
电子邮件: wenling@iscas.ac.cn
通信地址: 北京8718信箱
邮政编码: 100190
研究领域
教育背景
1987-09--1990-07 西北大学 数学系 硕士
1983-09--1987-07 西北大学 数学系 学士
工作经历
工作简历
2000-01~2003-12,中国科学院软件研究所 , 副研究员
1998-02~1999-12,中国科学院软件研究所, 博士后
1990-07~1998-02,西北大学数学系, 讲师
社会兼职
2022-12-31-今,中国通信学会信息通信及安全数学理论委员会, 委员
2017-12-01-今,中国密码学会组织工作委员会, 主任委员
2016-05-07-今,中国密码学会, 副理事长
2016-03-26-今,密码学报, 副主编
2015-07-01-今,信息安全研究, 编委
2014-08-28-今,中国密码学会, 会士
2014-01-01-今,电子与信息学报, 编委
2014-01-01-今,电子科学学刊(英文版), 编委
2013-11-30-今,密码学报, 领域编委
2011-10-01-今,密码行业标准化技术委员会, 委员
2011-05-28-今,中国密码学会, 常务理事
2009-11-30-2017-11-30,密码算法专业委员会, 主任委员
教授课程
可信计算与信息保障基础理论
密码学前沿
现代密码学
信息安全数学基础
专利与奖励
奖励信息
(2) 分组密码设计与自动分析工具, 二等奖, 部委级, 2018
(3) 中国科学院朱李月华优秀教师奖, , 部委级, 2013
(4) 密码算法设计, 二等奖, 国家级, 2013
(5) 中国科学院软件研究所优秀导师, 研究所(学校), 2012
(6) 中国科学院优秀研究生指导教师奖, , 部委级, 2012
(7) 密码算法评估, 二等奖, 国家级, 2011
(8) 中国科学院软件研究所优秀导师, 研究所(学校), 2010
(9) 密码检测, 一等奖, 部委级, 2006
(10) 密码学基础问题研究, 一等奖, 省级, 2005
出版信息
出版著作
吴文玲,眭晗,张斌, 轻量级密码学, 清华大学出版社, 2022.
吴文玲,冯登国,张文涛, 分组密码的设计与分析(第二版), 清华大学出版社, 2009.
发表论文
Zhang, Z., Wu, W., Sui, H. et al. Post-quantum security on the Lai–Massey scheme. Des. Codes Cryptogr, 2023.
Li Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng. Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. The Computer Journal, 2023,
Yongxia Mao, Wenling Wu, Yafei Zheng and Lei Zhang. Related-Cipher Attacks: Applications to Ballet and ANT. ACISP 2023.
Bolin Wang, Wenling Wu.New key-Independent Structural Properties of AES-like Permutations. IEEE Internet of Things,2022.
ZHANG Zhongya, WU Wenling, SUI Han, and WANG Bolin. Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions.Chinese Institute of Electronics, 2022.
Zhongya Zhang,Wenling Wu,Han Sui,Xiaodan Li, Quantum generic attacks on key-alternating Feistel ciphers for shorter keys. Quantum Information Processing, 2022.
Wengang Jin and Xiaoni Du,Wenling Wu,Zhixiong Chen,GENERIC CONSTRUCTION OF BOOLEAN FUNCTIONS WITH A FEW WALSH TRANSFORM VALUES OF ANY POSSIBLE ALGEBRAIC DEGREE. Advances in Mathematics of Communications,2022.
Yuhan Zhang ,Wenling Wu ,Lei Zhang. Improved Differential Attack in LEA. ACISP 2022.
Yongxia Mao ,Wenling Wu ,Bolin Wang ,Li Zhang. Improved Division Property for Ciphers with Complex Linear Layer. ACISP 2022.
Li Zhang, Wenling Wu, Yafei Zheng and Bolin Wang. Cryptanalysis on Reduced Round 3D and Saturnin. The Computer Journal, 2022
Shi Tairong, Wu Wenling, Hu Bin, Guan Jie, Wang Sengpeng. Breaking LWC candidates: sESTATE and Elephant in quantum setting. DESIGNS CODES AND CRYPTOGRAPHY, 2021.
Zhang Z, Wu W, Wang B. Quantum Differential Collision Distinguishing Attacks on Feistel Schemes. Chinese Journal of Electronics, 2021.
Xiaodan Li,Wenling Wu. Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. ACISP 2021.
Zou, J. , Wei, Z. , Sun, S. , Liu, X. , & Wu, W. Quantum Circuit Implementations of AES with Fewer Qubits. ASIACRYPT 2020.
