
电子邮件: wenling@iscas.ac.cn
通信地址: 北京8718信箱
邮政编码: 100190
研究领域
教育背景
工作经历
工作简历
社会兼职
2016-05-07-今,中国密码学会, 副理事长
2016-03-26-今,密码学报, 副主编
2015-07-01-今,信息安全研究, 编委
2014-08-28-今,中国密码学会, 会士
2014-01-01-今,电子与信息学报, 编委
2014-01-01-今,电子科学学刊(英文版), 编委
2013-11-30-今,密码学报, 领域编委
2011-10-01-今,密码行业标准化技术委员会, 委员
2011-05-28-今,中国密码学会, 常务理事
2009-11-30-2017-11-30,密码算法专业委员会, 主任委员
教授课程
专利与奖励
奖励信息
出版信息
出版著作
· 吴文玲,眭晗,张斌, 轻量级密码学, 清华大学出版社, 2022。
· 吴文玲,冯登国,张文涛, 分组密码的设计与分析(第二版), 清华大学出版社, 2009。
发表论文
· Shi Tairong, Wu Wenling, Hu Bin, Guan Jie, Wang Sengpeng. Breaking LWC candidates: sESTATE and Elephant in quantum setting. DESIGNS CODES AND CRYPTOGRAPHY, 2021.
· Zhang Z, Wu W, Wang B. Quantum Differential Collision Distinguishing Attacks on Feistel Schemes. Chinese Journal of Electronics, 2021.
· Xiaodan Li,Wenling Wu. Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. ACISP 2021.
· Zou, J. , Wei, Z. , Sun, S. , Liu, X. , & Wu, W. Quantum Circuit Implementations of AES with Fewer Qubits. ASIACRYPT 2020.
· Wang Bolin, Chan Song, Wenling Wu, and Lei Zhang,A New Non-random Property of 4.5-Round PRINCE,ICISC2020.
· 眭晗, 吴文玲. 后量子对称密码的研究现状与发展趋势. 电子与信息学报. 2020.
· 吴文玲, 张蕾, 郑雅菲, 李灵琛. 分组密码uBlock. 密码学报. 2019.
· Li LingChen, Wu WenLing, Zhang Lei, Zheng YaFei. New method to describe the differential distribution table for large S-boxes in MILP and its application. IET INFORMATION SECURITY, 2019.
· Zheng Yafei, Wu Wenling. Security of Khudra Against Meet-in-the-Middle-Type Cryptanalysis. CHINESE JOURNAL OF ELECTRONICS. 2019.
· Zheng Yafei, Wu Wenling. On the extension and security of key schedule of GOST. IET INFORMATION SECURITY[J]. 2019, 13(2): 125-132.
· Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic. Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. IACR Transactions on Symmetric Cryptology. 2018.
· Zou Jian, Dong Le, Wu Wenling. New algorithms for the unbalanced generalised birthday problem. IET INFORMATION SECURITY. 2018, 12(6): 527-533.
· Lin, Li, Wu, Wenling. Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. DESIGNS CODES AND CRYPTOGRAPHY, 2018.
· 吴文玲, 认证加密算法研究进展, 密码学报. 2018, 5(1): 70-82.
· Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin. Direct Construction of Optimal Rotational-XOR Diffusion Primitives. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY. 2017, 169-187.
· Zhang Lei, Wu Wenling. Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. IET INFORMATION SECURITY. 2017, 11(3): 121-130.
· Wang Yanfeng, Wu Wenling. New criterion for diffusion property and applications to improved GFS and EGFN. DESIGNS CODES AND CRYPTOGRAPHY. 2016, 81(3): 393-412.
· Yao Yuan, Zhang Bin, Wu WenLing. Utilizing Probabilistic Linear Equations in Cube Attacks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2016, 31(2): 317-325.
· Wang Yanfeng, Wu Wenling. New Observations on Piccolo Block Cipher. CT-RSA 2016.
· Gao Si, Chen Hua, Wu Wenling, Fan Limin, Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. CANS 2016.
· Lin Li, Wu Wenling, Zheng Yafei, Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. FSE 2016.
· Zhang Huiling, Wu Wenling. Structural Evaluation for Simon-Like Designs Against Integral Attack. ISPEC 2016.
· Yu XiaoLi, Wu,WenLing, Shi ZhenQing, Zhang Jian, Zhang Lei, Wang YanFeng. Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2015, 30(6): 1358-1369.
· Dong Le, Wang Yanling, Wu Wenling, Zou Jian. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. IET INFORMATION SECURITY. 2015, 9(5): 277-283.
· Soleimany Hadi, Blondeau Celine, Yu Xiaoli, Wu Wenling, Nyberg Kaisa, Zhang Huiling, Zhang Lei, Wang Yanfeng. Reflection Cryptanalysis of PRINCE-Like Ciphers. JOURNAL OF CRYPTOLOGY. 2015, 28(3): 718-744.
