基本信息
吴文玲  女  博导  中国科学院软件研究所
电子邮件: wenling@iscas.ac.cn
通信地址: 北京8718信箱
邮政编码: 100190

研究领域

信息安全、密码学 

教育背景

1994-09--1997-09   西安电子科技大学   博士
1987-09--1990-07   西北大学 数学系   硕士
1983-09--1987-07   西北大学 数学系   学士

工作经历

   
工作简历
2004-01~现在, 中国科学院软件研究所, 研究员
2000-01~2003-12,中国科学院软件研究所 , 副研究员
1998-02~1999-12,中国科学院软件研究所, 博士后
1990-07~1998-02,西北大学数学系, 讲师
社会兼职
2023-03-26-今,电子与信息学报, 副主编
2022-12-31-今,中国通信学会信息通信及安全数学理论委员会, 委员
2017-12-01-今,中国密码学会组织工作委员会, 主任委员
2016-05-07-今,中国密码学会, 副理事长
2016-03-26-今,密码学报, 副主编
2015-07-01-今,信息安全研究, 编委
2014-08-28-今,中国密码学会, 会士
2014-01-01-今,电子与信息学报, 编委
2014-01-01-今,电子科学学刊(英文版), 编委
2013-11-30-今,密码学报, 领域编委
2011-10-01-今,密码行业标准化技术委员会, 委员
2011-05-28-今,中国密码学会, 常务理事
2009-11-30-2017-11-30,密码算法专业委员会, 主任委员

教授课程

密码学和安全协议
可信计算与信息保障基础理论
密码学前沿
现代密码学
信息安全数学基础

专利与奖励

   
奖励信息
(1) uBlock分组密码算法, 一等奖, 专项, 2020
(2) 分组密码设计与自动分析工具, 二等奖, 部委级, 2018
(3) 中国科学院朱李月华优秀教师奖, , 部委级, 2013
(4) 密码算法设计, 二等奖, 国家级, 2013
(5) 中国科学院软件研究所优秀导师, 研究所(学校), 2012
(6) 中国科学院优秀研究生指导教师奖, , 部委级, 2012
(7) 密码算法评估, 二等奖, 国家级, 2011
(8) 中国科学院软件研究所优秀导师, 研究所(学校), 2010
(9) 密码检测, 一等奖, 部委级, 2006
(10) 密码学基础问题研究, 一等奖, 省级, 2005

出版信息

出版著作  

Ÿ   吴文玲,眭晗,张斌, 轻量级密码学清华大学出版社, 2022.

Ÿ   吴文玲,冯登国,张文涛, 分组密码的设计与分析(第二版), 清华大学出版社, 2009.

 

发表论文    

Ÿ   Zhang, Z., Wu, W., Sui, H. et al. Post-quantum security on the Lai–Massey scheme. Des. Codes Cryptogr, 2023.

Ÿ   Li Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng. Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. The Computer Journal, 2023,

Ÿ   Yongxia Mao, Wenling Wu, Yafei Zheng and Lei Zhang. Related-Cipher Attacks: Applications  to Ballet and ANT. ACISP 2023.

Ÿ   Bolin Wang, Wenling Wu.New key-Independent Structural Properties of AES-like Permutations. IEEE Internet of Things,2022.

Ÿ   ZHANG Zhongya, WU Wenling, SUI Han, and WANG Bolin. Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions.Chinese Institute of Electronics, 2022.

Ÿ   Zhongya ZhangWenling WuHan SuiXiaodan Li, Quantum generic attacks on key-alternating Feistel ciphers for shorter keys. Quantum Information Processing, 2022.

Ÿ   Wengang Jin and Xiaoni DuWenling WuZhixiong ChenGENERIC CONSTRUCTION OF BOOLEAN FUNCTIONS WITH A FEW WALSH TRANSFORM VALUES OF ANY POSSIBLE ALGEBRAIC DEGREE. Advances in Mathematics of Communications,2022.

Ÿ   Yuhan Zhang ,Wenling Wu ,Lei Zhang. Improved Differential Attack in LEA. ACISP 2022.