Wang Bolin, Chan Song, Wenling Wu, and Lei Zhang,A New Non-random Property of 4.5-Round PRINCE. ICISC 2020.
吴文玲, 张蕾, 郑雅菲, 李灵琛. 分组密码uBlock. 密码学报. 2019.
Li LingChen, Wu WenLing, Zhang Lei, Zheng YaFei. New method to describe the differential distribution table for large S-boxes in MILP and its application. IET INFORMATION SECURITY, 2019.
Zheng Yafei, Wu Wenling. Security of Khudra Against Meet-in-the-Middle-Type Cryptanalysis. CHINESE JOURNAL OF ELECTRONICS, 2019.
Zheng Yafei, Wu Wenling. On the extension and security of key schedule of GOST. IET INFORMATION SECURITY, 2019.
Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic. Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. IACR Transactions on Symmetric Cryptology, 2018.
Zou Jian, Dong Le, Wu Wenling. New algorithms for the unbalanced generalised birthday problem. IET INFORMATION SECURITY, 2018.
Lin, Li, Wu, Wenling. Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. DESIGNS CODES AND CRYPTOGRAPHY, 2018.
吴文玲, 认证加密算法研究进展, 密码学报, 2018.
Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin. Direct Construction of Optimal Rotational-XOR Diffusion Primitives. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017.
Zhang Lei, Wu Wenling. Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. IET INFORMATION SECURITY, 2017.
Wang Yanfeng, Wu Wenling. New criterion for diffusion property and applications to improved GFS and EGFN. DESIGNS CODES AND CRYPTOGRAPHY, 2016.
Yao Yuan, Zhang Bin, Wu WenLing. Utilizing Probabilistic Linear Equations in Cube Attacks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2016.
Wang Yanfeng, Wu Wenling. New Observations on Piccolo Block Cipher. CT-RSA 2016.
Gao Si, Chen Hua, Wu Wenling, Fan Limin, Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. CANS 2016.
Lin Li, Wu Wenling, Zheng Yafei, Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. FSE 2016.
Zhang Huiling, Wu Wenling. Structural Evaluation for Simon-Like Designs Against Integral Attack. ISPEC 2016.
Yu XiaoLi, Wu,WenLing, Shi ZhenQing, Zhang Jian, Zhang Lei, Wang YanFeng. Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015.
Dong Le, Wang Yanling, Wu Wenling, Zou Jian. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. IET INFORMATION SECURITY, 2015.
Soleimany Hadi, Blondeau Celine, Yu Xiaoli, Wu Wenling, Nyberg Kaisa, Zhang Huiling, Zhang Lei, Wang Yanfeng. Reflection Cryptanalysis of PRINCE-Like Ciphers. JOURNAL OF CRYPTOLOGY, 2015.
Zhang Lei, Wu Wenling. Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers. CHINESE JOURNAL OF ELECTRONICS, 2015.
Wu WenLing, Zhang Lei, Yu XiaoLi. The DBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES. 2015, 58(3).
Zhang Huiling, Wu Wenling. Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. INDOCRYPT 2015.
Zhang Lei, Wu Wenling. Differential analysis of the Extended Generalized Feistel Networks. INFORMATION PROCESSING LETTERS. 2014, 114(12).
Dong Le, Wu Wenling, Wu Shuang, Zou Jian. Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. FRONTIERS OF COMPUTER SCIENCE. 2014, 8(3).
Yanfeng Wang, Wenling Wu. Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE. ACNS 2014.
Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu. Differential cryptanalysis and linear distinguisher of full-round Zorro. ACISP 2014.
Wu Shengbao, Wang Mingsheng, Wu Wenling. Recursive diffusion layers for (lightweight) block ciphers and hash functions. SAC 2013.
Wu Shengbao, Wu Hongjun, Huang Tao, Wang Mingsheng, Wu Wenling. Leaked-state-forgery attack against the authenticated encryption algorithm ALE. ASIACRYPT 2013.
Sui Han, Wu Wenling, Zhang Liting, Wang Peng. Attacking and fixing the CS mode. ICICS 2013.
Zhang Liting, Wu Wenling, Wang Peng, Liang Bo. TrCBC: Another look at CBC-MAC. INFORMATION PROCESSING LETTERS. 2012, 112(7).
Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong. LHash: A Lightweight Hash Function. Inscrypt 2013.
Jian Zou, Wenling Wu, Shuang Wu,Cryptanalysis of the Round-Reduced GOST Hash Function. Inscrypt 2013.
Liting Zhang, Wenling Wu, Han Sui, and Peng Wang,3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. ASIACRYPT 2012.
Sasaki Yu, Wang Lei, Wu Shuang, Wu Wenling. Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. ASIACRYPT 2012.
Zhang Wentao, Su Bozhan, Wu Wenling, Feng Dengguo, Wu Chuankun. Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. ACNS 2012.
Wang Yanfeng, Wu Wenling, Yu Xiaoli. Biclique cryptanalysis of reduced-round piccolo block cipher. ISPEC 2012.
Liting Zhang, Wenling Wu, Peng Wang, Bo Liang: TrCBC: Another look at CBC-MAC. Inf. Process. Lett. 112(7).
Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou. (Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others.FSE 2012.
Yanjun Li, Wenling Wu, and Lei Zhang. Integral Attacks on Reduced-Round Camellia Block Cipher,WISA 2011.
Xiaoli Yu, Wenling Wu, Yanjun Li and Lei Zhang,Cryptanalysis of Reduced-Round KLEIN Block Cipher,INSCRYPT 2011.
Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su and Le Dong,Preimage Attacks on Step-Reduced SM3 Hash Function,ICISC 2011.
Zhang LiTing, Wu WenLing, Zhang Lei, Wang Peng. CBCR: CBC MAC with rotating transformations. SCIENCE CHINA-INFORMATION SCIENCES. 2011, 54(11).
Su BoZhan, Wu WenLing, Zhang WenTao. Security of the SMS4 Block Cipher Against Differential Cryptanalysis. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2011, 26(1.
Su Bozhan, Wu Wenling, Zhang Lei, Li Yanjun. Full-Round Differential Attack on TWIS Block Cipher. INFORMATION SECURITY APPLICATION. 2011.
Wenling Wu,Zhang lei. LBlock: A Lightweight Block Cipher, ACNS 2011, LNCS 6715.
Su Bozhan, Wu Wenling, Wu Shuang, Dong Le. Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. CANS 2010.
Zhang Liting, Wu Wenling, Wang Peng, Zhang Lei, Wu Shuang, Liang Bo. Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. FSE 2010.
Wenling Wu, Lei Zhang, Liting Zhang,Wentao Zhang, Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher, ICICS 2009.
Wu Shuang, Feng Dengguo, Wu Wenling. Cryptanalysis of the LANE Hash Function. SAC2009.
Shuang Wu,Dengguo Feng,Wenling Wu.Practical Rebound Attack on 12-round Cheetah-256,ICISC 2009.
Lei Zhang,Wenling Wu, Improved Impossible Differential Attack on Large-Block Rijndael, ISC 2008.
Zhang Liting, Wu Wenling, Wang Peng. Extended Models for Message Authentication. ICISC2008.
Lei Zhang,Wentao Zhang,Wenling Wu. Cryptanalysis of Reduced Round SMS4 Block Cipher. ACISP 2008.
Wang Peng, Dengguo Feng, Wenling Wu,Liting Zhang. On the Unprovable Security of 2-Key XCBC. ACISP 2008.
Hua Chen, Wen-ling Wu, Deng-guo Feng, Differential Fault Analysis on CLEFIA, ICICS 2007.
Wu Wenling, Zhang Wentao, Feng Dengguo, Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia, Journal of Computer Science and Technology,2007.
Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng, Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRPT 2007.
Wen-Ling Wu,Pseudorandomness of Camellia-like Scheme, Journal of Computer Science and Technology, 2006.
Wenling Wu, Wentao Zhang , Dongdai Lin,On the Security of Generalized Feistel Scheme with SP Round Function, International Journal network security,2006.
Wu Wenling,Wei Hongru. Pseudorandomness on the Round-Structure of Skipjack, Chinese Journal of Electronics, 2006.
吴文玲,冯登国,分组密码工作模式的研究现状,计算机学报,Vol.29,No.1,pp:21-36.2006.
Hu Honggang, Feng Dengguo, Wu Wenling. Incomplete exponential sums over Galois rings with applications to some binary sequences derived from Z_2, IEEE Trans. Information Theory,2006.
Dayin Wang, Dongdai Lin, and Wenling Wu, An Improved Poly1305 MAC, ACNS 2006.
Wang Peng, Feng Dengguo and Wu Wenling. Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006.
Wentao Zhang, Wenling Wu, Improved Related-key Impossible Differential Attacks on Reduced-Round AES-192, SAC 2006.
Wang Peng, Feng Dengguo and Wu Wenling, HCTR: A Tweakable Enciphering Mode, SKLOIS CSIC 2005 LNCS 3822, p:175-188.
Wu Wenling, Zhang Wentao, Feng Dengguo, Improved Integral Cryptanalysis of FOX Block Cipher, ICISC 2005.
Wu Wenling, Feng Dengguo,Cheng hua, Collision Attack and Pseudorandomness of Reduced-Round Camellia, SAC 2004.
Wen-Ling Wu, Chuan-kun Wu, Cryptanalysis of ZODIAC,Chinese Journal of Electronics,2002.
WU Wenling & FENG Dengguo, Linear cryptanalysis of NUSH block cipher, SCIENCE IN CHINA(Series F), 2002.
Wu Wenling, He Yeping, Feng Dengguo, Qing Sihan. Power analysis of MARS and Rijndeal, 软件学报,2002.
Wu Wenling,Feng Dengguo, Qing Sihan, Power analysis of Serpent and RC6, SEC2000.
Wu Wenling,Feng Dengguo, Qing Sihan. On Decorrelated Fast Cipher. Journal of Chinese Electronics, 2000.
Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing. Cryptanalysis of Some AES Candidate Algorithms. ICICS 1999.
科研活动
科研项目
( 2 ) 分析方法与评估理论, 负责人, 国家任务, 2013-07--2017-08
( 3 ) 自动分析工具, 负责人, 国家任务, 2020-12--2022-12
( 4 ) 认证加密算法的设计与分析, 负责人, 国家任务, 2017-01--2020-12
( 5 ) 分组密码分析方法自动化研究, 负责人, 国家任务, 2017-01--2020-12
( 6 ) 密码算法分析, 负责人, 国家任务, 2016-12--2019-12
( 7 ) 算法设计, 负责人, 国家任务, 2017-01--2020-12
( 8 ) 分组密码算法的安全性分析与评估, 负责人, 国家任务, 2021-01--2024-12
( 9 ) 密码算法检测分析技术与基础平台, 负责人, 国家任务, 2007-08--2009-12
( 10 ) 分析方法和技术, 负责人, 国家任务, 2022-02--2025-02
( 11 ) 分组密码关键技术研究, 负责人, 国家任务, 2004-01--2006-12
( 12 ) 分组密码方案的设计与分析, 负责人, 国家任务, 2009-01--2011-12
指导学生
已指导学生
徐志博 硕士研究生 081203-计算机应用技术
张蕾 博士研究生 081220-信息安全
刘继业 博士研究生 081220-信息安全
张立廷 博士研究生 081220-信息安全
薛宇 硕士研究生 081220-信息安全
李艳俊 博士研究生 081220-信息安全
苏波展 博士研究生 081220-信息安全
范伟杰 硕士研究生 081220-信息安全
董乐 博士研究生 081220-信息安全
邹剑 博士研究生 081220-信息安全
于晓丽 博士研究生 081220-信息安全
汪艳凤 博士研究生 081220-信息安全
眭晗 博士研究生 081220-信息安全
罗鹏 博士研究生 081220-信息安全
姚远 博士研究生 081203-计算机应用技术
郭志远 博士研究生 081203-计算机应用技术
张建 博士研究生 081203-计算机应用技术
张惠玲 博士研究生 081203-计算机应用技术
林立 博士研究生 081203-计算机应用技术
郑雅菲 博士研究生 081203-计算机应用技术
郎欢 硕士研究生 081203-计算机应用技术
李灵琛 博士研究生 081203-计算机应用技术
高思 博士研究生 081203-计算机应用技术
张丹夏 硕士研究生 083900-网络空间安全
张中亚 博士研究生 083900-网络空间安全
曹伟琼 博士研究生 081203-计算机应用技术
李晓丹 博士研究生 083900-网络空间安全
毛永霞 博士研究生 083900-网络空间安全
张丽 博士研究生 083900-网络空间安全
韦城皓 硕士研究生 083900-网络空间安全
现指导学生
王博琳 博士研究生 083900-网络空间安全
张梦圆 博士研究生 083900-网络空间安全
张宇 博士研究生 083900-网络空间安全
宋蝉 博士研究生 083900-网络空间安全
张语晗 博士研究生 083900-网络空间安全
段娥娥 博士研究生 083900-网络空间安全
申城铭 硕士研究生 083500-软件工程
郑登鹏 硕士研究生 083900-网络空间安全
申峻旭 博士研究生 083900-网络空间安全
袁誉飞 博士研究生 083900-网络空间安全
魏山朋 硕士研究生 083900-网络空间安全