· Zhang Lei, Wu Wenling. Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers. CHINESE JOURNAL OF ELECTRONICS. 2015, 24(2): 343-348.
· Wu WenLing, Zhang Lei, Yu XiaoLi. The DBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES. 2015, 58(3).
· Zhang Huiling, Wu Wenling. Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. INDOCRYPT 2015.
· Zhang Lei, Wu Wenling. Differential analysis of the Extended Generalized Feistel Networks. INFORMATION PROCESSING LETTERS. 2014, 114(12).
· Dong Le, Wu Wenling, Wu Shuang, Zou Jian. Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. FRONTIERS OF COMPUTER SCIENCE. 2014, 8(3): 513-525.
· Yanfeng Wang, Wenling Wu. Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE. ACNS 2014.
· Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu. Differential cryptanalysis and linear distinguisher of full-round Zorro. ACISP 2014.
· Wu Shengbao, Wang Mingsheng, Wu Wenling. Recursive diffusion layers for (lightweight) block ciphers and hash functions. SAC 2013.
· Wu Shengbao, Wu Hongjun, Huang Tao, Wang Mingsheng, Wu Wenling. Leaked-state-forgery attack against the authenticated encryption algorithm ALE. ASIACRYPT 2013.
· Sui Han, Wu Wenling, Zhang Liting, Wang Peng. Attacking and fixing the CS mode. ICICS 2013.
· Zhang Liting, Wu Wenling, Wang Peng, Liang Bo. TrCBC: Another look at CBC-MAC. INFORMATION PROCESSING LETTERS. 2012, 112(7): 302-07.
· Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong. LHash: A Lightweight Hash Function. Inscrypt 2013.
· Jian Zou, Wenling Wu, Shuang Wu,Cryptanalysis of the Round-Reduced GOST Hash Function. Inscrypt 2013.
· Liting Zhang, Wenling Wu, Han Sui, and Peng Wang,3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. ASIACRYPT 2012.
· Sasaki Yu, Wang Lei, Wu Shuang, Wu Wenling. Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. ASIACRYPT 2012.
· Zhang Wentao, Su Bozhan, Wu Wenling, Feng Dengguo, Wu Chuankun. Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. ACNS 2012.
· Wang Yanfeng, Wu Wenling, Yu Xiaoli. Biclique cryptanalysis of reduced-round piccolo block cipher. ISPEC 2012.
· Liting Zhang, Wenling Wu, Peng Wang, Bo Liang: TrCBC: Another look at CBC-MAC. Inf. Process. Lett. 112(7): 302-307.
· Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou. (Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others.FSE 2012.
· Yanjun Li, Wenling Wu, and Lei Zhang. Integral Attacks on Reduced-Round Camellia Block Cipher,WISA 2011.
· Xiaoli Yu, Wenling Wu, Yanjun Li and Lei Zhang,Cryptanalysis of Reduced-Round KLEIN Block Cipher,INSCRYPT 2011.
· Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su and Le Dong,Preimage Attacks on Step-Reduced SM3 Hash Function,ICISC 2011.
· Zhang LiTing, Wu WenLing, Zhang Lei, Wang Peng. CBCR: CBC MAC with rotating transformations. SCIENCE CHINA-INFORMATION SCIENCES. 2011, 54(11): 2247-2255.
· Su BoZhan, Wu WenLing, Zhang WenTao. Security of the SMS4 Block Cipher Against Differential Cryptanalysis. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2011, 26(1): 130-138.
· Su Bozhan, Wu Wenling, Zhang Lei, Li Yanjun. Full-Round Differential Attack on TWIS Block Cipher. INFORMATION SECURITY APPLICATION. 2011, 6513: 234-242,
· Wenling Wu,Zhang lei. LBlock: A Lightweight Block Cipher, ACNS 2011, LNCS 6715,pp:327-344.
· Su Bozhan, Wu Wenling, Wu Shuang, Dong Le. Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. CANS 2010.
· Zhang Liting, Wu Wenling, Wang Peng, Zhang Lei, Wu Shuang, Liang Bo. Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. FSE 2010.
· Wenling Wu, Lei Zhang, Liting Zhang,Wentao Zhang, Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher, ICICS 2009.
· Wu Shuang, Feng Dengguo, Wu Wenling. Cryptanalysis of the LANE Hash Function. SAC2009.
· Shuang Wu,Dengguo Feng,Wenling Wu.Practical Rebound Attack on 12-round Cheetah-256,ICISC 2009.
· Lei Zhang,Wenling Wu, Improved Impossible Differential Attack on Large-Block Rijndael, ISC 2008.
· Zhang Liting, Wu Wenling, Wang Peng. Extended Models for Message Authentication. ICISC2008.
· Lei Zhang,Wentao Zhang,Wenling Wu. Cryptanalysis of Reduced Round SMS4 Block Cipher. ACISP 2008.
