR Cryptol. ePrint Arch. 2014, 747, 2014 | 24 | 2014 |
Constructing mixed-integer programming models whose feasible region is exactly the set of all valid differential characteristics of SIMON S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma, D Shi, L Song, K Fu Cryptology ePrint Archive, 2015 | 18 | 2015 |
Attacks on beyond-birthday-bound MACs in the quantum setting T Guo, P Wang, L Hu, D Ye Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 16 | 2021 |
Security of truncated MACs P Wang, D Feng, C Lin, W Wu Information Security and Cryptology: 4th International Conference, Inscrypt …, 2009 | 15 | 2009 |
Related-key almost universal hash functions: definitions, constructions and applications P Wang, Y Li, L Zhang, K Zheng International Conference on Fast Software Encryption, 514-532, 2016 | 13 | 2016 |
Parallelizable Authenticated Encryption Schemes based on AES Round Function D Ye, P Wang, L Hu, L Wang, Y Xie, S Sun, P Wang | 13 | 2014 |
A note on the security framework of two-key dbhts macs T Guo, P Wang International Conference on Information and Communications Security, 55-68, 2022 | 11 | 2022 |
INT-RUP security of checksum-based authenticated encryption P Zhang, P Wang, H Hu, C Cheng, W Kuai Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017 | 10 | 2017 |
Effect of silane KH550 on interface of basalt fibers (BFs)/poly (lactic acid)(PLA) composites SQ Liu, JJ Yu, GH Wu, P Wang, MF Liu, Y Zhang, J Zhang, XL Yin, F Li, ... Ind. Textila 70, 408-412, 2019 | 9 | 2019 |
Collision attacks on variant of OCB mode and its series Z Sun, P Wang, L Zhang Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013 | 9 | 2013 |
Constructing rate-1 MACs from related-key unpredictable block ciphers: PGV model revisited L Zhang, W Wu, P Wang, L Zhang, S Wu, B Liang Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 9 | 2010 |
Quantum attacks on lai-massey structure S Mao, T Guo, P Wang, L Hu International Conference on Post-Quantum Cryptography, 205-229, 2022 | 8 | 2022 |
The INT-RUP security of OCB with intermediate (Parity) checksum P Zhang, P Wang, H Hu Cryptology ePrint Archive, 2016 | 8 | 2016 |
Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes Z Sun, P Wang, L Zhang Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 8 | 2015 |
On the security of tweakable modes of operation: TBC and TAE P Wang, D Feng, W Wu Information Security: 8th International Conference, ISC 2005, Singapore …, 2005 | 8 | 2005 |