×

zbMATH — the first resource for mathematics

Wang, Lei

Compute Distance To:
Author ID: wang.lei.7 Recent zbMATH articles by "Wang, Lei"
Published as: Wang, L.; Wang, Lei
Homepage: http://www.cs.sjtu.edu.cn/en/PeopleDetail.aspx?id=325
External Links: dblp
Documents Indexed: 121 Publications since 2007

Publications by Year

Citations contained in zbMATH

51 Publications have been cited 143 times in 116 Documents Cited by Year
Robust estimation for ordinary differential equation models. Zbl 1274.62739
Cao, Jiguo; Wang, L.; Xu, Jia
11
2011
Persistence and extinction for a class of stochastic SIS epidemic models with nonlinear incidence rate. Zbl 1400.92542
Teng, Zhidong; Wang, Lei
10
2016
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
10
2009
Modeling and analysis of the transmission of echinococcosis with application to Xinjiang Uygur autonomous region of China. Zbl 1397.92686
Wang, Kai; Zhang, Xueliang; Jin, Zhen; Ma, Haimei; Teng, Zhidong; Wang, Lei
7
2013
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
7
2010
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. Zbl 1149.94331
Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
5
2008
Reduced-order filter design of T-S fuzzy stochastic systems with time-varying delay. Zbl 1398.93340
Su, Xiaojie; Xia, Fengqin; Yang, Rongni; Wang, Lei
4
2017
How to build fully secure tweakable blockciphers from classical blockciphers. Zbl 1404.94118
Wang, Lei; Guo, Jian; Zhang, Guoyan; Zhao, Jingyuan; Gu, Dawu
4
2016
Cryptanalysis of round-reduced \(\mathbf{LED}\). Zbl 1321.94082
Nikolić, Ivica; Wang, Lei; Wu, Shuang
4
2014
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
4
2013
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
4
2012
Global dynamics for a class of discrete SEIRS epidemic models with general nonlinear incidence. Zbl 1419.37078
Fan, Xiaolin; Wang, Lei; Teng, Zhidong
3
2016
Known-key distinguisher on full \(\mathtt{PRESENT}\). Zbl 1375.94104
Blondeau, Céline; Peyrin, Thomas; Wang, Lei
3
2015
Generic universal forgery attack on iterative hash-based MACs. Zbl 1332.94077
Peyrin, Thomas; Wang, Lei
3
2014
Analysis of BLAKE2. Zbl 1337.94038
Guo, Jian; Karpman, Pierre; Nikolić, Ivica; Wang, Lei; Wu, Shuang
3
2014
New generic attacks against hash-based MACs. Zbl 1314.94083
Leurent, Gaëtan; Peyrin, Thomas; Wang, Lei
3
2013
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
3
2012
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
3
2011
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
3
2007
Nonlinear analysis and characteristics of inductive galloping energy harvesters. Zbl 07263365
Dai, H. L.; Yang, Y. W.; Abdelkefi, A.; Wang, L.
2
2018
A note on strategic stability of cooperative solutions for multistage games. Zbl 1422.91106
Wang, Lei; Liu, Cui; Xue, Juan; Gao, Hongwei
2
2018
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security. Zbl 1446.94133
Guo, Chun; Wang, Lei
2
2018
Vortex-induced vibrations mitigation through a nonlinear energy sink. Zbl 07257071
Dai, H. L.; Abdelkefi, A.; Wang, L.
2
2017
Reduced-order model approximation of fuzzy switched systems with pre-specified performance. Zbl 1429.93045
Su, Xiaojie; Liu, Xinxin; Song, Yong-Duan; Lam, Hak Keung; Wang, Lei
2
2016
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
Variable torque control of offshore wind turbine on Spar floating platform using advanced RBF neural network. Zbl 1406.93230
Wang, Lei; Zuo, Shan; Song, Y. D.; Zhou, Zheng
2
2014
Security analysis of Prince. Zbl 1321.94066
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Wang, Lei; Wu, Shuang
2
2014
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
2
2014
Improved cryptanalysis of reduced RIPEMD-160. Zbl 1326.94115
Mendel, Florian; Peyrin, Thomas; Schläffer, Martin; Wang, Lei; Wu, Shuang
2
2013
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
2
2013
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
2
2013
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
2
2012
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
On the automorphism groups of Frobenius groups. Zbl 07253623
Wang, Lei
1
2020
A novel model for predicting associations between diseases and lncRNA-miRNA pairs based on a newly constructed bipartite network. Zbl 1411.92127
Zhou, Shunxian; Xuan, Zhanwei; Wang, Lei; Ping, Pengyao; Pei, Tingrui
1
2018
Fuzzy grey cognitive networks modeling and its application. Zbl 1424.93011
Chen, Ning; Peng, Junjie; Wang, Lei; Guo, Yuqian; Gui, Weihua
1
2018
Modelling peeling- and pressure-driven propagation of arterial dissection. Zbl 1408.74040
Wang, Lei; Hill, Nicholas A.; Roper, Steven M.; Luo, Xiaoyu
1
2018
Functional graph revisited: updates on (second) preimage attacks on hash combiners. Zbl 1410.94043
Bao, Zhenzhen; Wang, Lei; Guo, Jian; Gu, Dawu
1
2017
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
The sum can be weaker than each part. Zbl 1370.94526
Leurent, Gaëtan; Wang, Lei
1
2015
Cryptanalysis of JAMBU. Zbl 1382.94154
Peyrin, Thomas; Sim, Siang Meng; Wang, Lei; Zhang, Guoyan
1
2015
Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs. Zbl 1382.94122
Iwata, Tetsu; Wang, Lei
1
2015
Neuron-adaptive PID based speed control of SCSG wind turbine system. Zbl 1406.93234
Zuo, Shan; Song, Yongduan; Wang, Lei; Zhou, Zheng
1
2014
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
1
2014
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
1
2012
A new criterion for zero quantum discord. Zbl 1448.81158
Huang, Jie-Hui; Wang, Lei; Zhu, Shi-Yao
1
2011
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
1
2010