· Wang Peng, Dengguo Feng, Wenling Wu,Liting Zhang. On the Unprovable Security of 2-Key XCBC. ACISP 2008.
· Hua Chen, Wen-ling Wu, Deng-guo Feng, Differential Fault Analysis on CLEFIA, ICICS 2007.
· Wu Wenling, Zhang Wentao, Feng Dengguo, Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia, Journal of Computer Science and Technology,2007.
· Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng, Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRPT 2007.
· Wen-Ling Wu,Pseudorandomness of Camellia-like Scheme, Journal of Computer Science and Technology, 2006.
· Wenling Wu, Wentao Zhang , Dongdai Lin,On the Security of Generalized Feistel Scheme with SP Round Function, International Journal network security,2006.
· Wu Wenling,Wei Hongru. Pseudorandomness on the Round-Structure of Skipjack, Chinese Journal of Electronics, 2006.
· 吴文玲,冯登国,分组密码工作模式的研究现状,计算机学报,Vol.29,No.1,pp:21-36.2006.
· Hu Honggang, Feng Dengguo, Wu Wenling. Incomplete exponential sums over Galois rings with applications to some binary sequences derived from Z_2, IEEE Trans. Information Theory,2006.
· Dayin Wang, Dongdai Lin, and Wenling Wu, An Improved Poly1305 MAC, ACNS 2006.
· Wang Peng, Feng Dengguo and Wu Wenling. Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006.
· Wentao Zhang, Wenling Wu, Improved Related-key Impossible Differential Attacks on Reduced-Round AES-192, SAC 2006.
· Wang Peng, Feng Dengguo and Wu Wenling, HCTR: A Tweakable Enciphering Mode, SKLOIS CSIC 2005 LNCS 3822, p:175-188.
· Wu Wenling, Zhang Wentao, Feng Dengguo, Improved Integral Cryptanalysis of FOX Block Cipher, ICISC 2005.
· Wu Wenling, Feng Dengguo,Cheng hua, Collision Attack and Pseudorandomness of Reduced-Round Camellia, SAC 2004.
· Wen-Ling Wu, Chuan-kun Wu, Cryptanalysis of ZODIAC,Chinese Journal of Electronics,2002.
· WU Wenling & FENG Dengguo, Linear cryptanalysis of NUSH block cipher, SCIENCE IN CHINA(Series F), 2002.
· Wu Wenling, He Yeping, Feng Dengguo, Qing Sihan, Power analysis of MARS and Rijndeal, 软件学报,Vol.13,No.4,pp:532-536,2002
· Wu Wenling,Feng Dengguo, Qing Sihan, Power analysis of Serpent and RC6, SEC2000.
· Wu Wenling,Feng Dengguo, Qing Sihan ,On Decorrelated Fast Cipher,Journal of Chinese Electronics, 2000.
· Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing,Cryptanalysis of Some AES Candidate Algorithms, ICICS1999.
科研活动
科研项目
指导学生
已指导学生
徐志博 硕士研究生 081203-计算机应用技术
张蕾 博士研究生 081220-信息安全
刘继业 博士研究生 081220-信息安全
张立廷 博士研究生 081220-信息安全
薛宇 硕士研究生 081220-信息安全
李艳俊 博士研究生 081220-信息安全
苏波展 博士研究生 081220-信息安全
范伟杰 硕士研究生 081220-信息安全
董乐 博士研究生 081220-信息安全
邹剑 博士研究生 081220-信息安全
于晓丽 博士研究生 081220-信息安全
汪艳凤 博士研究生 081220-信息安全
眭晗 博士研究生 081220-信息安全
罗鹏 博士研究生 081220-信息安全
姚远 博士研究生 081203-计算机应用技术
郭志远 博士研究生 081203-计算机应用技术
张建 博士研究生 081203-计算机应用技术
张惠玲 博士研究生 081203-计算机应用技术
林立 博士研究生 081203-计算机应用技术
郑雅菲 博士研究生 081203-计算机应用技术
郎欢 硕士研究生 081203-计算机应用技术
李灵琛 博士研究生 081203-计算机应用技术
高思 博士研究生 081203-计算机应用技术
张丹夏 硕士研究生 083900-网络空间安全
张中亚 博士研究生 083900-网络空间安全
曹伟琼 博士研究生 081203-计算机应用技术
现指导学生
王博琳 博士研究生 083900-网络空间安全
李晓丹 博士研究生 083900-网络空间安全
毛永霞 博士研究生 083900-网络空间安全
张梦圆 博士研究生 083900-网络空间安全
张丽 博士研究生 083900-网络空间安全
张宇 博士研究生 083900-网络空间安全
韦城皓 硕士研究生 083900-网络空间安全
宋蝉 博士研究生 083900-网络空间安全
张语晗 博士研究生 083900-网络空间安全
袁誉飞 硕士研究生 083900-网络空间安全