Gaoli Wang

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
New records in collision attacks on SHA-22024-11-12Paper
A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH2024-10-16Paper
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Algebraic meet-in-the-middle attack on LowMC
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Improved differential-linear attack with application to round-reduced Speck32/642022-11-09Paper
Related-key impossible-differential attack on reduced-round \textsc{Skinny}2022-07-01Paper
Fast chosen-key distinguish attacks on round-reduced AES-1922020-05-27Paper
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
Designs, Codes and Cryptography
2020-05-21Paper
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
Designs, Codes and Cryptography
2020-05-21Paper
Efficient collision attack frameworks for RIPEMD-1602020-03-09Paper
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes2019-02-20Paper
Collisions and semi-free-start collisions for round-reduced RIPEMD-1602018-04-06Paper
Boomerang and slide-rotational analysis of the SM3 hash function
Selected Areas in Cryptography
2015-12-04Paper
(Pseudo-)preimage attacks on step-reduced HAS-160 and RIPEMD-160
Lecture Notes in Computer Science
2015-11-03Paper
Practical collision attack on 40-step RIPEMD-128
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
Journal of Computer Science and Technology
2014-02-11Paper
Preimage and pseudo-collision attacks on step-reduced SM3 hash function
Information Processing Letters
2013-06-28Paper
Improved boomerang attacks on SM3
Information Security and Privacy
2013-06-28Paper
Distinguishing attacks on LPMAC based on the full RIPEMD and reduced-step RIPEMD-\(\{256,320\}\)
Information Security and Cryptology
2011-07-29Paper
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
The Delicate Issues of Addition with Respect to XOR Differences
Selected Areas in Cryptography
2008-03-25Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper


Research outcomes over time


This page was built for person: Gaoli Wang