default search action
Gaoli Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Gao Wang, Gaoli Wang, Siwei Sun:
Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis. IEICE Trans. Inf. Syst. 107(8): 1016-1028 (2024) - [j29]Gao Wang, Gaoli Wang, Siwei Sun:
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis. IET Inf. Secur. 2024(1) (2024) - [j28]Gao Wang, Gaoli Wang, Siwei Sun:
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis. IET Inf. Secur. 2024(1) (2024) - [j27]Gao Wang, Gaoli Wang:
Keeping classical distinguisher and neural distinguisher in balance. J. Inf. Secur. Appl. 84: 103816 (2024) - [j26]Zhenzhen Guo, Gaoli Wang, Yingxin Li, Jianqiang Ni, Guoyan Zhang:
Attribute-Based Data Sharing Scheme Using Blockchain for 6G-Enabled VANETs. IEEE Trans. Mob. Comput. 23(4): 3343-3360 (2024) - [c27]Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on SHA-2. EUROCRYPT (1) 2024: 158-186 - [i14]Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on SHA-2. IACR Cryptol. ePrint Arch. 2024: 349 (2024) - [i13]Yingxin Li, Fukang Liu, Gaoli Wang:
Automating Collision Attacks on RIPEMD-160. IACR Cryptol. ePrint Arch. 2024: 350 (2024) - 2023
- [j25]Zhenzhen Guo, Gaoli Wang, Yingxin Li, Jianqiang Ni, Runmeng Du, Miao Wang:
Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network. IEEE Internet Things J. 10(8, April 15): 7011-7026 (2023) - [j24]Zhenzhen Guo, Gaoli Wang, Guoyan Zhang, Yingxin Li, Jianqiang Ni:
A Multifactor Combined Data Sharing Scheme for Vehicular Fog Computing Using Blockchain. IEEE Internet Things J. 10(22): 20049-20064 (2023) - [j23]Zhenzhen Guo, Gaoli Wang, Orr Dunkelman, Yinxue Pan, Shengyuan Liu:
Tweakable SM4: How to tweak SM4 into tweakable block ciphers? J. Inf. Secur. Appl. 72: 103406 (2023) - [j22]Jianqiang Ni, Jianhui Zhang, Gaoli Wang, Rui Li, Yanzhao Shen:
Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol. Symmetry 15(8): 1563 (2023) - [j21]Yingxin Li, Fukang Liu, Gaoli Wang:
Automating Collision Attacks on RIPEMD-160. IACR Trans. Symmetric Cryptol. 2023(4): 112-142 (2023) - [c26]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. EUROCRYPT (4) 2023: 189-219 - [c25]Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH. SAC 2023: 22-42 - [i12]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. IACR Cryptol. ePrint Arch. 2023: 277 (2023) - [i11]Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on RIPEMD-160 and SHA-256. IACR Cryptol. ePrint Arch. 2023: 285 (2023) - [i10]Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH. IACR Cryptol. ePrint Arch. 2023: 865 (2023) - 2022
- [j20]Yanzhao Shen, Ting Wu, Gaoli Wang, Xinfeng Dong, Haifeng Qian:
Improved Collision Detection Of MD5 Using Sufficient Condition Combination. Comput. J. 65(10): 2720-2729 (2022) - [j19]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences. IACR Trans. Symmetric Cryptol. 2022(3): 152-190 (2022) - [c24]Feifan Wang, Gaoli Wang:
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64. ACNS 2022: 792-808 - [c23]Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. ASIACRYPT (1) 2022: 225-255 - [c22]Huimin Tang, Nianming Xue, Gaoli Wang:
Differentially Private Decentralized Traffic Flow Prediction Approach based on Federated Learning. ICIT 2022: 280-285 - [i9]Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. IACR Cryptol. ePrint Arch. 2022: 19 (2022) - 2021
- [j18]Gaoli Wang, Zhenfu Cao, Xiaolei Dong:
Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. Comput. J. 64(8): 1264-1276 (2021) - [c21]Gao Wang, Gaoli Wang:
Improved Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Analysis. ICICS (2) 2021: 21-38 - [c20]Gao Wang, Gaoli Wang, Yu He:
Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers. TrustCom 2021: 164-171 - [i8]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
Finding Practical Distinguishers for ZUC-256 Using Modular Differences. IACR Cryptol. ePrint Arch. 2021: 1104 (2021) - 2020
- [j17]Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren:
Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things. IEEE Access 8: 20920-20930 (2020) - [j16]Gaoli Wang, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig:
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. Des. Codes Cryptogr. 88(5): 887-930 (2020) - [j15]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020) - [j14]Shiqiang Zhu, Gaoli Wang, Yu He, Haifeng Qian:
Integral Attacks on Some Lightweight Block Ciphers. KSII Trans. Internet Inf. Syst. 14(11): 4502-4521 (2020)
2010 – 2019
- 2019
- [j13]Gaoli Wang, Zhenfu Cao, Xiaolei Dong:
