Follow
Lei Wei
Title
Cited by
Cited by
Year
Skyfire: Data-driven seed generation for fuzzing
J Wang, B Chen, L Wei, Y Liu
2017 IEEE Symposium on Security and Privacy (SP), 579-594, 2017
3752017
Superion: Grammar-aware greybox fuzzing
J Wang, B Chen, L Wei, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
2322019
Unaligned Rebound Attack: Application to Keccak
A Duc, J Guo, T Peyrin, L Wei
Fast Software Encryption, 402-421, 2012
762012
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
L Wei, C Rechberger, J Guo, H Wu, H Wang, S Ling
Information Security and Privacy, 433-438, 2011
682011
On the (in) security of IDEA in various hashing modes
L Wei, T Peyrin, P Sokołowski, S Ling, J Pieprzyk, H Wang
International Workshop on Fast Software Encryption, 163-179, 2012
192012
On multidimensional linear cryptanalysis
PH Nguyen, L Wei, H Wang, S Ling
Australasian Conference on Information Security and Privacy, 37-52, 2010
102010
Extensions of the cube attack based on low degree annihilators
A Zhang, CW Lim, K Khoo, L Wei, J Pieprzyk
International Conference on Cryptology and Network Security, 87-102, 2009
92009
Improved security analysis of Fugue-256 (poster)
P Gauravaram, LR Knudsen, N Bagheri, L Wei
Australasian Conference on Information Security and Privacy, 428-432, 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–8