Ÿ   Yongxia Mao ,Wenling Wu ,Bolin Wang ,Li Zhang. Improved Division Property for Ciphers with Complex Linear Layer. ACISP 2022.

Ÿ   Li Zhang, Wenling Wu, Yafei Zheng and Bolin Wang. Cryptanalysis on Reduced Round 3D and Saturnin. The Computer Journal, 2022

Ÿ   Shi Tairong, Wu Wenling, Hu Bin, Guan Jie, Wang Sengpeng. Breaking LWC candidates: sESTATE and Elephant in quantum setting. DESIGNS CODES AND CRYPTOGRAPHY, 2021.

Ÿ   Zhang Z, Wu W, Wang B. Quantum Differential Collision Distinguishing Attacks on Feistel Schemes. Chinese Journal of Electronics, 2021.

Ÿ   Xiaodan LiWenling Wu.  Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. ACISP 2021.

Ÿ   Zou, J. , Wei, Z. , Sun, S. , Liu, X. , & Wu, W. Quantum Circuit Implementations of AES with Fewer Qubits. ASIACRYPT 2020.

Ÿ   Wang Bolin, Chan Song, Wenling Wu, and Lei Zhang,A New Non-random Property of 4.5-Round PRINCE. ICISC 2020.

Ÿ   吴文玲张蕾郑雅菲李灵琛分组密码uBlock. 密码学报. 2019.

Ÿ   Li LingChen, Wu WenLing, Zhang Lei, Zheng YaFei. New method to describe the differential distribution table for large S-boxes in MILP and its application. IET INFORMATION SECURITY, 2019.

Ÿ   Zheng Yafei, Wu Wenling. Security of Khudra Against Meet-in-the-Middle-Type Cryptanalysis. CHINESE JOURNAL OF ELECTRONICS, 2019.

Ÿ   Zheng Yafei, Wu Wenling. On the extension and security of key schedule of GOST. IET INFORMATION SECURITY, 2019.

Ÿ   Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic. Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. IACR Transactions on Symmetric Cryptology, 2018.

Ÿ   Zou Jian, Dong Le, Wu Wenling. New algorithms for the unbalanced generalised birthday problem. IET INFORMATION SECURITY, 2018.

Ÿ   Lin, Li, Wu, Wenling. Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. DESIGNS CODES AND CRYPTOGRAPHY, 2018.

Ÿ   吴文玲, 认证加密算法研究进展, 密码学报, 2018.

Ÿ   Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin. Direct Construction of Optimal Rotational-XOR Diffusion Primitives. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017.

Ÿ   Zhang Lei, Wu Wenling. Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. IET INFORMATION SECURITY, 2017.

Ÿ   Wang Yanfeng, Wu Wenling. New criterion for diffusion property and applications to improved GFS and EGFN. DESIGNS CODES AND CRYPTOGRAPHY, 2016.

Ÿ   Yao Yuan, Zhang Bin, Wu WenLing. Utilizing Probabilistic Linear Equations in Cube Attacks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2016.

Ÿ   Wang Yanfeng, Wu Wenling. New Observations on Piccolo Block Cipher. CT-RSA 2016.

Ÿ   Gao Si, Chen Hua, Wu Wenling, Fan Limin, Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. CANS 2016. 

Ÿ   Lin Li, Wu Wenling, Zheng Yafei, Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. FSE 2016.

Ÿ   Zhang Huiling, Wu Wenling. Structural Evaluation for Simon-Like Designs Against Integral Attack. ISPEC 2016.

Ÿ   Yu XiaoLi, Wu,WenLing, Shi ZhenQing, Zhang Jian, Zhang Lei, Wang YanFeng. Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015.

Ÿ   Dong Le, Wang Yanling, Wu Wenling, Zou Jian. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. IET INFORMATION SECURITY, 2015.

Ÿ   Soleimany Hadi, Blondeau Celine, Yu Xiaoli, Wu Wenling, Nyberg Kaisa, Zhang Huiling, Zhang Lei, Wang Yanfeng. Reflection Cryptanalysis of PRINCE-Like Ciphers. JOURNAL OF CRYPTOLOGY, 2015.

Ÿ   Zhang Lei, Wu Wenling. Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers. CHINESE JOURNAL OF ELECTRONICS, 2015.

Ÿ   Wu WenLing, Zhang Lei, Yu XiaoLi. The DBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES. 2015, 58(3).

Ÿ   Zhang Huiling, Wu Wenling. Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. INDOCRYPT 2015.

Ÿ   Zhang Lei, Wu Wenling. Differential analysis of the Extended Generalized Feistel Networks. INFORMATION PROCESSING LETTERS. 2014, 114(12).

Ÿ   Dong Le, Wu Wenling, Wu Shuang, Zou Jian. Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. FRONTIERS OF COMPUTER SCIENCE. 2014, 8(3).

Ÿ   Yanfeng Wang, Wenling Wu. Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE. ACNS 2014.

Ÿ   Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu. Differential cryptanalysis and linear distinguisher of full-round Zorro. ACISP 2014.

Ÿ   Wu Shengbao, Wang Mingsheng, Wu Wenling. Recursive diffusion layers for (lightweight) block ciphers and hash functions. SAC 2013.

Ÿ   Wu Shengbao, Wu Hongjun, Huang Tao, Wang Mingsheng, Wu Wenling. Leaked-state-forgery attack against the authenticated encryption algorithm ALE. ASIACRYPT 2013.

Ÿ   Sui Han, Wu Wenling, Zhang Liting, Wang Peng. Attacking and fixing the CS mode. ICICS 2013.

Ÿ   Zhang Liting, Wu Wenling, Wang Peng, Liang Bo. TrCBC: Another look at CBC-MAC. INFORMATION PROCESSING LETTERS. 2012, 112(7).

Ÿ   Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong. LHash: A Lightweight Hash Function. Inscrypt 2013.

Ÿ   Jian Zou, Wenling Wu, Shuang Wu,Cryptanalysis of the Round-Reduced GOST Hash Function. Inscrypt 2013.

Ÿ   Liting Zhang, Wenling Wu, Han Sui, and Peng Wang,3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. ASIACRYPT 2012.

Ÿ   Sasaki Yu, Wang Lei, Wu Shuang, Wu Wenling. Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks.  ASIACRYPT 2012.

Ÿ   Zhang Wentao, Su Bozhan, Wu Wenling, Feng Dengguo, Wu Chuankun. Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. ACNS 2012.

Ÿ   Wang Yanfeng, Wu Wenling, Yu Xiaoli. Biclique cryptanalysis of reduced-round piccolo block cipher. ISPEC 2012

Ÿ   Liting Zhang, Wenling Wu, Peng WangBo Liang: TrCBC: Another look at CBC-MAC. Inf. Process. Lett. 112(7).

Ÿ   Shuang Wu, Dengguo FengWenling WuJian GuoLe DongJian Zou. (Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others.FSE 2012.

Ÿ   Yanjun Li, Wenling Wu, and Lei Zhang. Integral Attacks on Reduced-Round Camellia Block Cipher,WISA 2011.

Ÿ   Xiaoli Yu, Wenling Wu, Yanjun Li and Lei Zhang,Cryptanalysis of Reduced-Round KLEIN Block Cipher,INSCRYPT 2011.

Ÿ   Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su and Le Dong,Preimage Attacks on Step-Reduced SM3 Hash FunctionICISC 2011.

Ÿ   Zhang LiTing, Wu WenLing, Zhang Lei, Wang Peng. CBCR: CBC MAC with rotating transformations. SCIENCE CHINA-INFORMATION SCIENCES. 2011, 54(11).

Ÿ   Su BoZhan, Wu WenLing, Zhang WenTao. Security of the SMS4 Block Cipher Against Differential Cryptanalysis. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2011, 26(1.

Ÿ   Su Bozhan, Wu Wenling, Zhang Lei, Li Yanjun. Full-Round Differential Attack on TWIS Block Cipher. INFORMATION SECURITY APPLICATION. 2011. 

