基本信息
张蕾  女  硕导  中国科学院软件研究所
电子邮件: zhanglei@tca.iscas.ac.cn
通信地址: 中关村南四街4号
邮政编码: 100190

研究领域

分组密码算法的分析与设计,密码算法自动分析

招生信息

招生专业
083900-网络空间安全
招生方向
可信计算与信息保障

教育背景

2004-09--2010-01   中国科学院软件研究所   研究生/工学博士
2000-09--2004-07   中国科学技术大学   本科/工学学士
学历
研究生
学位
博士

工作经历

   
工作简历
2015-02~现在, 中国科学院软件研究所, 副研究员
2010-04~2015-02,中国科学院软件研究所, 助理研究员
2004-09~2010-01,中国科学院软件研究所, 研究生/工学博士
2000-09~2004-07,中国科学技术大学, 本科/工学学士

专利与奖励

   
奖励信息
(1) 中国科学院百篇优秀博士论文, 院级, 2011
专利成果
[1] 张蕾, 张芮. 一种搜索S盒的最少硬件实现门数的方法和S盒电路结构. CN: CN110022202A, 2019-07-16.

[2] 吴文玲, 张蕾, 郑雅菲. 一种轻量级杂凑密码摘要生成方法. CN: CN108449171A, 2018-08-24.

[3] 吴文玲, 张蕾, 于晓丽. 采用Feistel-PG结构的密码装置及加密方法. CN: CN103051442A, 2013-04-17.

[4] 于晓丽, 张蕾, 吴文玲. 一种G1类S盒构造方法及其电路. CN: CN103378968A, 2013-10-30.

[5] 于晓丽, 张蕾, 吴文玲. 一种G0类S盒构造方法及其电路. CN: CN103368725A, 2013-10-23.

[6] 张立廷, 吴文玲, 张蕾, 王鹏. 一种基于分组密码的消息鉴别方法. CN: CN102136904A, 2011-07-27.

[7] 张蕾, 吴文玲. 一种最优S盒构造方法及其电路. CN: CN102185690A, 2011-09-14.

出版信息

   
发表论文
[1] Lei Zhang. Observations on the branch number and differential analysisof SPEEDY. DCC[J]. 2024, 2024(92): 1175-1199, [2] Yongxia Mao, Wenling Wu, Yafei Zheng, Lei Zhang. Related-Cipher Attacks: Applications to Ballet and ANT. ACISP 2023null. 2023, [3] 宋蝉, 张蕾, 吴文玲. SPN型密码的通用子空间迹分析. 软件学报[J]. 2023, 34(12): 5807-5821, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7608983&detailType=1.
[4] Lei Zhang, Ruichen Wu, Yuhan Zhang, Yafei Zheng, Wenling Wu. LLLWBC: A New Low-Latency Light-Weight Block Cipher. Inscrypt 2022null. 2023, [5] Yuhan Zhang, Wenling Wu, Lei Zhang. Improved Differential Attack in LEA. ACISP 2022null. 2022, [6] 张丽, 吴文玲, 张蕾, 郑雅菲. 基于交换等价的缩减轮AES-128的密钥恢复攻击. 计算机研究与发展[J]. 2021, 58(10): 2213-2221, http://lib.cqvip.com/Qikan/Article/Detail?id=7105702003.
[7] Zhang Lei. A New Non-random Property of 4.5-Round PRINCE. ICISC 2020 LNCS 12593. 2020, [8] 吴文玲, 张蕾, 郑雅菲, 李灵琛. 分组密码uBlock. 密码学报[J]. 2019, 6(6): 690-703, http://lib.cqvip.com/Qikan/Article/Detail?id=7100725115.
[9] Liu, LingChen, Wu, WenLing, Zhang, Lei, Zheng, YaFei. New method to describe the differential distribution table for large S-boxes in MILP and its application. IET INFORMATION SECURITY[J]. 2019, 13(5): 479-485, https://www.webofscience.com/wos/woscc/full-record/WOS:000479308800008.
[10] 郎欢, 张蕾, 吴文玲. SM4的快速软件实现技术. 中国科学院大学学报[J]. 2018, 35(2): 180-187, http://lib.cqvip.com/Qikan/Article/Detail?id=674813318.
[11] Li Lingchen, Wu Wenling, Zhang Lei, Qing S, Mitchell C, Chen L, Liu D. Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017null. 2018, 10631: 502-508, [12] Zhang, Lei, Wu, Wenling. Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. IET INFORMATION SECURITY[J]. 2017, 11(3): 121-130, https://www.webofscience.com/wos/woscc/full-record/WOS:000400162500001.
[13] Zhang Lei. Analysis of Permutation Choices for Enhanced Generalized Feistel Structure with SP-Type Round Function. IET Information Security. 2017, [14] 郎欢, 张蕾, 吴文玲. 轻量杂凑函数LHash快速软件实现. 密码学报[J]. 2017, 4(4): 345-359,  http://dx.doi.org/10.13868/j.cnki.jcr.000187.
[15] Yu, XiaoLi, Wu, WenLing, Shi, ZhenQing, Zhang, Jian, Zhang, Lei, Wang, YanFeng. Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY[J]. 2015, 30(6): 1358-1369, http://dx.doi.org/10.1007/s11390-015-1603-5.
[16] ZHANG Lei, WU Wenling. Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers. 电子学报(英文版)[J]. 2015, 343-348, http://lib.cqvip.com/Qikan/Article/Detail?id=69689088504849534850485048.
[17] Wu WenLing, Zhang Lei, Yu XiaoLi. The DBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 58(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000349811500007.
[18] Zhang Lei. Improved Differential and Linear Active S-boxes Search Technique for Feistel Type Ciphers. Chinese Journal of Electronics. 2015, [19] Wu WenLing, Zhang Lei, Yu XiaoLi. The DBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 58(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000349811500007.
[20] Zhang Lei, Wu Wenling. Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers. CHINESE JOURNAL OF ELECTRONICS[J]. 2015, 24(2): 343-348, http://lib.cqvip.com/Qikan/Article/Detail?id=69689088504849534850485048.
[21] Wu Wenling, Zhang lei, Yu Xiaoli. TheDBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 58(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000349811500007.
[22] Soleimany, Hadi, Blondeau, Celine, Yu, Xiaoli, Wu, Wenling, Nyberg, Kaisa, Zhang, Huiling, Zhang, Lei, Wang, Yanfeng. Reflection Cryptanalysis of PRINCE-Like Ciphers. JOURNAL OF CRYPTOLOGY[J]. 2015, 28(3): 718-744, https://www.webofscience.com/wos/woscc/full-record/WOS:000358935100010.
[23] Zhang, Lei, Wu, Wenling. Differential analysis of the Extended Generalized Feistel Networks. INFORMATIONPROCESSINGLETTERS[J]. 2014, 114(12): 723-727, https://www.webofscience.com/wos/woscc/full-record/WOS:000341903300015.
[24] Lin Li, Wu Wenling, Wang Yanfeng, Zhang Lei, Lee HS, Han DG. General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013null. 2014, 8565: 203-223, [25] Zhang Lei. LHash: A Lightweight Hash Function. Inscrypt会议. 2014, [26] Soleimany Hadi, Blondeau C, Line, Yu Xiaoli, Wu Wenling, Nyberg Kaisa, Zhang Huiling, Zhang Lei, Wang Yanfeng. Reflection cryptanalysis of PRINCE-like ciphers. 20th International Workshop on Fast Software Encryption, FSE 2013null. 2014, 71-91, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000358935100010&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=3a85505900f77cc629623c3f2907beab.
[27] 范伟杰, 吴文玲, 张蕾. HIGHT算法的差分故障攻击. JOURNAL OF THE GRADUATE SCHOOL OF THE ACADEMY OF SCIENCES[J]. 2012, 29(2): 271-276, http://lib.cqvip.com/Qikan/Article/Detail?id=41045464.
[28] 范伟杰, 吴文玲, 张蕾. HIGHT算法的差分故障攻击. 中国科学院研究生院学报[J]. 2012, 271-276, http://lib.cqvip.com/Qikan/Article/Detail?id=41045464.
[29] Yu Xiaoli, Wu Wenling, Li Yanjun, Zhang Lei. Cryptanalysis of reduced-round klein block cipher. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS)null. 2012, 237-250, http://ir.iscas.ac.cn/handle/311060/15863.
[30] Li Yanjun, Wu Wenling, Zhang Lei. Improved integral attacks on reduced-round clefia block cipher. LECTURENOTESINCOMPUTERSCIENCEINCLUDINGSUBSERIESLECTURENOTESINARTIFICIALINTELLIGENCEANDLECTURENOTESINBIOINFORMATICSnull. 2012, 28-39, http://ir.iscas.ac.cn/handle/311060/15689.
[31] Wu Wenling, Zhang Lei, Lopez J, Tsudik G. LBlock: A Lightweight Block Cipher. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011)null. 2011, 6715: 327-344, [32] Su Bozhan, Wu Wenling, Zhang Lei, Li Yanjun. Full-Round Differential Attack on TWIS Block Cipher. INFORMATION SECURITY APPLICATIONSnull. 2011, 6513: 234-242, [33] Zhang Liting, Wu Wenling, Zhang Lei, Wang Peng. CBCR: CBC MAC with rotating transformations. 中国科学:信息科学(英文版)[J]. 2011, 54(11): 2247-2255, http://lib.cqvip.com/Qikan/Article/Detail?id=39727073.
[34] Zhang LiTing, Wu WenLing, Zhang Lei, Wang Peng. CBCR: CBC MAC with rotating transformations. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2011, 54(11): 2247-2255, http://lib.cqvip.com/Qikan/Article/Detail?id=39727073.
[35] 张立廷, 吴文玲, 张蕾, 王鹏. CBCR:采用循环移位的CBC MAC. 中国科学:信息科学[J]. 2011, 41(6): 694-703, http://lib.cqvip.com/Qikan/Article/Detail?id=38098813.
[36] Zhang Lei, Wu Wenling, Zhang Liting, Bao F, Yung M, Lin DD, Jing JW. Proposition of Two Cipher Structures. INFORMATION SECURITY AND CRYPTOLOGYnull. 2010, 6151: 215-229, [37] Li Yanjun, Wu Wenling, Zhang Lei, Kwak J, Deng RH, Won Y, Wang G. Integral Attacks on Reduced-Round ARIA Block Cipher. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGSnull. 2010, 6047: 19-29, [38] Wu Wenling, Zhang Lei, Zhang Liting, Zhang Wentao, Qing SH, Mitchell CJ, Wang GL. Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGSnull. 2009, 5927: 17-31, [39] Wu Wenling, Zhang Lei, Zhang Wentao, Sica F, Avanzi R, Keliher L. Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. SELECTED AREAS IN CRYPTOGRAPHYnull. 2009, 5381: 442-456, [40] 张蕾, 吴文玲. 对DES的Rectangle攻击和Boomerang攻击. 软件学报[J]. 2008, 19(10): 2659-2666, http://lib.cqvip.com/Qikan/Article/Detail?id=28386013.
[41] Zhang Lei, Wu Wenling, Park Je Hong, Koo Bon Wook, Yeom Yongjin, Wu TC, Lei CL, Rijmen V, Lee DT. Improved impossible differential attacks on large-block Rijndael. INFORMATION SECURITY, PROCEEDINGSnull. 2008, 5222: 298-+, [42] Zhang Lei, Zhang Wentao, Wu Wenling, Mu Y, Susilo W, Seberry J. Cryptanalysis of reduced-round SMS4 block cipher. INFORMATION SECURITY AND PRIVACYnull. 2008, 5107: 216-229, [43] 吴文玲, 张蕾. 不可能差分密码分析研究进展. 系统科学与数学[J]. 2008, 28(8): 971-983, http://lib.cqvip.com/Qikan/Article/Detail?id=27952188.
[44] Zhang Wentao, Wu Wenling, Zhang Lei, Feng Dengguo, Biham E, Youssef AM. Improved related-key impossible differential attacks on reduced-round AES-192. SELECTED AREAS IN CRYPTOGRAPHYnull. 2007, 4356: 15-+, [45] Zhang Wentao, Zhang Lei, Wu Wenling, Feng Dengguo, Srinathan K, Rangan CP, Yung M. Related-key differential-linear attacks on reduced AES-192. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007null. 2007, 4859: 73-+, [46] ZHANG WenTao, WU WenLing, ZHANG Lei. 对低轮AES-256的相关密钥-不可能差分密码分析. 软件学报[J]. 2007, 18(11): 2893-2901, http://lib.cqvip.com/Qikan/Article/Detail?id=25789698.
[47] 张文涛, 吴文玲, 张蕾. 对低轮AES-256的相关密钥-不可能差分密码分析. 软件学报[J]. 2007, 18(11): 2893-2901, http://lib.cqvip.com/Qikan/Article/Detail?id=25789698.
[48] 张蕾, 吴文玲. SMS4密码算法的差分故障攻击. 计算机学报[J]. 2006, 29(9): 1596-1602, http://lib.cqvip.com/Qikan/Article/Detail?id=22809416.

科研活动

   
科研项目
( 1 ) 分组密码自动分析若干关键理论与技术问题的研究, 主持, 国家级, 2012-01--2015-12
( 2 ) 密码科学技术国家重点实验室 开放课题, 主持, 研究所(学校), 2015-07--2017-06