Peng Wang
Email:p-wang at 
Address:State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing

Research Areas

Block cipher
Block cipher mode of operation


[1] Peng Wang , Dengguo Feng, Wenling Wu. On the Security of Tweakable Modes of Operation: TBC and TAE. Information Security: 8th International Conference, ISC 2005. LNCS 3650, 274~287. Springer-Verlag, 2005.

[2] Peng Wang , Dengguo Feng, Wenling Wu. HCTR: A Variable-Input- Length Enciphering Mode. SKLOIS Conference on Information Security and Cryptology, CISC 2005, LNCS 3822, 175~188. Springer-Verlag, 2005.

[ 3] Peng Wang, Dengguo Feng, and Wenling Wu. Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. In Proceeding of Indocrypt 2006, LNCS 4329, 280~286. Springer-Verlag, 2006.

[4] Peng Wang, Dengguo Feng, Wenling Wu and Liting Zhang. On the Unprovable Security of 2-Key XCBC. In ACISP 2008, LNCS 5107, 230~238. Springer-Verlag, 2008.

[5] Peng Wang, Dengguo Feng, Changlu Lin and Wenling Wu. Security of Truncated MACs. INSCRYPT 2008, LNCS 5487, 99~114. Springer-Verlag, 2009.

[6] Peng Wang, Dengguo Feng, Wenling Wu and Liting Zhang. On the Correctness of An Approach Against Side-channel attacks. ISPEC 2009, LNCS 5451, 336~344. Springer-Verlag, 2009.