What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gaoli Wang
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
New Collision Attacks on Round-Reduced SHA-512.
Yingxin Li
Fukang Liu
Gaoli Wang
Haifeng Qian
Keting Jia
Xiangyu Kong
2025
journals/tosc
Linear Cancellations in the MitM Attacks on Sponge Functions.
Lingyue Qin
Boxin Zhao
Qingliang Hou
Keting Jia
Gaoli Wang
Xiaoyang Dong
2024
journals/istr
Keeping classical distinguisher and neural distinguisher in balance.
Gao Wang
Gaoli Wang
2024
conf/eurocrypt
New Records in Collision Attacks on SHA-2.
Yingxin Li
Fukang Liu
Gaoli Wang
2024
conf/asiacrypt
The First Practical Collision for 31-Step SHA-256.
Yingxin Li
Fukang Liu
Gaoli Wang
Xiaoyang Dong
Siwei Sun
2023
journals/istr
Tweakable SM4: How to tweak SM4 into tweakable block ciphers?
Zhenzhen Guo
Gaoli Wang
Orr Dunkelman
Yinxue Pan
Shengyuan Liu
2023
journals/tosc
Automating Collision Attacks on RIPEMD-160.
Yingxin Li
Fukang Liu
Gaoli Wang
2023
conf/eurocrypt
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
Fukang Liu
Gaoli Wang
Santanu Sarkar
Ravi Anand
Willi Meier
Yingxin Li
Takanori Isobe
2023
conf/sacrypt
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH.
Xiaorui Yu
Fukang Liu
Gaoli Wang
Siwei Sun
Willi Meier
2022
journals/tosc
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
Fukang Liu
Willi Meier
Santanu Sarkar
Gaoli Wang
Ryoma Ito
Takanori Isobe
2022
conf/acns
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64.
Feifan Wang
Gaoli Wang
2022
conf/asiacrypt
Algebraic Meet-in-the-Middle Attack on LowMC.
Fukang Liu
Santanu Sarkar
Gaoli Wang
Willi Meier
Takanori Isobe
2021
conf/icics
Improved Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Analysis.
Gao Wang
Gaoli Wang
2019
journals/tosc
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/acisp
Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192.
Chunbo Zhu
Gaoli Wang
Boyu Zhu
2019
conf/crypto
Efficient Collision Attack Frameworks for RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/iwsec
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm.
Fukang Liu
Zhenfu Cao
Gaoli Wang
2018
conf/sacrypt
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes.
Yunwen Liu
Yu Sasaki
Ling Song
Gaoli Wang
2017
journals/tosc
Cryptanalysis of 48-step RIPEMD-160.
Gaoli Wang
Yanzhao Shen
Fukang Liu
2017
conf/acns
Related-Key Impossible-Differential Attack on Reduced-Round Skinny.
Ralph Ankele
Subhadeep Banik
Avik Chakraborti
Eik List
Florian Mendel
Siang Meng Sim
Gaoli Wang
2017
conf/asiacrypt
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160.
Fukang Liu
Florian Mendel
Gaoli Wang
2014
conf/ctrsa
Practical Collision Attack on 40-Step RIPEMD-128.
Gaoli Wang
2013
conf/acisp
Improved Boomerang Attacks on SM3.
Dongxia Bai
Hongbo Yu
Gaoli Wang
Xiaoyun Wang
2012
conf/sacrypt
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.
Aleksandar Kircanski
Yanzhao Shen
Gaoli Wang
Amr M. Youssef
2011
conf/icics
Collision Attack for the Hash Function Extended MD4.
Gaoli Wang
2009
conf/africacrypt
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.
Gaoli Wang
Shaohui Wang
2007
conf/sacrypt
The Delicate Issues of Addition with Respect to XOR Differences.
Gaoli Wang
Nathan Keller
Orr Dunkelman
2005
conf/cans
The Second-Preimage Attack on MD4.
Hongbo Yu
Gaoli Wang
Guoyan Zhang
Xiaoyun Wang
Coauthors
Aleksandar Kircanski
(1)
Amr M. Youssef
(1)
Avik Chakraborti
(1)
Boxin Zhao
(1)
Boyu Zhu
(1)
Christoph Dobraunig
(2)
Chunbo Zhu
(1)
Dongxia Bai
(1)
Eik List
(1)
Feifan Wang
(1)
Florian Mendel
(4)
Fukang Liu
(13)
Gao Wang
(2)
Gaoli Wang
(28)
Guoyan Zhang
(1)
Haifeng Qian
(1)
Hongbo Yu
(2)
Keting Jia
(2)
Ling Song
(1)
Lingyue Qin
(1)
Nathan Keller
(1)
Orr Dunkelman
(2)
Qingliang Hou
(1)
Ralph Ankele
(1)
Ravi Anand
(1)
Ryoma Ito
(1)
Santanu Sarkar
(3)
Shaohui Wang
(1)
Shengyuan Liu
(1)
Siang Meng Sim
(1)
Siwei Sun
(2)
Subhadeep Banik
(1)
Takanori Isobe
(5)
Willi Meier
(4)
Xiangyu Kong
(1)
Xiaorui Yu
(1)
Xiaoyang Dong
(2)
Xiaoyun Wang
(2)
Yanzhao Shen
(2)
Yingxin Li
(5)
Yinxue Pan
(1)
Yu Sasaki
(1)
Yunwen Liu
(1)
Zhenfu Cao
(3)
Zhenzhen Guo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to