基本信息

王鹏  男  硕导  中国科学院信息工程研究所
电子邮件: wpeng at iie.ac.cn
通信地址: 北京市海淀区四季青镇益园文化创意产业基地C2东段3楼
邮政编码: 100195

研究领域

密码学
分组密码
分组密码工作模式
对称密码方案

教授课程

密码分析新进展
密码分析学
信息安全数学基础

出版信息

   
发表论文
[1] 郭婷婷, 王鹏. A Note on the Security Framework of Two-key DbHtS MACs. ICICS 2022[J]. 2022, [2] Lei Hu. Attack Beyond-Birthday-Bound MACs in Quantum Setting. PQCrypto 2021. 2021, [3] 王鹏. Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure. Inscrypt 2020. 2020, [4] Wei, Man, Shi, Danping, Sun, Siwei, Wang, Peng, Hu, Lei, Zhou, J, Luo, X, Shen, Q, Xu, Z. Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 799-813, [5] 王鹏. ISO/IEC对称密码算法标准动态分析. 中国密码学发展报告2018. 2019, [6] Zheng, Kaiyan, Wang, Peng, Mori, P, Furnell, S, Camp, O. Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACYnull. 2018, 452-460, [7] 王鹏. Ubiquitous Weak-Key Classes of BRW-Polynomial Function. AFRICACRYPT 2018. 2018, [8] 郑凯燕, 王鹏. BC加密模式的分析及其改进. 信息安全学报[J]. 2017, 2(3): 61-78, http://lib.cqvip.com/Qikan/Article/Detail?id=672914189.
[9] 孙哲蕾, 王鹏. OFBNLF加密工作模式的分析. 中国科学. 信息科学[J]. 2016, 46(6): 729-742, [10] Wang Peng, Li Yuling, Zhang Liting, Zheng Kaiyan, Peyrin T. Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications. FAST SOFTWARE ENCRYPTION (FSE 2016)null. 2016, 9783: 514-532, [11] Sun Zhelei, Wang Peng, Zhang Liting, Foo E, Stebila D. Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. INFORMATION SECURITY AND PRIVACY (ACISP 2015)null. 2015, 9144: 3-19, [12] Sun Siwei, Hu Lei, Wang Peng, Qiao Kexin, Ma Xiaoshuang, Song Ling, Sarkar P, Iwata T. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT Inull. 2014, 8873: 158-178, [13] 王鹏. Cryptanalysis of three Authenticated Encryption Schemes for Wireless Sensor Network. Inscrypt 2013. 2013, [14] 王鹏. Cryptanalysis of the OKH Authenticated Encryption Scheme. ISPEC 2013. 2013, [15] 王鹏. Collision Attacks on Variant of OCB mode and Its Series. INSCRYPT 2012. 2012, [16] Zhang, Liting, Wu, Wenling, Wang, Peng, Liang, Bo. TrCBC: Another look at CBC-MAC. INFORMATION PROCESSING LETTERS[J]. 2012, 112(7): 302-307, https://www.webofscience.com/wos/woscc/full-record/WOS:000301215100010.
[17] 张立廷, 吴文玲, 张蕾, 王鹏. CBCR:采用循环移位的CBC MAC. 中国科学:信息科学. 2011, 41(6): 694-703, http://lib.cqvip.com/Qikan/Article/Detail?id=38098813.
[18] 王鹏. 一个关于MAC伪随机性与不可伪造性的注记. 中国科学院研究生院学报[J]. 2010, 27(2): 263-266, http://lib.cqvip.com/Qikan/Article/Detail?id=33193772.
[19] Zhang Liting, Wu Wenling, Wang Peng, Zhang Lei, Wu Shuang, Liang Bo. Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. FAST SOFTWARE ENCRYPTIONnull. 2010, 6147: 250-269, 

指导学生

已指导学生

李玉玲  硕士研究生  0812Z1-信息安全  

魏荣  硕士研究生  085211-计算机技术  

现指导学生

毛淑平  硕士研究生  083900-网络空间安全  

招生信息

   
招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码工程与应用