| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2010 | Finding Preimages of Tiger Up to 23 Steps | fse | 116-133 |
| 2 | 2010 | Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl | asiacrypt | 38-55 |
| 3 | 2009 | How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd Hashing by Adopting Indifferentiability | eprint | online |
| 4 | 2009 | Davies-Meyer Merkle-Damg{\aa}rd Revisited:\\Variants of Indifferentiability and Random Oracles | eprint | online |
| 5 | 2009 | Preimages for Step-Reduced SHA-2 | asiacrypt | 578-597 |
| 6 | 2009 | How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! | asiacrypt | 382-398 |
| 7 | 2008 | New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | eurocrypt | 237-253 |
| 8 | 2007 | New Message Difference for MD4 | fse | 329-348 |
Coauthors of Lei Wang |