Ÿ   Wenling Wu,Zhang lei. LBlock: A Lightweight Block Cipher, ACNS 2011, LNCS 6715.

Ÿ   Su Bozhan, Wu Wenling, Wu Shuang, Dong Le. Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. CANS 2010.

Ÿ   Zhang Liting, Wu Wenling, Wang Peng, Zhang Lei, Wu Shuang, Liang Bo. Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. FSE 2010.

Ÿ   Wenling Wu, Lei Zhang, Liting Zhang,Wentao Zhang, Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher, ICICS 2009.

Ÿ   Wu Shuang, Feng Dengguo, Wu Wenling. Cryptanalysis of the LANE Hash Function. SAC2009.

Ÿ   Shuang Wu,Dengguo Feng,Wenling Wu.Practical Rebound Attack on 12-round Cheetah-256ICISC 2009.

Ÿ   Lei Zhang,Wenling Wu, Improved Impossible Differential Attack on Large-Block Rijndael, ISC 2008.

Ÿ   Zhang Liting, Wu Wenling, Wang Peng. Extended Models for Message Authentication. ICISC2008.

Ÿ   Lei Zhang,Wentao Zhang,Wenling Wu. Cryptanalysis of Reduced Round SMS4 Block Cipher. ACISP 2008.

Ÿ   Wang Peng, Dengguo Feng, Wenling Wu,Liting Zhang. On the Unprovable Security of 2-Key XCBC. ACISP 2008.

Ÿ   Hua Chen, Wen-ling Wu, Deng-guo Feng, Differential Fault Analysis on CLEFIA, ICICS 2007.

Ÿ   Wu Wenling, Zhang Wentao, Feng Dengguo, Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia, Journal of Computer Science and Technology,2007.

Ÿ   Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng, Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRPT 2007.

Ÿ   Wen-Ling Wu,Pseudorandomness of Camellia-like Scheme, Journal of Computer Science and Technology, 2006.

Ÿ   Wenling Wu, Wentao Zhang , Dongdai Lin,On the Security of Generalized Feistel Scheme with SP Round Function, International Journal network security,2006.

Ÿ   Wu Wenling,Wei Hongru. Pseudorandomness on the Round-Structure of Skipjack, Chinese Journal of Electronics, 2006.

Ÿ   吴文玲,冯登国,分组密码工作模式的研究现状,计算机学报,Vol.29,No.1,pp:21-36.2006.

Ÿ   Hu Honggang, Feng Dengguo, Wu Wenling. Incomplete exponential sums over Galois rings with applications to some binary sequences derived from Z_2, IEEE Trans. Information Theory,2006.

Ÿ   Dayin Wang, Dongdai Lin, and Wenling Wu, An Improved Poly1305 MAC, ACNS 2006.

Ÿ   Wang Peng, Feng Dengguo and Wu Wenling. Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006.

Ÿ   Wentao Zhang, Wenling Wu, Improved Related-key Impossible Differential Attacks on Reduced-Round AES-192, SAC 2006.

Ÿ   Wang Peng, Feng Dengguo and Wu Wenling, HCTR: A Tweakable Enciphering Mode, SKLOIS CSIC 2005 LNCS 3822, p:175-188.

Ÿ   Wu Wenling, Zhang Wentao, Feng Dengguo, Improved Integral Cryptanalysis of FOX Block Cipher, ICISC 2005.

Ÿ   Wu Wenling, Feng Dengguo,Cheng hua, Collision Attack and Pseudorandomness of Reduced-Round Camellia, SAC 2004.

Ÿ   Wen-Ling Wu, Chuan-kun Wu, Cryptanalysis of ZODIAC,Chinese Journal of Electronics,2002.

Ÿ   WU Wenling & FENG Dengguo, Linear cryptanalysis of NUSH block cipher, SCIENCE IN CHINA(Series F), 2002.

Ÿ   Wu Wenling, He Yeping, Feng Dengguo, Qing Sihan. Power analysis of MARS and Rijndeal, 软件学报,2002.

