General
Peng Wang
Email:p-wang at gucas.ac.cn
Telephone:86-10-88256433-407
Address:State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing
Postcode:100049
Email:p-wang at gucas.ac.cn
Telephone:86-10-88256433-407
Address:State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing
Postcode:100049
Research Areas
Cryptography
Block cipher
Block cipher mode of operation
Block cipher
Block cipher mode of operation
Publications
Papers
[1] Peng Wang , Dengguo Feng, Wenling Wu. On the Security of Tweakable Modes of Operation: TBC and TAE. Information Security: 8th International Conference, ISC 2005. LNCS 3650, 274~287. Springer-Verlag, 2005.
[2] Peng Wang , Dengguo Feng, Wenling Wu. HCTR: A Variable-Input- Length Enciphering Mode. SKLOIS Conference on Information Security and Cryptology, CISC 2005, LNCS 3822, 175~188. Springer-Verlag, 2005.
[ 3] Peng Wang, Dengguo Feng, and Wenling Wu. Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. In Proceeding of Indocrypt 2006, LNCS 4329, 280~286. Springer-Verlag, 2006.
[4] Peng Wang, Dengguo Feng, Wenling Wu and Liting Zhang. On the Unprovable Security of 2-Key XCBC. In ACISP 2008, LNCS 5107, 230~238. Springer-Verlag, 2008.
[5] Peng Wang, Dengguo Feng, Changlu Lin and Wenling Wu. Security of Truncated MACs. INSCRYPT 2008, LNCS 5487, 99~114. Springer-Verlag, 2009.
[6] Peng Wang, Dengguo Feng, Wenling Wu and Liting Zhang. On the Correctness of An Approach Against Side-channel attacks. ISPEC 2009, LNCS 5451, 336~344. Springer-Verlag, 2009.
[2] Peng Wang , Dengguo Feng, Wenling Wu. HCTR: A Variable-Input- Length Enciphering Mode. SKLOIS Conference on Information Security and Cryptology, CISC 2005, LNCS 3822, 175~188. Springer-Verlag, 2005.
[ 3] Peng Wang, Dengguo Feng, and Wenling Wu. Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. In Proceeding of Indocrypt 2006, LNCS 4329, 280~286. Springer-Verlag, 2006.
[4] Peng Wang, Dengguo Feng, Wenling Wu and Liting Zhang. On the Unprovable Security of 2-Key XCBC. In ACISP 2008, LNCS 5107, 230~238. Springer-Verlag, 2008.
[5] Peng Wang, Dengguo Feng, Changlu Lin and Wenling Wu. Security of Truncated MACs. INSCRYPT 2008, LNCS 5487, 99~114. Springer-Verlag, 2009.
[6] Peng Wang, Dengguo Feng, Wenling Wu and Liting Zhang. On the Correctness of An Approach Against Side-channel attacks. ISPEC 2009, LNCS 5451, 336~344. Springer-Verlag, 2009.