


default search action
Yuechuan Wei
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c13]Zichen Zhou, Yuechuan Wei, Shen Fang:
Progress Review of Wide-Band Common-Mode Filter in High Speed Interconnect System. ICCCS 2023: 131-137 - 2022
- [j11]Liqiang Wu
, Ming Xu, Shaojing Fu
, Yuchuan Luo
, Yuechuan Wei:
FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid. IEEE Internet Things J. 9(7): 5254-5265 (2022) - [j10]Lipeng Chang, Yuechuan Wei, Xiangru Wang, Xiaozhong Pan:
Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing. Symmetry 14(7): 1434 (2022) - [c12]Shuiyu He, Yuechuan Wei, Lipeng Chang, Feng Pan:
Integral Distinguisher Search of SLIM Algorithm Based on Bit-Based Division Property. CAIBDA 2022: 1-5 - 2021
- [c11]Zichen Zhou, Yuechuan Wei:
The Influence of Automatic Gain Control on Narrowband Frequency Domain GPS Anti-Jamming Receiver. ICCT 2021: 497-501
2010 – 2019
- 2019
- [j9]Yuechuan Wei
, Peng Xu, Yisheng Rong:
Related-key impossible differential cryptanalysis on lightweight cipher TWINE. J. Ambient Intell. Humaniz. Comput. 10(2): 509-517 (2019) - [c10]Haiyan Xiao, Lifang Wang, Yuechuan Wei:
A New Fair Electronic Contract Signing Protocol. INCoS 2019: 289-295 - 2018
- [j8]Hailong Song, Yuechuan Wei:
Integral cryptanalysis of SPN ciphers with binary permutations. Sci. China Inf. Sci. 61(1): 019101:1-019101:3 (2018) - [j7]Yuechuan Wei, Yisheng Rong, Cunyang Fan:
Differential Fault Attacks on Lightweight Cipher LBlock. Fundam. Informaticae 157(1-2): 125-139 (2018) - 2017
- [c9]Lu Cheng, Xiaozhong Pan, Yuechuan Wei, Liqun Lv:
Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE. EIDWT 2017: 222-232 - 2016
- [j6]Yuechuan Wei, Yisheng Rong, Xu An Wang
:
Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack. Int. J. Technol. Hum. Interact. 12(2): 60-71 (2016) - [c8]Lu Cheng, Peng Xu, Yuechuan Wei:
New Related-Key Impossible Differential Attack on MIBS-80. INCoS 2016: 203-206 - [c7]Yuechuan Wei, Yisheng Rong, Xu An Wang
:
New Differential Fault Attack on Lightweight Cipher LBlock. INCoS 2016: 285-288 - [c6]Yang Su, Yuechuan Wei, Mingshu Zhang:
Research and Design of Dedicated Instruction for Reconfigurable Matrix Multiplication of VLIW Processor. INCoS 2016: 324-327 - 2015
- [j5]Zhen Liu, Xiaoyuan Yang, Feng Pan, Yuechuan Wei:
CCA-secure publicly verifiable public key encryption scheme without pairings. Int. J. Grid Util. Comput. 6(2): 74-82 (2015) - [j4]Xu An Wang
, Jianfeng Ma, Xiaoyuan Yang, Yuechuan Wei:
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks. Trans. Comput. Collect. Intell. 19: 69-88 (2015) - [c5]Shuaishuai Zhu, Yiliang Han, Yuechuan Wei:
Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption. INCoS 2015: 257-261 - [c4]Yuechuan Wei:
Bit-pattern Based Integral Attack on ICEBERG. INCoS 2015: 370-373 - 2014
- [j3]Yisheng Rong, Yuechuan Wei:
A flux vector splitting scheme for low Mach number flows in preconditioning method. Appl. Math. Comput. 242: 296-308 (2014) - [j2]Yuechuan Wei, Xiaoyuan Yang, Chao Li:
Impossible differential cryptanalysis on cipher E2. Concurr. Comput. Pract. Exp. 26(8): 1477-1489 (2014) - 2012
- [j1]Yuechuan Wei, Chao Li, Dan Cao:
Improved Related-Key Rectangle Attack on the Full has-160 Encryption Mode. Int. J. Found. Comput. Sci. 23(3): 733-747 (2012) - [c3]Yuechuan Wei, Xiaoyuan Yang, Chao Li, Weidong Du:
Impossible Differential Cryptanalysis on Tweaked E2. NSS 2012: 392-404 - 2011
- [c2]Yuechuan Wei, Chao Li, Bing Sun:
Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0. WorldCIS 2011: 227-232 - 2010
- [c1]Yuechuan Wei, Ping Li, Bing Sun, Chao Li:
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. ACNS 2010: 105-122
2000 – 2009
- 2009
- [i1]Yuechuan Wei, Bing Sun, Chao Li:
New Integral Distinguisher for Rijndael-256. IACR Cryptol. ePrint Arch. 2009: 559 (2009)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint