default search action
Shuang Wu 0004
Person information
- affiliation: Institute of Software, Chinese Academy of Sciences, Beijing, China
Other persons with the same name
- Shuang Wu — disambiguation page
- Shuang Wu 0001
— YouTu Laboratory, Tencent, Shanghai, China (and 1 more)
- Shuang Wu 0002
— Nanyang Technological University, Singapore
- Shuang Wu 0003 — Raytheon BBN Technologies, Cambridge, MA, USA
- Shuang Wu 0005
— Huawei Noah's Ark Lab, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j4]Ivica Nikolic
, Lei Wang, Shuang Wu:
The parallel-cut meet-in-the-middle attack. Cryptogr. Commun. 7(3): 331-345 (2015) - [i11]Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. IACR Cryptol. ePrint Arch. 2015: 149 (2015) - [i10]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. IACR Cryptol. ePrint Arch. 2015: 372 (2015) - [i9]Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced LED. IACR Cryptol. ePrint Arch. 2015: 429 (2015) - 2014
- [j3]Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. Frontiers Comput. Sci. 8(3): 513-525 (2014) - [j2]Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. J. Inf. Sci. Eng. 30(6): 1789-1806 (2014) - [c16]Jian Guo
, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. CT-RSA 2014: 402-423 - 2013
- [c15]Jian Guo
, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. ASIACRYPT (2) 2013: 21-40 - [c14]Florian Mendel
, Thomas Peyrin
, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT (2) 2013: 484-503 - [c13]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function. Inscrypt 2013: 291-308 - [c12]Jian Zou, Wenling Wu, Shuang Wu:
Cryptanalysis of the Round-Reduced GOST Hash Function. Inscrypt 2013: 309-322 - [c11]Jérémy Jean, Ivica Nikolic, Thomas Peyrin
, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. FSE 2013: 92-111 - [c10]Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced \mathttLED. FSE 2013: 112-129 - [i8]Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. IACR Cryptol. ePrint Arch. 2013: 467 (2013) - [i7]Ivica Nikolic, Lei Wang, Shuang Wu:
The Parallel-Cut Meet-In-The-Middle Attack. IACR Cryptol. ePrint Arch. 2013: 530 (2013) - [i6]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2013: 600 (2013) - [i5]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function (Full Version). IACR Cryptol. ePrint Arch. 2013: 867 (2013) - 2012
- [c9]Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu:
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. ASIACRYPT 2012: 562-579 - [c8]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. FSE 2012: 127-145 - [i4]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). IACR Cryptol. ePrint Arch. 2012: 206 (2012) - [i3]Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. IACR Cryptol. ePrint Arch. 2012: 686 (2012) - 2011
- [c7]Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su, Le Dong:
Preimage Attacks on Step-Reduced SM3 Hash Function. ICISC 2011: 375-390 - [c6]Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-Key Distinguisher on Round-Reduced 3D Block Cipher. WISA 2011: 55-69 - 2010
- [j1]Shuang Wu, Dengguo Feng, Wenling Wu:
New Disturbance Vector for SHA-0 Collision. J. Inf. Sci. Eng. 26(6): 2143-2157 (2010) - [c5]Bozhan Su, Wenling Wu, Shuang Wu, Le Dong:
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. CANS 2010: 124-139 - [c4]Shuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su:
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. Inscrypt 2010: 155-168 - [c3]Liting Zhang, Wenling Wu, Peng Wang
, Lei Zhang, Shuang Wu, Bo Liang:
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. FSE 2010: 250-269 - [i2]Bozhan Su, Wenling Wu, Shuang Wu, Le Dong:
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. IACR Cryptol. ePrint Arch. 2010: 355 (2010)
2000 – 2009
- 2009
- [c2]Shuang Wu, Dengguo Feng, Wenling Wu:
Practical Rebound Attack on 12-Round Cheetah-256. ICISC 2009: 300-314 - [c1]Shuang Wu, Dengguo Feng, Wenling Wu:
Cryptanalysis of the LANE Hash Function. Selected Areas in Cryptography 2009: 126-140 - 2008
- [i1]Shuang Wu, Dengguo Feng, Wenling Wu:
Cryptanalysis of the Hash Function LUX-256. IACR Cryptol. ePrint Arch. 2008: 520 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 23:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint