Skyfire: Data-driven seed generation for fuzzing J Wang, B Chen, L Wei, Y Liu 2017 IEEE Symposium on Security and Privacy (SP), 579-594, 2017 | 377 | 2017 |
Superion: Grammar-aware greybox fuzzing J Wang, B Chen, L Wei, Y Liu 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 234 | 2019 |
Unaligned Rebound Attack: Application to Keccak A Duc, J Guo, T Peyrin, L Wei Fast Software Encryption, 402-421, 2012 | 76 | 2012 |
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster) L Wei, C Rechberger, J Guo, H Wu, H Wang, S Ling Information Security and Privacy, 433-438, 2011 | 68 | 2011 |
On the (in) security of IDEA in various hashing modes L Wei, T Peyrin, P Sokołowski, S Ling, J Pieprzyk, H Wang International Workshop on Fast Software Encryption, 163-179, 2012 | 19 | 2012 |
On multidimensional linear cryptanalysis PH Nguyen, L Wei, H Wang, S Ling Australasian Conference on Information Security and Privacy, 37-52, 2010 | 10 | 2010 |
Extensions of the cube attack based on low degree annihilators A Zhang, CW Lim, K Khoo, L Wei, J Pieprzyk International Conference on Cryptology and Network Security, 87-102, 2009 | 9 | 2009 |
Improved security analysis of Fugue-256 (poster) P Gauravaram, LR Knudsen, N Bagheri, L Wei Australasian Conference on Information Security and Privacy, 428-432, 2011 | 1 | 2011 |