Improved Fault-Tolerant Aggregate Signatures. Comput. J. 62(4): 481-489 (2019) - [j12]Lele Chen, Gaoli Wang, Guoyan Zhang:
MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. Comput. J. 62(12): 1805-1821 (2019) - [j11]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol. 2019(3): 169-192 (2019) - [c19]Chunbo Zhu, Gaoli Wang, Boyu Zhu:
Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192. ACISP 2019: 573-587 - [c18]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO (2) 2019: 117-149 - [c17]Fukang Liu, Zhenfu Cao, Gaoli Wang:
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. IWSEC 2019: 287-305 - [i7]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2019: 668 (2019) - [i6]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule. IACR Cryptol. ePrint Arch. 2019: 714 (2019) - 2018
- [j10]Yanzhao Shen, Gaoli Wang:
Improved Preimage Attacks on RIPEMD-160 and HAS-160. KSII Trans. Internet Inf. Syst. 12(2): 727-746 (2018) - [c16]Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang:
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. SAC 2018: 92-114 - 2017
- [j9]Gaoli Wang, Chunbo Zhu:
Single key recovery attacks on reduced AES-192 and Kalyna-128/256. Sci. China Inf. Sci. 60(9): 99101 (2017) - [j8]Yongpeng Zhou, Gaoli Wang:
改进的MD4有意义碰撞攻击 (Improved Meaningful Collision Attack on MD4). 计算机科学 44(9): 168-171 (2017) - [j7]Gaoli Wang, Yanzhao Shen, Fukang Liu:
Cryptanalysis of 48-step RIPEMD-160. IACR Trans. Symmetric Cryptol. 2017(2): 177-202 (2017) - [c15]Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round Skinny. ACNS 2017: 208-228 - [c14]Fukang Liu, Florian Mendel, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. ASIACRYPT (1) 2017: 158-186 - [i5]Fukang Liu, Florian Mendel, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2017: 800 (2017) - 2016
- [i4]Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. IACR Cryptol. ePrint Arch. 2016: 1127 (2016) - 2015
- [j6]Yu Sasaki, Gaoli Wang, Lei Wang:
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 26-38 (2015) - [j5]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. IET Inf. Secur. 9(3): 167-178 (2015) - [j4]Gaoli Wang, Hongbo Yu:
Improved cryptanalysis on RIPEMD-128. IET Inf. Secur. 9(6): 354-364 (2015) - 2014
- [c13]Gaoli Wang:
Practical Collision Attack on 40-Step RIPEMD-128. CT-RSA 2014: 444-460 - [c12]Gaoli Wang, Yanzhao Shen:
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160. ISC 2014: 90-103 - 2013
- [j3]Yue Li, Dehua Chen, Wei Li, Gaoli Wang, Paul Smith:
A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j2]Gaoli Wang, Yanzhao Shen:
Preimage and pseudo-collision attacks on step-reduced SM3 hash function. Inf. Process. Lett. 113(8): 301-306 (2013) - [j1]Gaoli Wang:
Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD. J. Comput. Sci. Technol. 28(1): 129-143 (2013) - [c11]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved Boomerang Attacks on SM3. ACISP 2013: 251-266 - [i3]Gaoli Wang:
Practical collision attack on 40-step RIPEMD-128. IACR Cryptol. ePrint Arch. 2013: 122 (2013) - [i2]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256. IACR Cryptol. ePrint Arch. 2013: 852 (2013) - 2012
- [c10]Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang, Amr M. Youssef:
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. Selected Areas in Cryptography 2012: 304-320 - [i1]Gaoli Wang, Yanzhao Shen:
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function. IACR Cryptol. ePrint Arch. 2012: 640 (2012) - 2011
- [c9]Gaoli Wang:
Collision Attack for the Hash Function Extended MD4. ICICS 2011: 228-241 - 2010
- [c8]Gaoli Wang, Shaohui Wang:
Differential Fault Analysis on PRESENT Key Schedule. CIS 2010: 362-366 - [c7]Gaoli Wang, Shaohui Wang:
Improved Differential Cryptanalysis of Serpent. CIS 2010: 367-371 - [c6]Gaoli Wang:
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}. Inscrypt 2010: 199-217
2000 – 2009
- 2009
- [c5]Gaoli Wang, Shaohui Wang:
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. AFRICACRYPT 2009: 1-13 - [c4]Gaoli Wang, Shaohui Wang:
Preimage Attack on Hash Function RIPEMD. ISPEC 2009: 274-284 - 2007
- [c3]Gaoli Wang:
Related-Key Rectangle Attack on 43-Round SHACAL-2. ISPEC 2007: 33-42 - [c2]Gaoli Wang, Nathan Keller, Orr Dunkelman:
The Delicate Issues of Addition with Respect to XOR Differences. Selected Areas in Cryptography 2007: 212-231 - 2005
- [c1]Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang:
The Second-Preimage Attack on MD4. CANS 2005: 1-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint