基本信息

张蕾 女 硕导 中国科学院软件研究所
电子邮件: zhanglei@tca.iscas.ac.cn
通信地址: 中关村南四街4号
邮政编码: 100190
电子邮件: zhanglei@tca.iscas.ac.cn
通信地址: 中关村南四街4号
邮政编码: 100190
研究领域
分组密码算法的分析与设计,密码算法自动分析
招生信息
招生专业
083900-网络空间安全
招生方向
可信计算与信息保障
教育背景
2004-09--2010-01 中国科学院软件研究所 研究生/工学博士2000-09--2004-07 中国科学技术大学 本科/工学学士
学历
研究生
学位
博士
工作经历
工作简历
2015-02~现在, 中国科学院软件研究所, 副研究员2010-04~2015-02,中国科学院软件研究所, 助理研究员2004-09~2010-01,中国科学院软件研究所, 研究生/工学博士2000-09~2004-07,中国科学技术大学, 本科/工学学士
专利与奖励
奖励信息
(1) 中国科学院百篇优秀博士论文, 院级, 2011
专利成果
[1] 张蕾, 张芮. 一种搜索S盒的最少硬件实现门数的方法和S盒电路结构. CN: CN110022202A, 2019-07-16.[2] 吴文玲, 张蕾, 郑雅菲. 一种轻量级杂凑密码摘要生成方法. CN: CN108449171A, 2018-08-24.[3] 吴文玲, 张蕾, 于晓丽. 采用Feistel-PG结构的密码装置及加密方法. CN: CN103051442A, 2013-04-17.[4] 于晓丽, 张蕾, 吴文玲. 一种G1类S盒构造方法及其电路. CN: CN103378968A, 2013-10-30.[5] 于晓丽, 张蕾, 吴文玲. 一种G0类S盒构造方法及其电路. CN: CN103368725A, 2013-10-23.[6] 张立廷, 吴文玲, 张蕾, 王鹏. 一种基于分组密码的消息鉴别方法. CN: CN102136904A, 2011-07-27.[7] 张蕾, 吴文玲. 一种最优S盒构造方法及其电路. CN: CN102185690A, 2011-09-14.
出版信息
发表论文
[1] Lei Zhang. Observations on the branch number and differential analysisof SPEEDY. DCC[J]. 2024, 第 1 作者2024(92): 1175-1199, [2] Yongxia Mao, Wenling Wu, Yafei Zheng, Lei Zhang. Related-Cipher Attacks: Applications to Ballet and ANT. ACISP 2023. 2023, 第 4 作者[3] 宋蝉, 张蕾, 吴文玲. SPN型密码的通用子空间迹分析. 软件学报[J]. 2023, 第 2 作者 通讯作者 34(12): 5807-5821, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7608983&detailType=1.[4] Lei Zhang, Ruichen Wu, Yuhan Zhang, Yafei Zheng, Wenling Wu. LLLWBC: A New Low-Latency Light-Weight Block Cipher. Inscrypt 2022. 2023, 第 1 作者[5] Yuhan Zhang, Wenling Wu, Lei Zhang. Improved Differential Attack in LEA. ACISP 2022. 2022, 第 3 作者[6] 张丽, 吴文玲, 张蕾, 郑雅菲. 基于交换等价的缩减轮AES-128的密钥恢复攻击. 计算机研究与发展[J]. 2021, 第 3 作者58(10): 2213-2221, http://lib.cqvip.com/Qikan/Article/Detail?id=7105702003.[7] Zhang Lei. A New Non-random Property of 4.5-Round PRINCE. ICISC 2020 LNCS 12593. 2020, 第 1 作者[8] 吴文玲, 张蕾, 郑雅菲, 李灵琛. 分组密码uBlock. 密码学报[J]. 2019, 第 2 作者6(6): 690-703, http://lib.cqvip.com/Qikan/Article/Detail?id=7100725115.[9] Liu, LingChen, Wu, WenLing, Zhang, Lei, Zheng, YaFei. New method to describe the differential distribution table for large S-boxes in MILP and its application. IET INFORMATION SECURITY[J]. 2019, 第 3 作者13(5): 479-485, https://www.webofscience.com/wos/woscc/full-record/WOS:000479308800008.[10] 郎欢, 张蕾, 吴文玲. SM4的快速软件实现技术. 中国科学院大学学报[J]. 2018, 第 2 作者35(2): 180-187, http://journal.ucas.ac.cn/CN/10.7523/j.issn.2095-6134.2018.02.005.[11] Li Lingchen, Wu Wenling, Zhang Lei, Qing S, Mitchell C, Chen L, Liu D. Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017. 2018, 第 3 作者10631: 502-508, [12] Zhang, Lei, Wu, Wenling. Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. IET INFORMATION SECURITY[J]. 2017, 第 1 作者 通讯作者 11(3): 121-130, https://www.webofscience.com/wos/woscc/full-record/WOS:000400162500001.[13] Zhang Lei. Analysis of Permutation Choices for Enhanced Generalized Feistel Structure with SP-Type Round Function. IET Information Security. 2017, 第 1 作者[14] 郎欢, 张蕾, 吴文玲. 轻量杂凑函数LHash快速软件实现. 密码学报[J]. 2017, 第 2 作者4(4): 345-359, http://dx.doi.org/10.13868/j.cnki.jcr.000187.[15] Yu, XiaoLi, Wu, WenLing, Shi, ZhenQing, Zhang, Jian, Zhang, Lei, Wang, YanFeng. Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY[J]. 2015, 第 5 作者30(6): 1358-1369, http://dx.doi.org/10.1007/s11390-015-1603-5.[16] ZHANG Lei, WU Wenling. Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers. 电子学报(英文版)[J]. 2015, 第 1 作者343-348, http://lib.cqvip.com/Qikan/Article/Detail?id=69689088504849534850485048.[17] Wu WenLing, Zhang Lei, Yu XiaoLi. The DBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 第 2 作者58(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000349811500007.[18] Zhang Lei. Improved Differential and Linear Active S-boxes Search Technique for Feistel Type Ciphers. Chinese Journal of Electronics. 2015, 第 1 作者[19] Wu WenLing, Zhang Lei, Yu XiaoLi. The DBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 第 2 作者58(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000349811500007.[20] Zhang Lei, Wu Wenling. Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers. CHINESE JOURNAL OF ELECTRONICS[J]. 2015, 第 1 作者 通讯作者 24(2): 343-348, http://lib.cqvip.com/Qikan/Article/Detail?id=69689088504849534850485048.[21] Wu Wenling, Zhang lei, Yu Xiaoli. TheDBlock family of block ciphers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 第 2 作者58(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000349811500007.[22] Soleimany, Hadi, Blondeau, Celine, Yu, Xiaoli, Wu, Wenling, Nyberg, Kaisa, Zhang, Huiling, Zhang, Lei, Wang, Yanfeng. Reflection Cryptanalysis of PRINCE-Like Ciphers. JOURNAL OF CRYPTOLOGY[J]. 2015, 第 7 作者28(3): 718-744, https://www.webofscience.com/wos/woscc/full-record/WOS:000358935100010.[23] Zhang, Lei, Wu, Wenling. Differential analysis of the Extended Generalized Feistel Networks. INFORMATIONPROCESSINGLETTERS[J]. 2014, 第 1 作者 通讯作者 114(12): 723-727, https://www.webofscience.com/wos/woscc/full-record/WOS:000341903300015.[24] Lin Li, Wu Wenling, Wang Yanfeng, Zhang Lei, Lee HS, Han DG. General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013. 2014, 第 4 作者8565: 203-223, [25] Zhang Lei. LHash: A Lightweight Hash Function. Inscrypt会议. 2014, 第 1 作者[26] Soleimany Hadi, Blondeau C, Line, Yu Xiaoli, Wu Wenling, Nyberg Kaisa, Zhang Huiling, Zhang Lei, Wang Yanfeng. Reflection cryptanalysis of PRINCE-like ciphers. 20th International Workshop on Fast Software Encryption, FSE 2013. 2014, 第 8 作者71-91, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000358935100010&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=3a85505900f77cc629623c3f2907beab.[27] 范伟杰, 吴文玲, 张蕾. HIGHT算法的差分故障攻击. JOURNAL OF THE GRADUATE SCHOOL OF THE ACADEMY OF SCIENCES[J]. 2012, 第 3 作者29(2): 271-276, http://lib.cqvip.com/Qikan/Article/Detail?id=41045464.[28] 范伟杰, 吴文玲, 张蕾. HIGHT算法的差分故障攻击. 中国科学院研究生院学报[J]. 2012, 第 3 作者271-276, http://lib.cqvip.com/Qikan/Article/Detail?id=41045464.[29] Yu Xiaoli, Wu Wenling, Li Yanjun, Zhang Lei. Cryptanalysis of reduced-round klein block cipher. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS). 2012, 第 4 作者237-250, http://ir.iscas.ac.cn/handle/311060/15863.[30] Li Yanjun, Wu Wenling, Zhang Lei. Improved integral attacks on reduced-round clefia block cipher. LECTURENOTESINCOMPUTERSCIENCEINCLUDINGSUBSERIESLECTURENOTESINARTIFICIALINTELLIGENCEANDLECTURENOTESINBIOINFORMATICS. 2012, 第 3 作者28-39, http://ir.iscas.ac.cn/handle/311060/15689.[31] Wu Wenling, Zhang Lei, Lopez J, Tsudik G. LBlock: A Lightweight Block Cipher. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011). 2011, 第 2 作者6715: 327-344, [32] Su Bozhan, Wu Wenling, Zhang Lei, Li Yanjun. Full-Round Differential Attack on TWIS Block Cipher. INFORMATION SECURITY APPLICATIONS. 2011, 第 3 作者6513: 234-242, [33] Zhang Liting, Wu Wenling, Zhang Lei, Wang Peng. CBCR: CBC MAC with rotating transformations. 中国科学:信息科学(英文版)[J]. 2011, 第 3 作者54(11): 2247-2255, http://lib.cqvip.com/Qikan/Article/Detail?id=39727073.[34] Zhang LiTing, Wu WenLing, Zhang Lei, Wang Peng. CBCR: CBC MAC with rotating transformations. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2011, 第 3 作者54(11): 2247-2255, http://lib.cqvip.com/Qikan/Article/Detail?id=39727073.[35] 张立廷, 吴文玲, 张蕾, 王鹏. CBCR:采用循环移位的CBC MAC. 中国科学:信息科学[J]. 2011, 第 3 作者41(6): 694-703, http://lib.cqvip.com/Qikan/Article/Detail?id=38098813.[36] Zhang Lei, Wu Wenling, Zhang Liting, Bao F, Yung M, Lin DD, Jing JW. Proposition of Two Cipher Structures. INFORMATION SECURITY AND CRYPTOLOGY. 2010, 第 1 作者6151: 215-229, [37] Li Yanjun, Wu Wenling, Zhang Lei, Kwak J, Deng RH, Won Y, Wang G. Integral Attacks on Reduced-Round ARIA Block Cipher. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS. 2010, 第 3 作者6047: 19-29, [38] Wu Wenling, Zhang Lei, Zhang Liting, Zhang Wentao, Qing SH, Mitchell CJ, Wang GL. Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS. 2009, 第 2 作者5927: 17-31, [39] Wu Wenling, Zhang Lei, Zhang Wentao, Sica F, Avanzi R, Keliher L. Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. SELECTED AREAS IN CRYPTOGRAPHY. 2009, 第 2 作者5381: 442-456, [40] 张蕾, 吴文玲. 对DES的Rectangle攻击和Boomerang攻击. 软件学报[J]. 2008, 第 1 作者19(10): 2659-2666, http://lib.cqvip.com/Qikan/Article/Detail?id=28386013.[41] Zhang Lei, Wu Wenling, Park Je Hong, Koo Bon Wook, Yeom Yongjin, Wu TC, Lei CL, Rijmen V, Lee DT. Improved impossible differential attacks on large-block Rijndael. INFORMATION SECURITY, PROCEEDINGS. 2008, 第 1 作者5222: 298-+, [42] Zhang Lei, Zhang Wentao, Wu Wenling, Mu Y, Susilo W, Seberry J. Cryptanalysis of reduced-round SMS4 block cipher. INFORMATION SECURITY AND PRIVACY. 2008, 第 1 作者5107: 216-229, [43] 吴文玲, 张蕾. 不可能差分密码分析研究进展. 系统科学与数学[J]. 2008, 第 2 作者28(8): 971-983, http://lib.cqvip.com/Qikan/Article/Detail?id=27952188.[44] Zhang Wentao, Wu Wenling, Zhang Lei, Feng Dengguo, Biham E, Youssef AM. Improved related-key impossible differential attacks on reduced-round AES-192. SELECTED AREAS IN CRYPTOGRAPHY. 2007, 第 3 作者4356: 15-+, [45] Zhang Wentao, Zhang Lei, Wu Wenling, Feng Dengguo, Srinathan K, Rangan CP, Yung M. Related-key differential-linear attacks on reduced AES-192. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007. 2007, 第 2 作者4859: 73-+, [46] ZHANG WenTao, WU WenLing, ZHANG Lei. 对低轮AES-256的相关密钥-不可能差分密码分析. 软件学报[J]. 2007, 第 3 作者18(11): 2893-2901, http://lib.cqvip.com/Qikan/Article/Detail?id=25789698.[47] 张文涛, 吴文玲, 张蕾. 对低轮AES-256的相关密钥-不可能差分密码分析. 软件学报[J]. 2007, 第 3 作者18(11): 2893-2901, http://lib.cqvip.com/Qikan/Article/Detail?id=25789698.[48] 张蕾, 吴文玲. SMS4密码算法的差分故障攻击. 计算机学报[J]. 2006, 第 1 作者29(9): 1596-1602, http://lib.cqvip.com/Qikan/Article/Detail?id=22809416.
科研活动
科研项目
( 1 ) 分组密码自动分析若干关键理论与技术问题的研究, 主持, 国家级, 2012-01--2015-12( 2 ) 密码科学技术国家重点实验室 开放课题, 主持, 研究所(学校), 2015-07--2017-06