×
Author ID: wang.lei.7 Recent zbMATH articles by "Wang, Lei"
Published as: Wang, Lei
Homepage: https://www.cs.sjtu.edu.cn/en/PeopleDetail.aspx?id=325
External Links: ORCID · dblp

Publications by Year

Citations contained in zbMATH Open

40 Publications have been cited 171 times in 116 Documents Cited by Year
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
14
2009
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
11
2010
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
11
2012
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
9
2013
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
8
2012
New generic attacks against hash-based MACs. Zbl 1314.94083
Leurent, Gaëtan; Peyrin, Thomas; Wang, Lei
7
2013
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security. Zbl 1446.94133
Guo, Chun; Wang, Lei
6
2018
Known-key distinguisher on full \(\mathtt{PRESENT}\). Zbl 1375.94104
Blondeau, Céline; Peyrin, Thomas; Wang, Lei
6
2015
How to build fully secure tweakable blockciphers from classical blockciphers. Zbl 1404.94118
Wang, Lei; Guo, Jian; Zhang, Guoyan; Zhao, Jingyuan; Gu, Dawu
6
2016
Cryptanalysis of round-reduced \(\mathbf{LED}\). Zbl 1321.94082
Nikolić, Ivica; Wang, Lei; Wu, Shuang
5
2014
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
5
2014
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
5
2011
Generic universal forgery attack on iterative hash-based MACs. Zbl 1332.94077
Peyrin, Thomas; Wang, Lei
5
2014
Analysis of BLAKE2. Zbl 1337.94038
Guo, Jian; Karpman, Pierre; Nikolić, Ivica; Wang, Lei; Wu, Shuang
5
2014
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. Zbl 1149.94331
Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
5
2008
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
5
2013
Security analysis of Prince. Zbl 1321.94066
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Wang, Lei; Wu, Shuang
4
2014
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
4
2007
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
Improved cryptanalysis of reduced RIPEMD-160. Zbl 1326.94115
Mendel, Florian; Peyrin, Thomas; Schläffer, Martin; Wang, Lei; Wu, Shuang
4
2013
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting. Zbl 1487.94137
Shen, Yaobin; Wang, Lei; Gu, Dawu; Weng, Jian
4
2021
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
4
2012
The usage of counter revisited: second-preimage attack on new Russian standardized hash function. Zbl 1382.94114
Guo, Jian; Jean, Jérémy; Leurent, Gaëtan; Peyrin, Thomas; Wang, Lei
4
2014
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
3
2010
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
3
2013
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
3
2014
Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs. Zbl 1382.94122
Iwata, Tetsu; Wang, Lei
2
2015
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
Tweaking key-alternating Feistel block ciphers. Zbl 07314277
Yan, Hailun; Wang, Lei; Shen, Yaobin; Lai, Xuejia
2
2020
Beyond-birthday secure domain-preserving PRFs from a single permutation. Zbl 1445.94020
Guo, Chun; Shen, Yaobin; Wang, Lei; Gu, Dawu
2
2019
How to confirm cryptosystems security: the original Merkle-Damgård is still alive! Zbl 1267.94127
Naito, Yusuke; Yoneyama, Kazuki; Wang, Lei; Ohta, Kazuo
2
2009
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
2
2012
Cryptanalysis of JAMBU. Zbl 1382.94154
Peyrin, Thomas; Sim, Siang Meng; Wang, Lei; Zhang, Guoyan
1
2015
The sum can be weaker than each part. Zbl 1370.94526
Leurent, Gaëtan; Wang, Lei
1
2015
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Functional graph revisited: updates on (second) preimage attacks on hash combiners. Zbl 1410.94043
Bao, Zhenzhen; Wang, Lei; Guo, Jian; Gu, Dawu
1
2017
Replacing SHA-2 with SHA-3 enhances generic security of HMAC. Zbl 1334.94088
Naito, Yusuke; Wang, Lei
1
2016
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting. Zbl 1487.94137
Shen, Yaobin; Wang, Lei; Gu, Dawu; Weng, Jian
4
2021
Tweaking key-alternating Feistel block ciphers. Zbl 07314277
Yan, Hailun; Wang, Lei; Shen, Yaobin; Lai, Xuejia
2
2020
Beyond-birthday secure domain-preserving PRFs from a single permutation. Zbl 1445.94020
Guo, Chun; Shen, Yaobin; Wang, Lei; Gu, Dawu
2
2019
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security. Zbl 1446.94133
Guo, Chun; Wang, Lei
6
2018
Functional graph revisited: updates on (second) preimage attacks on hash combiners. Zbl 1410.94043
Bao, Zhenzhen; Wang, Lei; Guo, Jian; Gu, Dawu
1
2017
How to build fully secure tweakable blockciphers from classical blockciphers. Zbl 1404.94118
Wang, Lei; Guo, Jian; Zhang, Guoyan; Zhao, Jingyuan; Gu, Dawu
6
2016
Replacing SHA-2 with SHA-3 enhances generic security of HMAC. Zbl 1334.94088
Naito, Yusuke; Wang, Lei
1
2016
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Known-key distinguisher on full \(\mathtt{PRESENT}\). Zbl 1375.94104
Blondeau, Céline; Peyrin, Thomas; Wang, Lei
6
2015
Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs. Zbl 1382.94122
Iwata, Tetsu; Wang, Lei
2
2015
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
Cryptanalysis of JAMBU. Zbl 1382.94154
Peyrin, Thomas; Sim, Siang Meng; Wang, Lei; Zhang, Guoyan
1
2015
The sum can be weaker than each part. Zbl 1370.94526
Leurent, Gaëtan; Wang, Lei
1
2015
Cryptanalysis of round-reduced \(\mathbf{LED}\). Zbl 1321.94082
Nikolić, Ivica; Wang, Lei; Wu, Shuang
5
2014
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
5
2014
Generic universal forgery attack on iterative hash-based MACs. Zbl 1332.94077
Peyrin, Thomas; Wang, Lei
5
2014
Analysis of BLAKE2. Zbl 1337.94038
Guo, Jian; Karpman, Pierre; Nikolić, Ivica; Wang, Lei; Wu, Shuang
5
2014
Security analysis of Prince. Zbl 1321.94066
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Wang, Lei; Wu, Shuang
4
2014
The usage of counter revisited: second-preimage attack on new Russian standardized hash function. Zbl 1382.94114
Guo, Jian; Jean, Jérémy; Leurent, Gaëtan; Peyrin, Thomas; Wang, Lei
4
2014
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
3
2014
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
9
2013
New generic attacks against hash-based MACs. Zbl 1314.94083
Leurent, Gaëtan; Peyrin, Thomas; Wang, Lei
7
2013
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
5
2013
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
Improved cryptanalysis of reduced RIPEMD-160. Zbl 1326.94115
Mendel, Florian; Peyrin, Thomas; Schläffer, Martin; Wang, Lei; Wu, Shuang
4
2013
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
3
2013
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
11
2012
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
8
2012
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
4
2012
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
2
2012
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
5
2011
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
11
2010
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
3
2010
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
14
2009
How to confirm cryptosystems security: the original Merkle-Damgård is still alive! Zbl 1267.94127
Naito, Yusuke; Yoneyama, Kazuki; Wang, Lei; Ohta, Kazuo
2
2009
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. Zbl 1149.94331
Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
5
2008
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
4
2007
all top 5

Cited by 223 Authors

13 Sasaki, Yu
9 Guo, Jian
7 Nandi, Mridul
6 Wang, Lei
5 AlTawy, Riham
5 Dong, Xiaoyang
5 Dutta, Avijit
5 Mendel, Florian
5 Wang, Xiaoyun
5 Youssef, Amr M.
4 Bao, Zhenzhen
4 Chen, Huaifeng
4 Dinur, Itai
4 Dunkelman, Orr
4 Jean, Jérémy
4 Keller, Nathan
4 Leurent, Gaëtan
4 Peyrin, Thomas
4 Wang, Gaoli
4 Wang, Meiqin
3 Eichlseder, Maria
3 Guo, Chun
3 Hosoyamada, Akinori
3 Kiryukhin, V. A.
3 Lai, Xuejia
3 Mennink, Bart
3 Neves, Samuel
3 Ohta, Kazuo
3 Shamir, Adi
3 Sun, Ling
3 Sun, Siwei
3 Todo, Yosuke
3 Wu, Wenling
3 Yu, Hongbo
3 Zhang, Guoyan
2 Abdelkhalek, Ahmed
2 Bagheri, Nasour
2 Bhattacharjee, Arghya
2 Bogdanov, Andrey
2 Chen, Yulong
2 Cogliati, Benoît
2 Cui, Tingting
2 Dobraunig, Christoph
2 Fouque, Pierre-Alain
2 Hu, Lei
2 Hua, Jialiang
2 Isobe, Takanori
2 Jovanovic, Philipp
2 Khati, Louiza
2 Leander, Gregor
2 Lee, Jooyoung
2 Li, Zheng
2 List, Eik
2 Liu, Fukang
2 Lucks, Stefan
2 Malyshev, Fëdor Mikhaĭlovich
2 Meier, Willi
2 Mouha, Nicky
2 Naya-Plasencia, María
2 Preneel, Bart
2 Rechberger, Christian
2 Sakiyama, Kazuo
2 Schläffer, Martin
2 Seurin, Yannick
2 Shen, Yaobin
2 Shi, Danping
2 Sibleyras, Ferdinand
2 Song, Ling
2 Tolba, Mohamed
2 Wang, Peng
2 Wei, Congming
2 Wen, Long
2 Wu, Shuang
2 Zou, Jian
1 Anand, Ravi
1 Araújo, Filipe
1 Aumasson, Jean-Philippe
1 Bai, Dongxia
1 Bar-On, Achiya
1 Bhattacharyya, Rishiraj
1 Bhaumik, Ritam
1 Biham, Eli
1 Boháček, Milan
1 Boissier, Rachelle Heim
1 Boura, Christina
1 Božilov, Dušan
1 Bresson, Emmanuel
1 Canteaut, Anne
1 Cao, Zhenfu
1 Chakraborti, Avik
1 Chakraborty, Soubhik
1 Chaturvedi, Atul
1 Chen, Shan
1 Chen, Shaozhen
1 Chevallier-Mames, Benoît
1 Choi, Wonseok
1 Clavier, Christophe
1 Cui, Binbin
1 Da, Qi
1 Demirbaş, Fatih
...and 123 more Authors

Citations by Year