![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Wentao Zhang 0006
Person information
- affiliation: Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Other persons with the same name
- Wentao Zhang — disambiguation page
- Wentao Zhang 0001
— Peking University, Beijing, China (and 1 more)
- Wentao Zhang 0002
— Institute of Semiconductors, Chinese Academy of Sciences, Beijing, China
- Wentao Zhang 0003 — Nanyang Technological University, Singapore
- Wentao Zhang 0004 — Southeast University, Nanjing, China
- Wentao Zhang 0005 — Sun Yat-sen University, Guangzhou, China
- Wentao Zhang 0007
— Nanyang Technological University, College of Computing and Data Science, Singapore
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [c9]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu:
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. ACNS 2012: 117-134 - 2010
- [j3]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng:
Some results on cryptanalysis of SMS4 block cipher. Int. J. Appl. Cryptogr. 2(1): 60-67 (2010) - [i5]Bozhan Su, Wenling Wu, Wentao Zhang:
Differential Cryptanalysis of SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2010: 62 (2010)
2000 – 2009
- 2009
- [c8]Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang:
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. ICICS 2009: 17-31 - [c7]Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335 - [i4]Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang:
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. IACR Cryptol. ePrint Arch. 2009: 346 (2009) - 2008
- [c6]Lei Zhang, Wentao Zhang, Wenling Wu:
Cryptanalysis of Reduced-Round SMS4 Block Cipher. ACISP 2008: 216-229 - [c5]Wenling Wu, Lei Zhang, Wentao Zhang:
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. Selected Areas in Cryptography 2008: 442-456 - 2007
- [j2]Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. J. Comput. Sci. Technol. 22(3): 449-456 (2007) - [c4]Wentao Zhang, Wenling Wu, Dengguo Feng:
New Results on Impossible Differential Cryptanalysis of Reduced AES. ICISC 2007: 239-250 - [c3]Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng:
Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRYPT 2007: 73-85 - 2006
- [j1]Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. Int. J. Netw. Secur. 3(3): 215-224 (2006) - [c2]Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng:
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Selected Areas in Cryptography 2006: 15-27 - [i3]Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of ARIA and Camellia. IACR Cryptol. ePrint Arch. 2006: 350 (2006) - 2005
- [c1]Wenling Wu, Wentao Zhang, Dengguo Feng:
Integral Cryptanalysis of Reduced FOX Block Cipher. ICISC 2005: 229-241 - [i2]Wenling Wu, Wentao Zhang, Dengguo Feng:
Improved Integral Cryptanalysis of FOX Block Cipher. IACR Cryptol. ePrint Arch. 2005: 292 (2005) - 2004
- [i1]Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. IACR Cryptol. ePrint Arch. 2004: 337 (2004)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 01:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint