Gaoli Wang

From MaRDI portal
Person:1726665



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
New records in collision attacks on SHA-22024-11-12Paper
A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH2024-10-16Paper
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Algebraic meet-in-the-middle attack on LowMC
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Improved differential-linear attack with application to round-reduced Speck32/642022-11-09Paper
Related-key impossible-differential attack on reduced-round \textsc{Skinny}2022-07-01Paper
Fast chosen-key distinguish attacks on round-reduced AES-1922020-05-27Paper
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
Designs, Codes and Cryptography
2020-05-21Paper
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
Designs, Codes and Cryptography
2020-05-21Paper
Efficient collision attack frameworks for RIPEMD-1602020-03-09Paper
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes2019-02-20Paper
Collisions and semi-free-start collisions for round-reduced RIPEMD-1602018-04-06Paper
Boomerang and slide-rotational analysis of the SM3 hash function
Selected Areas in Cryptography
2015-12-04Paper
(Pseudo-)preimage attacks on step-reduced HAS-160 and RIPEMD-160
Lecture Notes in Computer Science
2015-11-03Paper
Practical collision attack on 40-step RIPEMD-128
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
Journal of Computer Science and Technology
2014-02-11Paper
Preimage and pseudo-collision attacks on step-reduced SM3 hash function
Information Processing Letters
2013-06-28Paper
Improved boomerang attacks on SM3
Information Security and Privacy
2013-06-28Paper
Distinguishing attacks on LPMAC based on the full RIPEMD and reduced-step RIPEMD-\(\{256,320\}\)
Information Security and Cryptology
2011-07-29Paper
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
The Delicate Issues of Addition with Respect to XOR Differences
Selected Areas in Cryptography
2008-03-25Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper


Research outcomes over time


This page was built for person: Gaoli Wang