基本信息
吴文玲  女  博导  中国科学院软件研究所
电子邮件: wenling@iscas.ac.cn
通信地址: 北京8718信箱
邮政编码: 100190

研究领域

信息安全、密码学 

教育背景

1994-09--1997-09   西安电子科技大学   博士
1987-09--1990-07   西北大学 数学系   硕士
1983-09--1987-07   西北大学 数学系   学士

工作经历

   
工作简历
2004-01~现在, 中国科学院软件研究所, 研究员
2000-01~2003-12,中国科学院软件研究所 , 副研究员
1998-02~1999-12,中国科学院软件研究所, 博士后
1990-07~1998-02,西北大学数学系, 讲师
社会兼职
2017-12-01-今,中国密码学会组织工作委员会, 主任委员
2016-05-07-今,中国密码学会, 副理事长
2016-03-26-今,密码学报, 副主编
2015-07-01-今,信息安全研究, 编委
2014-08-28-今,中国密码学会, 会士
2014-01-01-今,电子与信息学报, 编委
2014-01-01-今,电子科学学刊(英文版), 编委
2013-11-30-今,密码学报, 领域编委
2011-10-01-今,密码行业标准化技术委员会, 委员
2011-05-28-今,中国密码学会, 常务理事
2009-11-30-2017-11-30,密码算法专业委员会, 主任委员

教授课程

密码学和安全协议
可信计算与信息保障基础理论
密码学前沿
现代密码学
信息安全数学基础

专利与奖励

   
奖励信息
(1) uBlock分组密码算法, 一等奖, 其他, 2020
(2) 分组密码设计与自动分析工具, 二等奖, 部委级, 2018
(3) 中国科学院朱李月华优秀教师奖, , 院级, 2013
(4) 密码算法设计, 二等奖, 国家级, 2013
(5) 中国科学院优秀研究生指导教师奖, , 院级, 2011
(6) 密码算法评估, 二等奖, 国家级, 2011
(7) 密码检测, 一等奖, 部委级, 2006
(8) 密码学基础问题研究, 一等奖, 省级, 2005

出版信息

出版著作

·         吴文玲,冯登国,张文涛, 分组密码的设计与分析(第二版), 清华大学出版社, 2009

 

发表论文

·         Shi Tairong, Wu Wenling, Hu Bin, Guan Jie, Wang Sengpeng. Breaking LWC candidates: sESTATE and Elephant in quantum setting. DESIGNS CODES AND CRYPTOGRAPHY, 2021.

·         Zhang Z, Wu W, Wang B. Quantum Differential Collision Distinguishing Attacks on Feistel Schemes. Chinese Journal of Electronics, 2021.

·         Xiaodan LiWenling Wu.  Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. ACISP 2021.

·         Zou, J. , Wei, Z. , Sun, S. , Liu, X. , & Wu, W. Quantum Circuit Implementations of AES with Fewer Qubits. ASIACRYPT 2020.

·         Wang Bolin, Chan Song, Wenling Wu, and Lei Zhang,A New Non-random Property of 4.5-Round PRINCE,ICISC2020.

·         眭晗吴文玲后量子对称密码的研究现状与发展趋势电子与信息学报. 2020.

·         吴文玲张蕾郑雅菲李灵琛分组密码uBlock. 密码学报. 2019.

·         Li LingChen, Wu WenLing, Zhang Lei, Zheng YaFei. New method to describe the differential distribution table for large S-boxes in MILP and its application. IET INFORMATION SECURITY, 2019.

·         Zheng Yafei, Wu Wenling. Security of Khudra Against Meet-in-the-Middle-Type Cryptanalysis. CHINESE JOURNAL OF ELECTRONICS. 2019.

·         Zheng Yafei, Wu Wenling. On the extension and security of key schedule of GOST. IET INFORMATION SECURITY[J]. 2019, 13(2): 125-132.

·         Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic. Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. IACR Transactions on Symmetric Cryptology. 2018.

·         Zou Jian, Dong Le, Wu Wenling. New algorithms for the unbalanced generalised birthday problem. IET INFORMATION SECURITY. 2018, 12(6): 527-533.

·         Lin, Li, Wu, Wenling. Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. DESIGNS CODES AND CRYPTOGRAPHY, 2018.

·         吴文玲, 认证加密算法研究进展, 密码学报. 2018, 5(1): 70-82.

·         Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin. Direct Construction of Optimal Rotational-XOR Diffusion Primitives. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY. 2017, 169-187.

·         Zhang Lei, Wu Wenling. Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. IET INFORMATION SECURITY. 2017, 11(3): 121-130.

·         Wang Yanfeng, Wu Wenling. New criterion for diffusion property and applications to improved GFS and EGFN. DESIGNS CODES AND CRYPTOGRAPHY. 2016, 81(3): 393-412.

·         Yao Yuan, Zhang Bin, Wu WenLing. Utilizing Probabilistic Linear Equations in Cube Attacks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2016, 31(2): 317-325.

·         Wang Yanfeng, Wu Wenling. New Observations on Piccolo Block Cipher. CT-RSA 2016.

·         Gao Si, Chen Hua, Wu Wenling, Fan Limin, Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. CANS 2016. 

·         Lin Li, Wu Wenling, Zheng Yafei, Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. FSE 2016.

·         Zhang Huiling, Wu Wenling. Structural Evaluation for Simon-Like Designs Against Integral Attack. ISPEC 2016.

·         Yu XiaoLi, Wu,WenLing, Shi ZhenQing, Zhang Jian, Zhang Lei, Wang YanFeng. Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2015, 30(6): 1358-1369.

·         Dong Le, Wang Yanling, Wu Wenling, Zou Jian. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. IET INFORMATION SECURITY. 2015, 9(5): 277-283.

·         Soleimany Hadi, Blondeau Celine, Yu Xiaoli, Wu Wenling, Nyberg Kaisa, Zhang Huiling, Zhang Lei, Wang Yanfeng. Reflection Cryptanalysis of PRINCE-Like Ciphers. JOURNAL OF CRYPTOLOGY. 2015, 28(3): 718-744.

·         Zhang Lei, Wu Wenling. Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers. CHINESE JOURNAL OF ELECTRONICS. 2015, 24(2): 343-348.

·         Wu WenLing, Zhang Lei, Yu XiaoLi. The DBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES. 2015, 58(3).

·         Zhang Huiling, Wu Wenling. Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. INDOCRYPT 2015.

·         Zhang Lei, Wu Wenling. Differential analysis of the Extended Generalized Feistel Networks. INFORMATION PROCESSING LETTERS. 2014, 114(12).

·         Dong Le, Wu Wenling, Wu Shuang, Zou Jian. Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. FRONTIERS OF COMPUTER SCIENCE. 2014, 8(3): 513-525.

·          Yanfeng Wang, Wenling Wu. Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE. ACNS 2014.

·          Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu. Differential cryptanalysis and linear distinguisher of full-round Zorro. ACISP 2014.

·          Wu Shengbao, Wang Mingsheng, Wu Wenling. Recursive diffusion layers for (lightweight) block ciphers and hash functions. SAC 2013.

·          Wu Shengbao, Wu Hongjun, Huang Tao, Wang Mingsheng, Wu Wenling. Leaked-state-forgery attack against the authenticated encryption algorithm ALE. ASIACRYPT 2013.

·         Sui Han, Wu Wenling, Zhang Liting, Wang Peng. Attacking and fixing the CS mode. ICICS 2013.

·         Zhang Liting, Wu Wenling, Wang Peng, Liang Bo. TrCBC: Another look at CBC-MAC. INFORMATION PROCESSING LETTERS. 2012, 112(7): 302-07.

·         Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong. LHash: A Lightweight Hash Function. Inscrypt 2013.

·         Jian Zou, Wenling Wu, Shuang Wu,Cryptanalysis of the Round-Reduced GOST Hash Function. Inscrypt 2013.

·         Liting Zhang, Wenling Wu, Han Sui, and Peng Wang,3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. ASIACRYPT 2012.

·         Sasaki Yu, Wang Lei, Wu Shuang, Wu Wenling. Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks.  ASIACRYPT 2012.

·         Zhang Wentao, Su Bozhan, Wu Wenling, Feng Dengguo, Wu Chuankun. Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. ACNS 2012.

·         Wang Yanfeng, Wu Wenling, Yu Xiaoli. Biclique cryptanalysis of reduced-round piccolo block cipher. ISPEC 2012

·         Liting Zhang, Wenling Wu, Peng WangBo Liang: TrCBC: Another look at CBC-MAC. Inf. Process. Lett. 112(7): 302-307.

·          Shuang Wu, Dengguo FengWenling WuJian GuoLe DongJian Zou. (Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others.FSE 2012.

·          Yanjun Li, Wenling Wu, and Lei Zhang. Integral Attacks on Reduced-Round Camellia Block Cipher,WISA 2011.

·          Xiaoli Yu, Wenling Wu, Yanjun Li and Lei Zhang,Cryptanalysis of Reduced-Round KLEIN Block Cipher,INSCRYPT 2011.

·          Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su and Le Dong,Preimage Attacks on Step-Reduced SM3 Hash FunctionICISC 2011.

·          Zhang LiTing, Wu WenLing, Zhang Lei, Wang Peng. CBCR: CBC MAC with rotating transformations. SCIENCE CHINA-INFORMATION SCIENCES. 2011, 54(11): 2247-2255.

·         Su BoZhan, Wu WenLing, Zhang WenTao. Security of the SMS4 Block Cipher Against Differential Cryptanalysis. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 2011, 26(1): 130-138.

·         Su Bozhan, Wu Wenling, Zhang Lei, Li Yanjun. Full-Round Differential Attack on TWIS Block Cipher. INFORMATION SECURITY APPLICATION. 2011, 6513: 234-242, 

·         Wenling Wu,Zhang lei. LBlock: A Lightweight Block Cipher, ACNS 2011, LNCS 6715,pp:327-344.

·         Su Bozhan, Wu Wenling, Wu Shuang, Dong Le. Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. CANS 2010.

·         Zhang Liting, Wu Wenling, Wang Peng, Zhang Lei, Wu Shuang, Liang Bo. Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. FSE 2010.

·         Wenling Wu, Lei Zhang, Liting Zhang,Wentao Zhang, Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher, ICICS 2009.

·         Wu Shuang, Feng Dengguo, Wu Wenling. Cryptanalysis of the LANE Hash Function. SAC2009.

·         Shuang Wu,Dengguo Feng,Wenling Wu.Practical Rebound Attack on 12-round Cheetah-256ICISC 2009.

·         Lei Zhang,Wenling Wu, Improved Impossible Differential Attack on Large-Block Rijndael, ISC 2008.

·         Zhang Liting, Wu Wenling, Wang Peng. Extended Models for Message Authentication. ICISC2008.

·         Lei Zhang,Wentao Zhang,Wenling Wu. Cryptanalysis of Reduced Round SMS4 Block Cipher. ACISP 2008.

·         Wang Peng, Dengguo Feng, Wenling Wu,Liting Zhang. On the Unprovable Security of 2-Key XCBC. ACISP 2008.

·         Hua Chen, Wen-ling Wu, Deng-guo Feng, Differential Fault Analysis on CLEFIA, ICICS 2007.

·         Wu Wenling, Zhang Wentao, Feng Dengguo, Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia, Journal of Computer Science and Technology,2007.

·         Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng, Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRPT 2007.

·          Wen-Ling Wu,Pseudorandomness of Camellia-like Scheme, Journal of Computer Science and Technology, 2006.

·         Wenling Wu, Wentao Zhang , Dongdai Lin,On the Security of Generalized Feistel Scheme with SP Round Function, International Journal network security,2006.

·         Wu Wenling,Wei Hongru. Pseudorandomness on the Round-Structure of Skipjack, Chinese Journal of Electronics, 2006.

·         吴文玲,冯登国,分组密码工作模式的研究现状,计算机学报,Vol.29,No.1,pp:21-36.2006.

·         Hu Honggang, Feng Dengguo, Wu Wenling. Incomplete exponential sums over Galois rings with applications to some binary sequences derived from Z_2, IEEE Trans. Information Theory,2006.

·         Dayin Wang, Dongdai Lin, and Wenling Wu, An Improved Poly1305 MAC, ACNS 2006.

·         Wang Peng, Feng Dengguo and Wu Wenling. Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006.

·         Wentao Zhang, Wenling Wu, Improved Related-key Impossible Differential Attacks on Reduced-Round AES-192, SAC 2006.

·         Wang Peng, Feng Dengguo and Wu Wenling, HCTR: A Tweakable Enciphering Mode, SKLOIS CSIC 2005 LNCS 3822, p:175-188.

·         Wu Wenling, Zhang Wentao, Feng Dengguo, Improved Integral Cryptanalysis of FOX Block Cipher, ICISC 2005.

·         Wu Wenling, Feng Dengguo,Cheng hua, Collision Attack and Pseudorandomness of Reduced-Round Camellia, SAC 2004.

·         Wen-Ling Wu, Chuan-kun Wu, Cryptanalysis of ZODIAC,Chinese Journal of Electronics,2002.

·         WU Wenling & FENG Dengguo, Linear cryptanalysis of NUSH block cipher, SCIENCE IN CHINA(Series F), 2002.

·         Wu Wenling, He Yeping, Feng Dengguo, Qing Sihan, Power analysis of MARS and Rijndeal, 软件学报,Vol.13,No.4,pp:532-536,2002

·         Wu Wenling,Feng Dengguo, Qing Sihan, Power analysis of Serpent and RC6, SEC2000.

·         Wu Wenling,Feng Dengguo, Qing Sihan ,On Decorrelated Fast Cipher,Journal of Chinese Electronics, 2000.

·         Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing,Cryptanalysis of Some AES Candidate Algorithms, ICICS1999.

科研活动

   
科研项目
( 1 ) 新型分组密码与Hash函数及其安全性评估, 主持, 国家级, 2013-01--2016-12
( 2 ) 分析方法与评估理论, 主持, 国家级, 2013-07--2017-08
( 3 ) 自动分析工具, 主持, 国家级, 2020-12--2022-12
( 4 ) 认证加密算法的设计与分析, 主持, 国家级, 2017-01--2020-12
( 5 ) 分组密码分析方法自动化研究, 主持, 国家级, 2017-01--2020-12
( 6 ) 密码算法分析, 主持, 国家级, 2016-12--2019-12
( 7 ) 算法设计, 主持, 国家级, 2017-01--2020-12
( 8 ) 分组密码算法的安全性分析与评估, 主持, 国家级, 2021-01--2024-12
( 9 ) 密码算法检测分析技术与基础平台, 主持, 国家级, 2007-08--2009-12
( 10 ) 分析方法和技术, 主持, 国家级, 2022-02--2025-02

指导学生

已指导学生

徐志博  硕士研究生  081203-计算机应用技术  

张蕾  博士研究生  081220-信息安全  

刘继业  博士研究生  081220-信息安全  

张立廷  博士研究生  081220-信息安全  

薛宇  硕士研究生  081220-信息安全  

李艳俊  博士研究生  081220-信息安全  

苏波展  博士研究生  081220-信息安全  

范伟杰  硕士研究生  081220-信息安全  

董乐  博士研究生  081220-信息安全  

邹剑  博士研究生  081220-信息安全  

于晓丽  博士研究生  081220-信息安全  

汪艳凤  博士研究生  081220-信息安全  

眭晗  博士研究生  081220-信息安全  

罗鹏  博士研究生  081220-信息安全  

姚远  博士研究生  081203-计算机应用技术  

郭志远  博士研究生  081203-计算机应用技术  

张建  博士研究生  081203-计算机应用技术  

张惠玲  博士研究生  081203-计算机应用技术  

林立  博士研究生  081203-计算机应用技术  

郑雅菲  博士研究生  081203-计算机应用技术  

郎欢  硕士研究生  081203-计算机应用技术  

李灵琛  博士研究生  081203-计算机应用技术  

高思  博士研究生  081203-计算机应用技术  

张丹夏  硕士研究生  083900-网络空间安全  

张中亚  博士研究生  083900-网络空间安全  

曹伟琼  博士研究生  081203-计算机应用技术  

现指导学生

王博琳  博士研究生  083900-网络空间安全  

李晓丹  博士研究生  083900-网络空间安全  

毛永霞  博士研究生  083900-网络空间安全  

张梦圆  博士研究生  083900-网络空间安全  

张丽  博士研究生  083900-网络空间安全  

张宇  博士研究生  083900-网络空间安全  

韦城皓  硕士研究生  083900-网络空间安全  

宋蝉  博士研究生  083900-网络空间安全  

张语晗  博士研究生  083900-网络空间安全  

袁誉飞  硕士研究生  083900-网络空间安全