How to confirm cryptosystems security: the original Merkle-Damgård is still alive! Zbl 1267.94127
Naito, Yusuke; Yoneyama, Kazuki; Wang, Lei; Ohta, Kazuo
1
2009
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
On the automorphism groups of Frobenius groups. Zbl 07253623
Wang, Lei
1
2020
Nonlinear analysis and characteristics of inductive galloping energy harvesters. Zbl 07263365
Dai, H. L.; Yang, Y. W.; Abdelkefi, A.; Wang, L.
2
2018
A note on strategic stability of cooperative solutions for multistage games. Zbl 1422.91106
Wang, Lei; Liu, Cui; Xue, Juan; Gao, Hongwei
2
2018
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security. Zbl 1446.94133
Guo, Chun; Wang, Lei
2
2018
A novel model for predicting associations between diseases and lncRNA-miRNA pairs based on a newly constructed bipartite network. Zbl 1411.92127
Zhou, Shunxian; Xuan, Zhanwei; Wang, Lei; Ping, Pengyao; Pei, Tingrui
1
2018
Fuzzy grey cognitive networks modeling and its application. Zbl 1424.93011
Chen, Ning; Peng, Junjie; Wang, Lei; Guo, Yuqian; Gui, Weihua
1
2018
Modelling peeling- and pressure-driven propagation of arterial dissection. Zbl 1408.74040
Wang, Lei; Hill, Nicholas A.; Roper, Steven M.; Luo, Xiaoyu
1
2018
Reduced-order filter design of T-S fuzzy stochastic systems with time-varying delay. Zbl 1398.93340
Su, Xiaojie; Xia, Fengqin; Yang, Rongni; Wang, Lei
4
2017
Vortex-induced vibrations mitigation through a nonlinear energy sink. Zbl 07257071
Dai, H. L.; Abdelkefi, A.; Wang, L.
2
2017
Functional graph revisited: updates on (second) preimage attacks on hash combiners. Zbl 1410.94043
Bao, Zhenzhen; Wang, Lei; Guo, Jian; Gu, Dawu
1
2017
Persistence and extinction for a class of stochastic SIS epidemic models with nonlinear incidence rate. Zbl 1400.92542
Teng, Zhidong; Wang, Lei
10
2016
How to build fully secure tweakable blockciphers from classical blockciphers. Zbl 1404.94118
Wang, Lei; Guo, Jian; Zhang, Guoyan; Zhao, Jingyuan; Gu, Dawu
4
2016
Global dynamics for a class of discrete SEIRS epidemic models with general nonlinear incidence. Zbl 1419.37078
Fan, Xiaolin; Wang, Lei; Teng, Zhidong
3
2016
Reduced-order model approximation of fuzzy switched systems with pre-specified performance. Zbl 1429.93045
Su, Xiaojie; Liu, Xinxin; Song, Yong-Duan; Lam, Hak Keung; Wang, Lei
2
2016
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Known-key distinguisher on full \(\mathtt{PRESENT}\). Zbl 1375.94104
Blondeau, Céline; Peyrin, Thomas; Wang, Lei
3
2015
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
The sum can be weaker than each part. Zbl 1370.94526
Leurent, Gaëtan; Wang, Lei
1
2015
Cryptanalysis of JAMBU. Zbl 1382.94154
Peyrin, Thomas; Sim, Siang Meng; Wang, Lei; Zhang, Guoyan
1
2015
Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs. Zbl 1382.94122
Iwata, Tetsu; Wang, Lei
1
2015
Cryptanalysis of round-reduced \(\mathbf{LED}\). Zbl 1321.94082
Nikolić, Ivica; Wang, Lei; Wu, Shuang
4
2014
Generic universal forgery attack on iterative hash-based MACs. Zbl 1332.94077
Peyrin, Thomas; Wang, Lei
3
2014
Analysis of BLAKE2. Zbl 1337.94038
Guo, Jian; Karpman, Pierre; Nikolić, Ivica; Wang, Lei; Wu, Shuang
3
2014
Variable torque control of offshore wind turbine on Spar floating platform using advanced RBF neural network. Zbl 1406.93230
Wang, Lei; Zuo, Shan; Song, Y. D.; Zhou, Zheng
2
2014
Security analysis of Prince. Zbl 1321.94066
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Wang, Lei; Wu, Shuang
2
2014
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
2
2014
Neuron-adaptive PID based speed control of SCSG wind turbine system. Zbl 1406.93234
Zuo, Shan; Song, Yongduan; Wang, Lei; Zhou, Zheng
1
2014
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
1
2014
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Modeling and analysis of the transmission of echinococcosis with application to Xinjiang Uygur autonomous region of China. Zbl 1397.92686
Wang, Kai; Zhang, Xueliang; Jin, Zhen; Ma, Haimei; Teng, Zhidong; Wang, Lei
7
2013
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
4
2013
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
New generic attacks against hash-based MACs. Zbl 1314.94083
Leurent, Gaëtan; Peyrin, Thomas; Wang, Lei
3
2013
Improved cryptanalysis of reduced RIPEMD-160. Zbl 1326.94115
Mendel, Florian; Peyrin, Thomas; Schläffer, Martin; Wang, Lei; Wu, Shuang
2
2013
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
2
2013
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
2
2013
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
4
2012
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
3
2012
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
2
2012
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
1
2012
Robust estimation for ordinary differential equation models. Zbl 1274.62739
Cao, Jiguo; Wang, L.; Xu, Jia
11
2011
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
3
2011
A new criterion for zero quantum discord. Zbl 1448.81158
Huang, Jie-Hui; Wang, Lei; Zhu, Shi-Yao
1
2011
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
7
2010
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
1
2010
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
10
2009
How to confirm cryptosystems security: the original Merkle-Damgård is still alive! Zbl 1267.94127
Naito, Yusuke; Yoneyama, Kazuki; Wang, Lei; Ohta, Kazuo
1
2009
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. Zbl 1149.94331
Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
5
2008
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
3
2007
all top 5

Cited by 287 Authors

10 Sasaki, Yu
5 Guo, Jian
5 Wang, Lei
4 Cao, Jiguo
4 Chen, Huaifeng
4 Dinur, Itai
4 Dunkelman, Orr
4 Jean, Jérémy
4 Keller, Nathan
4 Mendel, Florian
4 Peyrin, Thomas
4 Wang, Meiqin
3 Cui, Hengjian
3 Hu, Tao
3 Nandi, Mridul
3 Ohta, Kazuo
3 Qiu, Yanping
3 Shamir, Adi
3 Sun, Ling
3 Teng, Zhi-dong
3 Wang, Gaoli
2 AlTawy, Riham
2 Bagheri, Nasour
2 Bogdanov, Andrey
2 Carroll, Raymond James
2 Cui, Tingting
2 Fouque, Pierre-Alain
2 Gao, Hongwei
2 Huo, Hai-Feng
2 Lee, Jooyoung
2 Leurent, Gaëtan
2 Li, Dungang
2 Liu, Baisen
2 Liu, Cui
2 Liu, Luju
2 Lucks, Stefan
2 Meng, Xinzhu
2 Mennink, Bart
2 Mouha, Nicky
2 Naya-Plasencia, María
2 Preneel, Bart
2 Rechberger, Christian
2 Sakiyama, Kazuo
2 Schläffer, Martin
2 Wang, Kai
2 Wang, Lei
2 Wang, Liangliang
2 Wang, Xiaoyun
2 Wei, Fengying
2 Wen, Long
2 Youssef, Amr M.
2 Yu, Hongbo
2 Zhang, Guoyan
2 Zhang, Xiaobing
2 Zheng, Xueliang
2 Zuo, Shan
1 Ai, Cuihua
1 Alberts, Brandon
1 Anton, Cristina A.
1 Araújo, Filipe
1 Bao, Zhenzhen
1 Bar-On, Achiya
1 Baudrot, Virgile
1 Bellizzi, Sergio
1 Bergeot, Baptiste
1 Berger, Sébastien
1 Biham, Eli
1 Boháček, Milan
1 Boura, Christina
1 Bresson, Emmanuel
1 Campbell, David A.
1 Canteaut, Anne
1 Carbonell, Felix
1 Chakraborti, Avik
1 Chang, Xiaoheng
1 Chang, Zhengbo
1 Chaturvedi, Anita
1 Chen, Lihong
1 Chen, Lijuan
1 Chen, Ning
1 Chen, Shan
1 Chen, Shaozhen
1 Chen, Sixing
1 Cheng, Jun
1 Chevallier-Mames, Benoît
1 Chkrebtii, Oksana A.
1 Clavier, Christophe
1 Cogliati, Benoît
1 Cui, Binbin
1 Cunha, Americo jun.
1 Dai, Jiayang
1 Dass, Sarat C.
1 Dobraunig, Christoph
1 Duan, Xun
1 Dutta, Avijit
1 Espitau, Thomas
1 Fan, Chenchen
1 Fan, Meng
1 Feng, Jinqian
1 Feng, Tao
...and 187 more Authors

Citations by Year