Gaoli Wang
Gaoli Wang
Verified email at - Homepage
Cited by
Cited by
The second-preimage attack on MD4
H Yu, G Wang, G Zhang, X Wang
International Conference on Cryptology and Network Security, 1-12, 2005
Differential fault analysis on PRESENT key schedule
G Wang, S Wang
Computational Intelligence and Security (CIS), 2010 International Conference …, 2010
Related-key impossible-differential attack on reduced-round SKINNY
R Ankele, S Banik, A Chakraborti, E List, F Mendel, SM Sim, G Wang
International Conference on Applied Cryptography and Network Security, 208-228, 2017
Boomerang and slide-rotational analysis of the SM3 hash function
A Kircanski, Y Shen, G Wang, AM Youssef
International Conference on Selected Areas in Cryptography, 304-320, 2012
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256
D Bai, H Yu, G Wang, X Wang
IET Information Security 9 (3), 167-178, 2014
The delicate issues of addition with respect to XOR differences
G Wang, N Keller, O Dunkelman
International Workshop on Selected Areas in Cryptography, 212-231, 2007
Related-key rectangle attack on 43-round SHACAL-2
G Wang
International Conference on Information Security Practice and Experience, 33-42, 2007
Preimage attack on hash function RIPEMD
G Wang, S Wang
International Conference on Information Security Practice and Experience …, 2009
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function.
G Wang, Y Shen
Inf. Process. Lett. 113 (8), 301-306, 2013
Improved boomerang attacks on SM3
D Bai, H Yu, G Wang, X Wang
Australasian Conference on Information Security and Privacy, 251-266, 2013
Integral cryptanalysis of reduced-round MIBS block cipher
GL Wang, SHX Wang
Journal of Chinese Computer Systems 33 (4), 773-777, 2012
Improved Preimage Attacks on RIPEMD-160 and HAS-160.
Y Shen, G Wang
KSII Transactions on Internet & Information Systems 12 (2), 2018
Cryptanalysis of 48-step RIPEMD-160
G Wang, Y Shen, F Liu
IACR Transactions on Symmetric Cryptology 2017 (2), 177-202, 2017
A hybrid authenticated group key agreement protocol in wireless sensor networks
Y Li, D Chen, W Li, G Wang, P Smith
International Journal of Distributed Sensor Networks 9 (4), 716265, 2013
Cryptanalysis of reduced RIPEMD-128
G Wang, M Wang
Journal of Software 19 (9), 2442-2448, 2008
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160
F Liu, F Mendel, G Wang
International Conference on the Theory and Application of Cryptology and …, 2017
Single key recovery attacks on reduced AES-192 and Kalyna-128/256
G Wang, C Zhu
Science China Information Sciences 60 (9), 099101, 2017
Practical collision attack on 40-step RIPEMD-128
G Wang
Cryptographers’ Track at the RSA Conference, 444-460, 2014
Improved cryptanalysis on RIPEMD-128
G Wang, H Yu
IET Information Security 9 (6), 354-364, 2015
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160
G Wang, Y Shen
International Conference on Information Security, 90-103, 2014
The system can't perform the operation now. Try again later.
Articles 1–20