BibTeX records: Gaoli Wang

download as .bib file

@article{DBLP:journals/tmc/GuoWLNZ24,
  author       = {Zhenzhen Guo and
                  Gaoli Wang and
                  Yingxin Li and
                  Jianqiang Ni and
                  Guoyan Zhang},
  title        = {Attribute-Based Data Sharing Scheme Using Blockchain for 6G-Enabled
                  VANETs},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {4},
  pages        = {3343--3360},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3273222},
  doi          = {10.1109/TMC.2023.3273222},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/GuoWLNZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLW24,
  author       = {Yingxin Li and
                  Fukang Liu and
                  Gaoli Wang},
  title        = {New Records in Collision Attacks on {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/349},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLW24a,
  author       = {Yingxin Li and
                  Fukang Liu and
                  Gaoli Wang},
  title        = {Automating Collision Attacks on {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/350},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLW24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GuoWLNDW23,
  author       = {Zhenzhen Guo and
                  Gaoli Wang and
                  Yingxin Li and
                  Jianqiang Ni and
                  Runmeng Du and
                  Miao Wang},
  title        = {Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain
                  for Vehicular Ad Hoc Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {8, April 15},
  pages        = {7011--7026},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3228550},
  doi          = {10.1109/JIOT.2022.3228550},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GuoWLNDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GuoWZLN23,
  author       = {Zhenzhen Guo and
                  Gaoli Wang and
                  Guoyan Zhang and
                  Yingxin Li and
                  Jianqiang Ni},
  title        = {A Multifactor Combined Data Sharing Scheme for Vehicular Fog Computing
                  Using Blockchain},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {22},
  pages        = {20049--20064},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3282672},
  doi          = {10.1109/JIOT.2023.3282672},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/GuoWZLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoWDPL23,
  author       = {Zhenzhen Guo and
                  Gaoli Wang and
                  Orr Dunkelman and
                  Yinxue Pan and
                  Shengyuan Liu},
  title        = {Tweakable {SM4:} How to tweak {SM4} into tweakable block ciphers?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103406},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103406},
  doi          = {10.1016/J.JISA.2022.103406},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoWDPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/NiZWLS23,
  author       = {Jianqiang Ni and
                  Jianhui Zhang and
                  Gaoli Wang and
                  Rui Li and
                  Yanzhao Shen},
  title        = {Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive
                  with the Legendre Symbol},
  journal      = {Symmetry},
  volume       = {15},
  number       = {8},
  pages        = {1563},
  year         = {2023},
  url          = {https://doi.org/10.3390/sym15081563},
  doi          = {10.3390/SYM15081563},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/NiZWLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiLW23,
  author       = {Yingxin Li and
                  Fukang Liu and
                  Gaoli Wang},
  title        = {Automating Collision Attacks on {RIPEMD-160}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {112--142},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.112-142},
  doi          = {10.46586/TOSC.V2023.I4.112-142},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LiuWSAMLI23,
  author       = {Fukang Liu and
                  Gaoli Wang and
                  Santanu Sarkar and
                  Ravi Anand and
                  Willi Meier and
                  Yingxin Li and
                  Takanori Isobe},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Analysis of {RIPEMD-160:} New Collision Attacks and Finding Characteristics
                  with {MILP}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {189--219},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_7},
  doi          = {10.1007/978-3-031-30634-1\_7},
  timestamp    = {Thu, 20 Apr 2023 11:35:02 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LiuWSAMLI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/YuLWSM23,
  author       = {Xiaorui Yu and
                  Fukang Liu and
                  Gaoli Wang and
                  Siwei Sun and
                  Willi Meier},
  editor       = {Claude Carlet and
                  Kalikinkar Mandal and
                  Vincent Rijmen},
  title        = {A Closer Look at the S-Box: Deeper Analysis of Round-Reduced {ASCON-HASH}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference,
                  Fredericton, Canada, August 14-18, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14201},
  pages        = {22--42},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-53368-6\_2},
  doi          = {10.1007/978-3-031-53368-6\_2},
  timestamp    = {Tue, 05 Mar 2024 11:21:46 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/YuLWSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWSAMLI23,
  author       = {Fukang Liu and
                  Gaoli Wang and
                  Santanu Sarkar and
                  Ravi Anand and
                  Willi Meier and
                  Yingxin Li and
                  Takanori Isobe},
  title        = {Analysis of {RIPEMD-160:} New Collision Attacks and Finding Characteristics
                  with {MILP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/277},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWSAMLI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLW23,
  author       = {Yingxin Li and
                  Fukang Liu and
                  Gaoli Wang},
  title        = {New Records in Collision Attacks on {RIPEMD-160} and {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/285},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuLWSM23,
  author       = {Xiaorui Yu and
                  Fukang Liu and
                  Gaoli Wang and
                  Siwei Sun and
                  Willi Meier},
  title        = {A Closer Look at the S-box: Deeper Analysis of Round-Reduced {ASCON-HASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {865},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/865},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuLWSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Shen0WDQ22,
  author       = {Yanzhao Shen and
                  Ting Wu and
                  Gaoli Wang and
                  Xinfeng Dong and
                  Haifeng Qian},
  title        = {Improved Collision Detection Of {MD5} Using Sufficient Condition Combination},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {10},
  pages        = {2720--2729},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxab109},
  doi          = {10.1093/COMJNL/BXAB109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Shen0WDQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuMSWII22,
  author       = {Fukang Liu and
                  Willi Meier and
                  Santanu Sarkar and
                  Gaoli Wang and
                  Ryoma Ito and
                  Takanori Isobe},
  title        = {New Cryptanalysis of {ZUC-256} Initialization Using Modular Differences},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {152--190},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.152-190},
  doi          = {10.46586/TOSC.V2022.I3.152-190},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuMSWII22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangW22,
  author       = {Feifan Wang and
                  Gaoli Wang},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Improved Differential-Linear Attack with Application to Round-Reduced
                  Speck32/64},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {792--808},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_39},
  doi          = {10.1007/978-3-031-09234-3\_39},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WangW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiuSWMI22,
  author       = {Fukang Liu and
                  Santanu Sarkar and
                  Gaoli Wang and
                  Willi Meier and
                  Takanori Isobe},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Algebraic Meet-in-the-Middle Attack on LowMC},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  pages        = {225--255},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3\_8},
  doi          = {10.1007/978-3-031-22963-3\_8},
  timestamp    = {Fri, 03 Feb 2023 17:07:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuSWMI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icit/TangXW22,
  author       = {Huimin Tang and
                  Nianming Xue and
                  Gaoli Wang},
  title        = {Differentially Private Decentralized Traffic Flow Prediction Approach
                  based on Federated Learning},
  booktitle    = {Proceedings of the 2022 10th International Conference on Information
                  Technology: IoT and Smart City, {ICIT} 2022, Shanghai, China, December
                  23-25, 2022},
  pages        = {280--285},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3582197.3582244},
  doi          = {10.1145/3582197.3582244},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icit/TangXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWMSI22,
  author       = {Fukang Liu and
                  Gaoli Wang and
                  Willi Meier and
                  Santanu Sarkar and
                  Takanori Isobe},
  title        = {Algebraic Meet-in-the-Middle Attack on LowMC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/019},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWMSI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangCD21,
  author       = {Gaoli Wang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Improved File-injection Attacks on Searchable Encryption Using Finite
                  Set Theory},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {8},
  pages        = {1264--1276},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa161},
  doi          = {10.1093/COMJNL/BXAA161},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangW21,
  author       = {Gao Wang and
                  Gaoli Wang},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Improved Differential-ML Distinguisher: Machine Learning Based Generic
                  Extension for Differential Analysis},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12919},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88052-1\_2},
  doi          = {10.1007/978-3-030-88052-1\_2},
  timestamp    = {Tue, 21 Sep 2021 19:14:09 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WangW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWH21,
  author       = {Gao Wang and
                  Gaoli Wang and
                  Yu He},
  title        = {Improved Machine Learning Assisted (Related-key) Differential Distinguishers
                  For Lightweight Ciphers},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {164--171},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00039},
  doi          = {10.1109/TRUSTCOM53373.2021.00039},
  timestamp    = {Sun, 13 Mar 2022 10:52:35 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuM0W0021,
  author       = {Fukang Liu and
                  Willi Meier and
                  Santanu Sarkar and
                  Gaoli Wang and
                  Ryoma Ito and
                  Takanori Isobe},
  title        = {Finding Practical Distinguishers for {ZUC-256} Using Modular Differences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1104},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1104},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuM0W0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HeWLR20,
  author       = {Yu He and
                  Gaoli Wang and
                  Wenshan Li and
                  Yizhi Ren},
  title        = {Improved Cube Attacks on Some Authenticated Encryption Ciphers and
                  Stream Ciphers in the Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {20920--20930},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2967070},
  doi          = {10.1109/ACCESS.2020.2967070},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HeWLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangLCMD20,
  author       = {Gaoli Wang and
                  Fukang Liu and
                  Binbin Cui and
                  Florian Mendel and
                  Christoph Dobraunig},
  title        = {Improved (semi-free-start/near-) collision and distinguishing attacks
                  on round-reduced {RIPEMD-160}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {887--930},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00718-x},
  doi          = {10.1007/S10623-020-00718-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangLCMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoDMJW20,
  author       = {Boxin Zhao and
                  Xiaoyang Dong and
                  Willi Meier and
                  Keting Jia and
                  Gaoli Wang},
  title        = {Generalized related-key rectangle attacks on block ciphers with linear
                  key schedule: applications to {SKINNY} and {GIFT}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1103--1126},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00730-1},
  doi          = {10.1007/S10623-020-00730-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoDMJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZhuWHQ20,
  author       = {Shiqiang Zhu and
                  Gaoli Wang and
                  Yu He and
                  Haifeng Qian},
  title        = {Integral Attacks on Some Lightweight Block Ciphers},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {14},
  number       = {11},
  pages        = {4502--4521},
  year         = {2020},
  url          = {https://doi.org/10.3837/tiis.2020.11.014},
  doi          = {10.3837/TIIS.2020.11.014},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/ZhuWHQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangCD19,
  author       = {Gaoli Wang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Improved Fault-Tolerant Aggregate Signatures},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {4},
  pages        = {481--489},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxy108},
  doi          = {10.1093/COMJNL/BXY108},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenWZ19,
  author       = {Lele Chen and
                  Gaoli Wang and
                  Guoyan Zhang},
  title        = {MILP-based Related-Key Rectangle Attack and Its Application to GIFT,
                  Khudra, {MIBS}},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {12},
  pages        = {1805--1821},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz076},
  doi          = {10.1093/COMJNL/BXZ076},
  timestamp    = {Thu, 09 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ChenWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuDMIWC19,
  author       = {Fukang Liu and
                  Christoph Dobraunig and
                  Florian Mendel and
                  Takanori Isobe and
                  Gaoli Wang and
                  Zhenfu Cao},
  title        = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {169--192},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.169-192},
  doi          = {10.13154/TOSC.V2019.I3.169-192},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuDMIWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuWZ19,
  author       = {Chunbo Zhu and
                  Gaoli Wang and
                  Boyu Zhu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Fast Chosen-Key Distinguish Attacks on Round-Reduced {AES-192}},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {573--587},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_31},
  doi          = {10.1007/978-3-030-21548-4\_31},
  timestamp    = {Wed, 26 Jun 2019 10:52:36 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhuWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuDMIWC19,
  author       = {Fukang Liu and
                  Christoph Dobraunig and
                  Florian Mendel and
                  Takanori Isobe and
                  Gaoli Wang and
                  Zhenfu Cao},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Efficient Collision Attack Frameworks for {RIPEMD-160}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {117--149},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_5},
  doi          = {10.1007/978-3-030-26951-7\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuDMIWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuCW19,
  author       = {Fukang Liu and
                  Zhenfu Cao and
                  Gaoli Wang},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {287--305},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_17},
  doi          = {10.1007/978-3-030-26834-3\_17},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuDMIWC19,
  author       = {Fukang Liu and
                  Christoph Dobraunig and
                  Florian Mendel and
                  Takanori Isobe and
                  Gaoli Wang and
                  Zhenfu Cao},
  title        = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuDMIWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoDMJW19,
  author       = {Boxin Zhao and
                  Xiaoyang Dong and
                  Willi Meier and
                  Keting Jia and
                  Gaoli Wang},
  title        = {Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear
                  Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoDMJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ShenW18,
  author       = {Yanzhao Shen and
                  Gaoli Wang},
  title        = {Improved Preimage Attacks on {RIPEMD-160} and {HAS-160}},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {12},
  number       = {2},
  pages        = {727--746},
  year         = {2018},
  url          = {https://doi.org/10.3837/tiis.2018.02.011},
  doi          = {10.3837/TIIS.2018.02.011},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ShenW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LiuS0W18,
  author       = {Yunwen Liu and
                  Yu Sasaki and
                  Ling Song and
                  Gaoli Wang},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE
                  Modes},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {92--114},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_5},
  doi          = {10.1007/978-3-030-10970-7\_5},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LiuS0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangZ17,
  author       = {Gaoli Wang and
                  Chunbo Zhu},
  title        = {Single key recovery attacks on reduced {AES-192} and Kalyna-128/256},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {9},
  pages        = {99101},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-016-0417-7},
  doi          = {10.1007/S11432-016-0417-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ZhouW18,
  author       = {Yongpeng Zhou and
                  Gaoli Wang},
  title        = {{\unicode{25913}}{\unicode{36827}}{\unicode{30340}}MD4{\unicode{26377}}{\unicode{24847}}{\unicode{20041}}{\unicode{30896}}{\unicode{25758}}{\unicode{25915}}{\unicode{20987}}
                  (Improved Meaningful Collision Attack on {MD4)}},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {9},
  pages        = {168--171},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.09.032},
  doi          = {10.11896/J.ISSN.1002-137X.2017.09.032},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ZhouW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WangSL17,
  author       = {Gaoli Wang and
                  Yanzhao Shen and
                  Fukang Liu},
  title        = {Cryptanalysis of 48-step {RIPEMD-160}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {177--202},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.177-202},
  doi          = {10.13154/TOSC.V2017.I2.177-202},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/WangSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AnkeleBCLMSW17,
  author       = {Ralph Ankele and
                  Subhadeep Banik and
                  Avik Chakraborti and
                  Eik List and
                  Florian Mendel and
                  Siang Meng Sim and
                  Gaoli Wang},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Related-Key Impossible-Differential Attack on Reduced-Round Skinny},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {208--228},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_11},
  doi          = {10.1007/978-3-319-61204-1\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AnkeleBCLMSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiuMW17,
  author       = {Fukang Liu and
                  Florian Mendel and
                  Gaoli Wang},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {158--186},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_6},
  doi          = {10.1007/978-3-319-70694-8\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuMW17,
  author       = {Fukang Liu and
                  Florian Mendel and
                  Gaoli Wang},
  title        = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {800},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/800},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleBCLMSW16,
  author       = {Ralph Ankele and
                  Subhadeep Banik and
                  Avik Chakraborti and
                  Eik List and
                  Florian Mendel and
                  Siang Meng Sim and
                  Gaoli Wang},
  title        = {Related-Key Impossible-Differential Attack on Reduced-Round {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1127},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleBCLMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWW15,
  author       = {Yu Sasaki and
                  Gaoli Wang and
                  Lei Wang},
  title        = {Improved Single-Key Distinguisher on {HMAC-MD5} and Key Recovery Attacks
                  on Sandwich-MAC-MD5 and {MD5-MAC}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {26--38},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.26},
  doi          = {10.1587/TRANSFUN.E98.A.26},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BaiYWW15,
  author       = {Dongxia Bai and
                  Hongbo Yu and
                  Gaoli Wang and
                  Xiaoyun Wang},
  title        = {Improved boomerang attacks on round-reduced {SM3} and keyed permutation
                  of {BLAKE-256}},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {167--178},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0380},
  doi          = {10.1049/IET-IFS.2013.0380},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BaiYWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangY15,
  author       = {Gaoli Wang and
                  Hongbo Yu},
  title        = {Improved cryptanalysis on {RIPEMD-128}},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {354--364},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0244},
  doi          = {10.1049/IET-IFS.2014.0244},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Wang14,
  author       = {Gaoli Wang},
  editor       = {Josh Benaloh},
  title        = {Practical Collision Attack on 40-Step {RIPEMD-128}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {444--460},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_23},
  doi          = {10.1007/978-3-319-04852-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Wang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangS14,
  author       = {Gaoli Wang and
                  Yanzhao Shen},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {(Pseudo-) Preimage Attacks on Step-Reduced {HAS-160} and {RIPEMD-160}},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {90--103},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_6},
  doi          = {10.1007/978-3-319-13257-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiCLWP13,
  author       = {Yue Li and
                  Dehua Chen and
                  Wei Li and
                  Gaoli Wang and
                  Paul Smith},
  title        = {A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor
                  Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/716265},
  doi          = {10.1155/2013/716265},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiCLWP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/WangS13,
  author       = {Gaoli Wang and
                  Yanzhao Shen},
  title        = {Preimage and pseudo-collision attacks on step-reduced {SM3} hash function},
  journal      = {Inf. Process. Lett.},
  volume       = {113},
  number       = {8},
  pages        = {301--306},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ipl.2013.02.006},
  doi          = {10.1016/J.IPL.2013.02.006},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/WangS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/Wang13,
  author       = {Gaoli Wang},
  title        = {Collision Attack on the Full Extended {MD4} and Pseudo-Preimage Attack
                  on {RIPEMD}},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {28},