Ÿ   Wu Wenling,Feng Dengguo, Qing Sihan, Power analysis of Serpent and RC6, SEC2000.

Ÿ   Wu Wenling,Feng Dengguo, Qing Sihan. On Decorrelated Fast Cipher. Journal of Chinese Electronics, 2000.

Ÿ   Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing. Cryptanalysis of Some AES Candidate Algorithms. ICICS 1999.


科研活动

   
科研项目
( 1 ) 新型分组密码与Hash函数及其安全性评估, 负责人, 国家任务, 2013-01--2016-12
( 2 ) 分析方法与评估理论, 负责人, 国家任务, 2013-07--2017-08
( 3 ) 自动分析工具, 负责人, 国家任务, 2020-12--2022-12
( 4 ) 认证加密算法的设计与分析, 负责人, 国家任务, 2017-01--2020-12
( 5 ) 分组密码分析方法自动化研究, 负责人, 国家任务, 2017-01--2020-12
( 6 ) 密码算法分析, 负责人, 国家任务, 2016-12--2019-12
( 7 ) 算法设计, 负责人, 国家任务, 2017-01--2020-12
( 8 ) 分组密码算法的安全性分析与评估, 负责人, 国家任务, 2021-01--2024-12
( 9 ) 密码算法检测分析技术与基础平台, 负责人, 国家任务, 2007-08--2009-12
( 10 ) 分析方法和技术, 负责人, 国家任务, 2022-02--2025-02
( 11 ) 分组密码关键技术研究, 负责人, 国家任务, 2004-01--2006-12
( 12 ) 分组密码方案的设计与分析, 负责人, 国家任务, 2009-01--2011-12

指导学生

已指导学生

徐志博  硕士研究生  081203-计算机应用技术  

张蕾  博士研究生  081220-信息安全  

刘继业  博士研究生  081220-信息安全  

张立廷  博士研究生  081220-信息安全  

薛宇  硕士研究生  081220-信息安全  

李艳俊  博士研究生  081220-信息安全  

苏波展  博士研究生  081220-信息安全  

范伟杰  硕士研究生  081220-信息安全  

董乐  博士研究生  081220-信息安全  

邹剑  博士研究生  081220-信息安全  

于晓丽  博士研究生  081220-信息安全  

汪艳凤  博士研究生  081220-信息安全  

眭晗  博士研究生  081220-信息安全  

罗鹏  博士研究生  081220-信息安全  

姚远  博士研究生  081203-计算机应用技术  

郭志远  博士研究生  081203-计算机应用技术  

张建  博士研究生  081203-计算机应用技术  

张惠玲  博士研究生  081203-计算机应用技术  

林立  博士研究生  081203-计算机应用技术  

郑雅菲  博士研究生  081203-计算机应用技术  

郎欢  硕士研究生  081203-计算机应用技术  

李灵琛  博士研究生  081203-计算机应用技术  

高思  博士研究生  081203-计算机应用技术  

张丹夏  硕士研究生  083900-网络空间安全  

张中亚  博士研究生  083900-网络空间安全  

曹伟琼  博士研究生  081203-计算机应用技术  

李晓丹  博士研究生  083900-网络空间安全  

毛永霞  博士研究生  083900-网络空间安全  

张丽  博士研究生  083900-网络空间安全  

韦城皓  硕士研究生  083900-网络空间安全  

现指导学生

王博琳  博士研究生  083900-网络空间安全  

张梦圆  博士研究生  083900-网络空间安全  

张宇  博士研究生  083900-网络空间安全  

宋蝉  博士研究生  083900-网络空间安全  

张语晗  博士研究生  083900-网络空间安全  

段娥娥  博士研究生  083900-网络空间安全  

申城铭  硕士研究生  083500-软件工程  

郑登鹏  硕士研究生  083900-网络空间安全  

申峻旭  博士研究生  083900-网络空间安全  

袁誉飞  博士研究生  083900-网络空间安全  

魏山朋  硕士研究生  083900-网络空间安全