Lei Wei
Title
Cited by
Cited by
Year
Skyfire: Data-driven seed generation for fuzzing
J Wang, B Chen, L Wei, Y Liu
S&P, 2017
1382017
Unaligned Rebound Attack: Application to Keccak
A Duc, J Guo, T Peyrin, L Wei
Fast Software Encryption, 402-421, 2012
652012
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
L Wei, C Rechberger, J Guo, H Wu, H Wang, S Ling
Information Security and Privacy, 433-438, 2011
582011
On the (In) Security of IDEA in Various Hashing Modes
L Wei, T Peyrin, P Sokołowski, S Ling, J Pieprzyk, H Wang
Fast Software Encryption, 163-179, 2012
182012
On multidimensional linear cryptanalysis.
PH Nguyen, L Wei, H Wang, S Ling
ACISP 6168, 37-52, 2010
92010
Extensions of the Cube Attack Based on Low Degree Annihilators.
A Zhang, CW Lim, K Khoo, L Wei, J Pieprzyk
CANS, 87-102, 2009
62009
Improved security analysis of Fugue-256 (poster)
P Gauravaram, LR Knudsen, N Bagheri, L Wei
Australasian Conference on Information Security and Privacy, 428-432, 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–7