Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gaoli Wang
@article{DBLP:journals/tmc/GuoWLNZ24, author = {Zhenzhen Guo and Gaoli Wang and Yingxin Li and Jianqiang Ni and Guoyan Zhang}, title = {Attribute-Based Data Sharing Scheme Using Blockchain for 6G-Enabled VANETs}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {23}, number = {4}, pages = {3343--3360}, year = {2024}, url = {https://doi.org/10.1109/TMC.2023.3273222}, doi = {10.1109/TMC.2023.3273222}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/GuoWLNZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLW24, author = {Yingxin Li and Fukang Liu and Gaoli Wang}, title = {New Records in Collision Attacks on {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2024}, url = {https://eprint.iacr.org/2024/349}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLW24a, author = {Yingxin Li and Fukang Liu and Gaoli Wang}, title = {Automating Collision Attacks on {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2024}, url = {https://eprint.iacr.org/2024/350}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiLW24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GuoWLNDW23, author = {Zhenzhen Guo and Gaoli Wang and Yingxin Li and Jianqiang Ni and Runmeng Du and Miao Wang}, title = {Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {8, April 15}, pages = {7011--7026}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3228550}, doi = {10.1109/JIOT.2022.3228550}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GuoWLNDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GuoWZLN23, author = {Zhenzhen Guo and Gaoli Wang and Guoyan Zhang and Yingxin Li and Jianqiang Ni}, title = {A Multifactor Combined Data Sharing Scheme for Vehicular Fog Computing Using Blockchain}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {22}, pages = {20049--20064}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3282672}, doi = {10.1109/JIOT.2023.3282672}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/GuoWZLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoWDPL23, author = {Zhenzhen Guo and Gaoli Wang and Orr Dunkelman and Yinxue Pan and Shengyuan Liu}, title = {Tweakable {SM4:} How to tweak {SM4} into tweakable block ciphers?}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103406}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103406}, doi = {10.1016/J.JISA.2022.103406}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoWDPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/NiZWLS23, author = {Jianqiang Ni and Jianhui Zhang and Gaoli Wang and Rui Li and Yanzhao Shen}, title = {Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol}, journal = {Symmetry}, volume = {15}, number = {8}, pages = {1563}, year = {2023}, url = {https://doi.org/10.3390/sym15081563}, doi = {10.3390/SYM15081563}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/NiZWLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiLW23, author = {Yingxin Li and Fukang Liu and Gaoli Wang}, title = {Automating Collision Attacks on {RIPEMD-160}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {112--142}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.112-142}, doi = {10.46586/TOSC.V2023.I4.112-142}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuWSAMLI23, author = {Fukang Liu and Gaoli Wang and Santanu Sarkar and Ravi Anand and Willi Meier and Yingxin Li and Takanori Isobe}, editor = {Carmit Hazay and Martijn Stam}, title = {Analysis of {RIPEMD-160:} New Collision Attacks and Finding Characteristics with {MILP}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {189--219}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_7}, doi = {10.1007/978-3-031-30634-1\_7}, timestamp = {Thu, 20 Apr 2023 11:35:02 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuWSAMLI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/YuLWSM23, author = {Xiaorui Yu and Fukang Liu and Gaoli Wang and Siwei Sun and Willi Meier}, editor = {Claude Carlet and Kalikinkar Mandal and Vincent Rijmen}, title = {A Closer Look at the S-Box: Deeper Analysis of Round-Reduced {ASCON-HASH}}, booktitle = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14201}, pages = {22--42}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53368-6\_2}, doi = {10.1007/978-3-031-53368-6\_2}, timestamp = {Tue, 05 Mar 2024 11:21:46 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/YuLWSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWSAMLI23, author = {Fukang Liu and Gaoli Wang and Santanu Sarkar and Ravi Anand and Willi Meier and Yingxin Li and Takanori Isobe}, title = {Analysis of {RIPEMD-160:} New Collision Attacks and Finding Characteristics with {MILP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2023}, url = {https://eprint.iacr.org/2023/277}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuWSAMLI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLW23, author = {Yingxin Li and Fukang Liu and Gaoli Wang}, title = {New Records in Collision Attacks on {RIPEMD-160} and {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2023}, url = {https://eprint.iacr.org/2023/285}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuLWSM23, author = {Xiaorui Yu and Fukang Liu and Gaoli Wang and Siwei Sun and Willi Meier}, title = {A Closer Look at the S-box: Deeper Analysis of Round-Reduced {ASCON-HASH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {865}, year = {2023}, url = {https://eprint.iacr.org/2023/865}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuLWSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Shen0WDQ22, author = {Yanzhao Shen and Ting Wu and Gaoli Wang and Xinfeng Dong and Haifeng Qian}, title = {Improved Collision Detection Of {MD5} Using Sufficient Condition Combination}, journal = {Comput. J.}, volume = {65}, number = {10}, pages = {2720--2729}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxab109}, doi = {10.1093/COMJNL/BXAB109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Shen0WDQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuMSWII22, author = {Fukang Liu and Willi Meier and Santanu Sarkar and Gaoli Wang and Ryoma Ito and Takanori Isobe}, title = {New Cryptanalysis of {ZUC-256} Initialization Using Modular Differences}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {152--190}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.152-190}, doi = {10.46586/TOSC.V2022.I3.152-190}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuMSWII22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangW22, author = {Feifan Wang and Gaoli Wang}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {792--808}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_39}, doi = {10.1007/978-3-031-09234-3\_39}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/WangW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuSWMI22, author = {Fukang Liu and Santanu Sarkar and Gaoli Wang and Willi Meier and Takanori Isobe}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Algebraic Meet-in-the-Middle Attack on LowMC}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, pages = {225--255}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3\_8}, doi = {10.1007/978-3-031-22963-3\_8}, timestamp = {Fri, 03 Feb 2023 17:07:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuSWMI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icit/TangXW22, author = {Huimin Tang and Nianming Xue and Gaoli Wang}, title = {Differentially Private Decentralized Traffic Flow Prediction Approach based on Federated Learning}, booktitle = {Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City, {ICIT} 2022, Shanghai, China, December 23-25, 2022}, pages = {280--285}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3582197.3582244}, doi = {10.1145/3582197.3582244}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icit/TangXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWMSI22, author = {Fukang Liu and Gaoli Wang and Willi Meier and Santanu Sarkar and Takanori Isobe}, title = {Algebraic Meet-in-the-Middle Attack on LowMC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2022}, url = {https://eprint.iacr.org/2022/019}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuWMSI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangCD21, author = {Gaoli Wang and Zhenfu Cao and Xiaolei Dong}, title = {Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory}, journal = {Comput. J.}, volume = {64}, number = {8}, pages = {1264--1276}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa161}, doi = {10.1093/COMJNL/BXAA161}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangCD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangW21, author = {Gao Wang and Gaoli Wang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Improved Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Analysis}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {21--38}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_2}, doi = {10.1007/978-3-030-88052-1\_2}, timestamp = {Tue, 21 Sep 2021 19:14:09 +0200}, biburl = {https://dblp.org/rec/conf/icics/WangW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWH21, author = {Gao Wang and Gaoli Wang and Yu He}, title = {Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {164--171}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00039}, doi = {10.1109/TRUSTCOM53373.2021.00039}, timestamp = {Sun, 13 Mar 2022 10:52:35 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuM0W0021, author = {Fukang Liu and Willi Meier and Santanu Sarkar and Gaoli Wang and Ryoma Ito and Takanori Isobe}, title = {Finding Practical Distinguishers for {ZUC-256} Using Modular Differences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1104}, year = {2021}, url = {https://eprint.iacr.org/2021/1104}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuM0W0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HeWLR20, author = {Yu He and Gaoli Wang and Wenshan Li and Yizhi Ren}, title = {Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things}, journal = {{IEEE} Access}, volume = {8}, pages = {20920--20930}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2967070}, doi = {10.1109/ACCESS.2020.2967070}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HeWLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangLCMD20, author = {Gaoli Wang and Fukang Liu and Binbin Cui and Florian Mendel and Christoph Dobraunig}, title = {Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced {RIPEMD-160}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {887--930}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00718-x}, doi = {10.1007/S10623-020-00718-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangLCMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoDMJW20, author = {Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang}, title = {Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to {SKINNY} and {GIFT}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1103--1126}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00730-1}, doi = {10.1007/S10623-020-00730-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoDMJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhuWHQ20, author = {Shiqiang Zhu and Gaoli Wang and Yu He and Haifeng Qian}, title = {Integral Attacks on Some Lightweight Block Ciphers}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {14}, number = {11}, pages = {4502--4521}, year = {2020}, url = {https://doi.org/10.3837/tiis.2020.11.014}, doi = {10.3837/TIIS.2020.11.014}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhuWHQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangCD19, author = {Gaoli Wang and Zhenfu Cao and Xiaolei Dong}, title = {Improved Fault-Tolerant Aggregate Signatures}, journal = {Comput. J.}, volume = {62}, number = {4}, pages = {481--489}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxy108}, doi = {10.1093/COMJNL/BXY108}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangCD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenWZ19, author = {Lele Chen and Gaoli Wang and Guoyan Zhang}, title = {MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, {MIBS}}, journal = {Comput. J.}, volume = {62}, number = {12}, pages = {1805--1821}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz076}, doi = {10.1093/COMJNL/BXZ076}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ChenWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuDMIWC19, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, title = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {169--192}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.169-192}, doi = {10.13154/TOSC.V2019.I3.169-192}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuDMIWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhuWZ19, author = {Chunbo Zhu and Gaoli Wang and Boyu Zhu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Fast Chosen-Key Distinguish Attacks on Round-Reduced {AES-192}}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {573--587}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_31}, doi = {10.1007/978-3-030-21548-4\_31}, timestamp = {Wed, 26 Jun 2019 10:52:36 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhuWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuDMIWC19, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Efficient Collision Attack Frameworks for {RIPEMD-160}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {117--149}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_5}, doi = {10.1007/978-3-030-26951-7\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LiuDMIWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuCW19, author = {Fukang Liu and Zhenfu Cao and Gaoli Wang}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {287--305}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_17}, doi = {10.1007/978-3-030-26834-3\_17}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuDMIWC19, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, title = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2019}, url = {https://eprint.iacr.org/2019/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuDMIWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoDMJW19, author = {Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang}, title = {Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2019}, url = {https://eprint.iacr.org/2019/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoDMJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShenW18, author = {Yanzhao Shen and Gaoli Wang}, title = {Improved Preimage Attacks on {RIPEMD-160} and {HAS-160}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {2}, pages = {727--746}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.02.011}, doi = {10.3837/TIIS.2018.02.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShenW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LiuS0W18, author = {Yunwen Liu and Yu Sasaki and Ling Song and Gaoli Wang}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {92--114}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_5}, doi = {10.1007/978-3-030-10970-7\_5}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LiuS0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangZ17, author = {Gaoli Wang and Chunbo Zhu}, title = {Single key recovery attacks on reduced {AES-192} and Kalyna-128/256}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {9}, pages = {99101}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-0417-7}, doi = {10.1007/S11432-016-0417-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ZhouW18, author = {Yongpeng Zhou and Gaoli Wang}, title = {{\unicode{25913}}{\unicode{36827}}{\unicode{30340}}MD4{\unicode{26377}}{\unicode{24847}}{\unicode{20041}}{\unicode{30896}}{\unicode{25758}}{\unicode{25915}}{\unicode{20987}} (Improved Meaningful Collision Attack on {MD4)}}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {9}, pages = {168--171}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.09.032}, doi = {10.11896/J.ISSN.1002-137X.2017.09.032}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ZhouW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WangSL17, author = {Gaoli Wang and Yanzhao Shen and Fukang Liu}, title = {Cryptanalysis of 48-step {RIPEMD-160}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {177--202}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.177-202}, doi = {10.13154/TOSC.V2017.I2.177-202}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/WangSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AnkeleBCLMSW17, author = {Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Related-Key Impossible-Differential Attack on Reduced-Round Skinny}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {208--228}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_11}, doi = {10.1007/978-3-319-61204-1\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AnkeleBCLMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuMW17, author = {Fukang Liu and Florian Mendel and Gaoli Wang}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {158--186}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_6}, doi = {10.1007/978-3-319-70694-8\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuMW17, author = {Fukang Liu and Florian Mendel and Gaoli Wang}, title = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {800}, year = {2017}, url = {http://eprint.iacr.org/2017/800}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleBCLMSW16, author = {Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang}, title = {Related-Key Impossible-Differential Attack on Reduced-Round {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1127}, year = {2016}, url = {http://eprint.iacr.org/2016/1127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleBCLMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiWW15, author = {Yu Sasaki and Gaoli Wang and Lei Wang}, title = {Improved Single-Key Distinguisher on {HMAC-MD5} and Key Recovery Attacks on Sandwich-MAC-MD5 and {MD5-MAC}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {26--38}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.26}, doi = {10.1587/TRANSFUN.E98.A.26}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BaiYWW15, author = {Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang}, title = {Improved boomerang attacks on round-reduced {SM3} and keyed permutation of {BLAKE-256}}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {3}, pages = {167--178}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2013.0380}, doi = {10.1049/IET-IFS.2013.0380}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BaiYWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangY15, author = {Gaoli Wang and Hongbo Yu}, title = {Improved cryptanalysis on {RIPEMD-128}}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {6}, pages = {354--364}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0244}, doi = {10.1049/IET-IFS.2014.0244}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Wang14, author = {Gaoli Wang}, editor = {Josh Benaloh}, title = {Practical Collision Attack on 40-Step {RIPEMD-128}}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {444--460}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_23}, doi = {10.1007/978-3-319-04852-9\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Wang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangS14, author = {Gaoli Wang and Yanzhao Shen}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {(Pseudo-) Preimage Attacks on Step-Reduced {HAS-160} and {RIPEMD-160}}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {90--103}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_6}, doi = {10.1007/978-3-319-13257-0\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiCLWP13, author = {Yue Li and Dehua Chen and Wei Li and Gaoli Wang and Paul Smith}, title = {A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/716265}, doi = {10.1155/2013/716265}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/LiCLWP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/WangS13, author = {Gaoli Wang and Yanzhao Shen}, title = {Preimage and pseudo-collision attacks on step-reduced {SM3} hash function}, journal = {Inf. Process. Lett.}, volume = {113}, number = {8}, pages = {301--306}, year = {2013}, url = {https://doi.org/10.1016/j.ipl.2013.02.006}, doi = {10.1016/J.IPL.2013.02.006}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/WangS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/Wang13, author = {Gaoli Wang}, title = {Collision Attack on the Full Extended {MD4} and Pseudo-Preimage Attack on {RIPEMD}}, journal = {J. Comput. Sci. Technol.}, volume = {28}, number = {1}, pages = {129--143}, year = {2013}, url = {https://doi.org/10.1007/s11390-013-1317-5}, doi = {10.1007/S11390-013-1317-5}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/Wang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiYWW13, author = {Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang}, editor = {Colin Boyd and Leonie Simpson}, title = {Improved Boomerang Attacks on {SM3}}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {251--266}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_17}, doi = {10.1007/978-3-642-39059-3\_17}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BaiYWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang13, author = {Gaoli Wang}, title = {Practical collision attack on 40-step {RIPEMD-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2013}, url = {http://eprint.iacr.org/2013/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiYWW13, author = {Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang}, title = {Improved Boomerang Attacks on Round-Reduced {SM3} and {BLAKE-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2013}, url = {http://eprint.iacr.org/2013/852}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiYWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KircanskiSWY12, author = {Aleksandar Kircanski and Yanzhao Shen and Gaoli Wang and Amr M. Youssef}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {Boomerang and Slide-Rotational Analysis of the {SM3} Hash Function}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {304--320}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_20}, doi = {10.1007/978-3-642-35999-6\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KircanskiSWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangS12, author = {Gaoli Wang and Yanzhao Shen}, title = {Preimage and Pseudo-Collision Attacks on Step-Reduced {SM3} Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2012}, url = {http://eprint.iacr.org/2012/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Wang11, author = {Gaoli Wang}, editor = {Sihan Qing and Willy Susilo and Guilin Wang and Dongmei Liu}, title = {Collision Attack for the Hash Function Extended {MD4}}, booktitle = {Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7043}, pages = {228--241}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25243-3\_19}, doi = {10.1007/978-3-642-25243-3\_19}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Wang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangW10a, author = {Gaoli Wang and Shaohui Wang}, editor = {Muren Liu and Yuping Wang and Ping Guo}, title = {Differential Fault Analysis on {PRESENT} Key Schedule}, booktitle = {2010 International Conference on Computational Intelligence and Security, {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010}, pages = {362--366}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIS.2010.84}, doi = {10.1109/CIS.2010.84}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangW10b, author = {Gaoli Wang and Shaohui Wang}, editor = {Muren Liu and Yuping Wang and Ping Guo}, title = {Improved Differential Cryptanalysis of Serpent}, booktitle = {2010 International Conference on Computational Intelligence and Security, {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010}, pages = {367--371}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIS.2010.85}, doi = {10.1109/CIS.2010.85}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangW10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Wang10, author = {Gaoli Wang}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Distinguishing Attacks on {LPMAC} Based on the Full {RIPEMD} and Reduced-Step RIPEMD-\{256, 320\}}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {199--217}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_15}, doi = {10.1007/978-3-642-21518-6\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Wang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/WangW09, author = {Gaoli Wang and Shaohui Wang}, editor = {Bart Preneel}, title = {Second Preimage Attack on 5-Pass {HAVAL} and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass {HAVAL}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {1--13}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_1}, doi = {10.1007/978-3-642-02384-2\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/WangW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangW09, author = {Gaoli Wang and Shaohui Wang}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Preimage Attack on Hash Function {RIPEMD}}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {274--284}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_24}, doi = {10.1007/978-3-642-00843-6\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Wang07, author = {Gaoli Wang}, editor = {Ed Dawson and Duncan S. Wong}, title = {Related-Key Rectangle Attack on 43-Round {SHACAL-2}}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {33--42}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_4}, doi = {10.1007/978-3-540-72163-5\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Wang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WangKD07, author = {Gaoli Wang and Nathan Keller and Orr Dunkelman}, editor = {Carlisle M. Adams and Ali Miri and Michael J. Wiener}, title = {The Delicate Issues of Addition with Respect to {XOR} Differences}, booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC} 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4876}, pages = {212--231}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77360-3\_14}, doi = {10.1007/978-3-540-77360-3\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WangKD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/YuWZW05, author = {Hongbo Yu and Gaoli Wang and Guoyan Zhang and Xiaoyun Wang}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {The Second-Preimage Attack on {MD4}}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {1--12}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_1}, doi = {10.1007/11599371\_1}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/YuWZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.