  number       = {1},
  pages        = {129--143},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11390-013-1317-5},
  doi          = {10.1007/S11390-013-1317-5},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/Wang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiYWW13,
  author       = {Dongxia Bai and
                  Hongbo Yu and
                  Gaoli Wang and
                  Xiaoyun Wang},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Improved Boomerang Attacks on {SM3}},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {251--266},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_17},
  doi          = {10.1007/978-3-642-39059-3\_17},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiYWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang13,
  author       = {Gaoli Wang},
  title        = {Practical collision attack on 40-step {RIPEMD-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiYWW13,
  author       = {Dongxia Bai and
                  Hongbo Yu and
                  Gaoli Wang and
                  Xiaoyun Wang},
  title        = {Improved Boomerang Attacks on Round-Reduced {SM3} and {BLAKE-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/852},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiYWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KircanskiSWY12,
  author       = {Aleksandar Kircanski and
                  Yanzhao Shen and
                  Gaoli Wang and
                  Amr M. Youssef},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {Boomerang and Slide-Rotational Analysis of the {SM3} Hash Function},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {304--320},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_20},
  doi          = {10.1007/978-3-642-35999-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KircanskiSWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangS12,
  author       = {Gaoli Wang and
                  Yanzhao Shen},
  title        = {Preimage and Pseudo-Collision Attacks on Step-Reduced {SM3} Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Wang11,
  author       = {Gaoli Wang},
  editor       = {Sihan Qing and
                  Willy Susilo and
                  Guilin Wang and
                  Dongmei Liu},
  title        = {Collision Attack for the Hash Function Extended {MD4}},
  booktitle    = {Information and Communications Security - 13th International Conference,
                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7043},
  pages        = {228--241},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25243-3\_19},
  doi          = {10.1007/978-3-642-25243-3\_19},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Wang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangW10a,
  author       = {Gaoli Wang and
                  Shaohui Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Differential Fault Analysis on {PRESENT} Key Schedule},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {362--366},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.84},
  doi          = {10.1109/CIS.2010.84},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangW10b,
  author       = {Gaoli Wang and
                  Shaohui Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Improved Differential Cryptanalysis of Serpent},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {367--371},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.85},
  doi          = {10.1109/CIS.2010.85},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangW10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Wang10,
  author       = {Gaoli Wang},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Distinguishing Attacks on {LPMAC} Based on the Full {RIPEMD} and Reduced-Step
                  RIPEMD-\{256, 320\}},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {199--217},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_15},
  doi          = {10.1007/978-3-642-21518-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Wang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/WangW09,
  author       = {Gaoli Wang and
                  Shaohui Wang},
  editor       = {Bart Preneel},
  title        = {Second Preimage Attack on 5-Pass {HAVAL} and Partial Key-Recovery
                  Attack on HMAC/NMAC-5-Pass {HAVAL}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_1},
  doi          = {10.1007/978-3-642-02384-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/WangW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangW09,
  author       = {Gaoli Wang and
                  Shaohui Wang},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Preimage Attack on Hash Function {RIPEMD}},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {274--284},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_24},
  doi          = {10.1007/978-3-642-00843-6\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Wang07,
  author       = {Gaoli Wang},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Related-Key Rectangle Attack on 43-Round {SHACAL-2}},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {33--42},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_4},
  doi          = {10.1007/978-3-540-72163-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Wang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WangKD07,
  author       = {Gaoli Wang and
                  Nathan Keller and
                  Orr Dunkelman},
  editor       = {Carlisle M. Adams and
                  Ali Miri and
                  Michael J. Wiener},
  title        = {The Delicate Issues of Addition with Respect to {XOR} Differences},
  booktitle    = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
                  2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4876},
  pages        = {212--231},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77360-3\_14},
  doi          = {10.1007/978-3-540-77360-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WangKD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/YuWZW05,
  author       = {Hongbo Yu and
                  Gaoli Wang and
                  Guoyan Zhang and
                  Xiaoyun Wang},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {The Second-Preimage Attack on {MD4}},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_1},
  doi          = {10.1007/11599371\_1},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/YuWZW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics