头像

王高丽

教授博士生导师

软件工程学院      

个人资料

  • 部门: 软件工程学院
  • 毕业院校: 山东大学
  • 学位: 博士
  • 学历: 博士
  • 邮编:
  • 联系电话: 021-62231529
  • 传真:
  • 电子邮箱: glwang@sei.ecnu.edu.cn
  • 办公地址:
  • 通讯地址: 华东师范大学,信息学部,软件工程学院

教育经历

1999~2003年,山东大学,数学与系统科学学院,学士学位(专业:基础数学),
2003~2008年,山东大学,数学学院,博士学位(专业:信息安全,导师:王小云院士)

工作经历

个人简介

王高丽,教授,博士生导师,2003年毕业于山东大学数学与系统科学学院,获理学学士学位,2008年获山东大学数学学院信息安全理学博士学位。入选2009年上海市晨光计划。现为华东师范大学软件工程学院教授、博士生导师。研究兴趣包括密码理论与技术、量子算法与密码分析、人工智能安全、隐私计算。在国际密码顶级会议EUROCRYPT (欧密会)2024/2023、CRYPTO(美密会) 2019ASIACRYPT(亚密会) 2022/2017FSE/ToSC 2024/2023/2020/2018 和 SAC 2023/2018/2012/2007CT-RSA 2014Designs, Codes and Cryptography 等密码学重要会议和期刊发表论文多篇。获得2016年党政密码科学技术进步二等奖(省部级,第一完成人)。担任 EUROCRYPT(欧密会)2022 程序委员。曾获 CANS 2005会议最佳论文奖。

社会兼职

EUROCRYPT(欧密会)2022程序委员

国家密码管理局对称密码安全性评估专家;

密码学多个重要国际会议和期刊的审稿人;

国基函评。

 

研究方向

密码学、人工智能安全区块链、隐私计算



招生与培养

开授课程

主讲本科课程:

信息安全数学基础:2008年~2015年

应用密码学:2009年~2015年

离散数学:2013年~2014年

现代密码学:2018年~2019年

网络安全导论:2016年~至今

密码分析学:2022年~至今


研究生课程:

密码设计与分析

有限域与编码


教材:

密码分析学,科学出版社,2024

离散数学,清华大学出版社,2011

 


科研项目

2021.1-2024.12:国家自然科学基金面上项目,分组密码与哈希函数的安全性分析,62072181,主持,在研

2022.11-2025.10:国家重点研发计划项目,面向区块链应用的杂凑函数设计,2022YFB2701900,参与,华师大方负责人,在研

2016-2019:国家自然科学基金面上项目,主持,已结题

2012-2014:国家自然科学基金青年项目,主持,已结题

2018-2020:“十三五”国家密码发展基金,主持,已结题 

2013-2014:“十二五”国家密码发展基金,主持,已结题

国家重点实验室开放课题(主持)

国家自然科学基金、国家自然科学基金委员会与以色列科学基金会合作研究项目(参与)

晨光学者




学术成果

论文列表可参见 https://dblp.dagstuhl.de/pid/32/6238.html

部分论文:

[1] Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. EUROCRYPT (1) 2024, LNCS 14651, pp. 158-186, Zurich, Switzerland, May 26-30, 2024.   (三大国际密码顶级会议之一,  CCF A)

[2] Zhenzhen Guo, Gaoli Wang*, Yingxin Li, Jianqiang Ni, Guoyan Zhang. Attribute-Based Data Sharing Scheme Using Blockchain for 6G-enabled VANETs. IEEE Transactions on Mobile Computing, 23(4), pp. 3343-3360, 2024    (CCF  A)

[3] Gao Wang, Gaoli Wang*. Keeping classical distinguisher and neural distinguisher in balance. Journal of Information Security and Applications. Volume 84, August 2024, 103816.

https://doi.org/10.1016/j.jisa.2024.103816   (SCI)

[4] Gao Wang, Gaoli Wang*, Siwei Sun. Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis. IEICE Transactions on Information and Systems. Vol.E107-D, No.8, pp. 1016-1028, Aug. 2024     (SCI)

[5] Fukang Liu*, Gaoli Wang*, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe. Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. EUROCRYPT (4) 2023, LNCS 14007, pp. 189-219, Lyon, France, April 23-27, 2023.   (三大国际密码顶级会议之一,  CCF A)

[6] Yingxin Li, Fukang Liu, Gaoli Wang*. Automating Collision Attacks on RIPEMD-160. Transactions on Symmetric Cryptology (ToSC 2023, Issue 4, FSE 2024), 2023(4), pp. 112-142.     (密码学旗舰会议,CCF B)

[7] Xiaorui Yu, Fukang Liu, Gaoli Wang*, Siwei Sun, Willi Meier. A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH. SAC 2023, LNCS 14201, pp. 22-42, Fredericton, Canada, August 14-18, 2023.   (CCF C)

[8] Zhenzhen Guo, Gaoli Wang*, Orr Dunkelman, Yinxue Pan, Shengyuan Liu. Tweakable SM4: How to tweak SM4 into tweakable block ciphers? Journal of Information Security and Applications, Feb. 72 (2) 103406, 2023.    (SCI)

[9] Zhenzhen Guo, Gaoli Wang*, Guoyan Zhang, Yingxin Li, Jianqiang Ni. A Multi-Factor Combined Data Sharing Scheme for Vehicular Fog Computing Using Blockchain. IEEE Internet of Things Journal, 10(22), pp. 20049-20064, Nov. 15, 2023.   (一区)

[10] Zhenzhen Guo, Gaoli Wang*, Yingxin Li, Jianqiang Ni, Runmeng Du, Miao Wang. Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network.  IEEE Internet of Things Journal. 10(8), pp. 7011-7026, 2023.   (一区)

[11] Youqun Long, Jianhui Zhang, Gaoli Wang*, Jie Fu. Hierarchical federated learning with global differential privacy. Electronic Research Archive (ERA), 31(7): 3741-3758, 2023.   (SCI)

[12] Jianqiang Ni, Jianhui Zhang, Gaoli Wang*, Rui Li, Yanzhao Shen. Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol. Symmetry 2023, 15(8), 1563; https://doi.org/10.3390/sym15081563    (SCI)

[13] Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe. Algebraic Meet-in-the-Middle Attack on LowMC. S. Agrawal and D. Lin (Eds.): ASIACRYPT 2022, LNCS 13791, pp. 225-255, Taipei, China, December 5-9, 2022.    (三大国际密码顶级会议之一)

[14] Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe. New Cryptanalysis of ZUC-256 Initialization Using Modular Differences. Transactions on Symmetric Cryptology  (ToSC 2022_3, FSE 2023), 2022(3), pp. 152-190, 2022.     (密码学旗舰会议,CCF B)

[15] Feifan Wang, Gaoli Wang*. Improved Differential-Linear Attack with Application to Round-reduced Speck32/64. ACNS 2022, LNCS 13269, Springer. pp. 792-808, Rome, Italy, June 20-23, 2022.      (CCF C)

[16] 潘印雪, 王高丽*, 倪建强. 基于MILP寻找SM4算法的差分特征. 计算机研究与发展, 2022, 59(10), pp. 2299-2308, 2022.    (中文 CCF A)

[17] Yanzhao Shen, Ting Wu, Gaoli Wang*, Xinfeng Dong, Haifeng Qian. Improved Collision Detection of MD5 Using Sufficient Condition Combination. The Computer Journal, 65 (10), pp. 2720-2729, 2022.    (CCF B)

[18] Yuan Qin, Gaoli Wang*, Guoyan Zhang. Rotational differential-linear attack on Chaskey. Security and Communication Networks, Volume 2022, 13 pages, https://doi.org/10.1155/2022/4186874    (CCF C)

[19] Gao Wang, Gaoli Wang*. Improved Differential-ML Distinguisher: Machine Learning Based GeneriExtension for Differential Analysis. ICICS 2021, Part II, LNCS 12919, Springer. pp. 21-38, Chongqing, China, November 19-21, 2021.        (CCF C)

[20] Gao Wang, Gaoli Wang*, Yu HeImproved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers. TrustCom 2021, pp. 164-171, 

Shengyang, China, October 20-22, 2021. (CCF C)

[21] Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. The Computer Journal, 64(8), pp. 1264-1276, 2021.   (CCF B)

[22] Gaoli Wang*, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig. Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. Designs, Codes and Cryptography, 88(5), pp. 887-930, 2020.    (CCF B)

[23] Shiqiang Zhu, Gaoli Wang*, Yu He, Haifeng Qian. Integral Attacks on Some Lightweight Block Ciphers. KSII Transactions on Internet and Information Systems, 14 (11), pp. 4502-4521, 2020.   (SCI)

[24] Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang. Generalized Related-key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT. Designs, Codes and Cryptography, 88(6): 1103-1126, 2020.     (CCF B)

[25] Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang*, Zhenfu Cao*. Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO 2019, Part II, LNCS 11693, Springer. pp. 117-149,  Santa Barbara, CA, USA, August 18-22, 2019.  (三大国际密码顶级会议之一, CCF A)
[26] Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao. New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol. 2019(3), pp. 169-192 (2019) (FSE 2020).   (密码学旗舰会议CCF B)
[27] Chunbo Zhu, Gaoli Wang*, Boyu Zhu. Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192. ACISP 2019, LNCS 11547, Springer. pp. 573-587, Christchurch, New
Zealand, July 3-5, 2019. ( CCF C,CACR C)
[28] Gaoli Wang, Zhenfu Cao, Xiaolei
Dong. Improved Fault-Tolerant Aggregate Signatures. The Computer Journal, 62(4), pp. 481-489, 2019 (CCF B)

[29] Fukang Liu, Zhenfu Cao, Gaoli Wang. Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. IWSEC 2019, LNCS 11689, pp. 287-305.
[30] Lele Chen, Gaoli Wang*, Guoyan Zhang. MILP-Based Related-key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. The Computer Journal, 62(12), pp. 1805- 1821, 2019(CCF B)
[31] Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang. Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. The 25th Conference on Selected Areas in Cryptography (SAC 2018),  LNCS 11349, Springer. pp. 1-23, Alberta, Canada, August 15-17, 2018. ( CCF C,CACR C)
[32] Yanzhao Shen, Gaoli Wang*. Improved Preimage Attacks on RIPEMD-160 and HAS-160. KSII Transactions on Internet and Information Systems, 12 (2), pp. 727-746, 2018. (SCI)
[33] Binbin Cui, Gaoli Wang*. Improved Distinguishing Attack on Step-reduced RIPEMD-
160. Computer Engineering. DOI:10.19678/j.issn.1000-3428.0052363 (in Chinese)
[34] Gaoli Wang*, Yanzhao Shen, Fukang Liu. Cryptanalysis of 48-step RIPEMD-160. IACR Transactions on Symmetric Cryptology (FSE -- Fast Software Encryption 2018), 2017(2), pp. 177-202.  (密码学旗舰会议CCF B)
[35] Fukang Liu, Florian Mendel, Gaoli Wang*. Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. The 23rd International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt 2017), Lecture Notes in Computer Science 10624, Springer. pp. 158-186, HongKong, China, December 3-7, 2017.   (三大国际密码顶级会议之一)
[36] Gaoli Wang*, Chunbo Zhu. Single Key Recovery Attacks on Reduced AES-192 and Kalyna-128/256. SCIENCE CHINA, Information Sciences, 60 (9), pp. 99-101, 2017.  (Supplementary material is available for this article at  10.1007/s11432-016-0417-7)    ( CCF A )
[37] Ralph Ankele1, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang
Meng Sim, Gaoli Wang. Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. International Conference on Applied Cryptography and Network Security (ACNS 2017), Lecture Notes in Computer Science 10355, Springer. pp. 2508-228, Kanazawa, Japan, Jul. 10-12, 2017.   ( CCF C, CACR C )
[38] Yongpeng Zhou, Gaoli Wang*. Improved Meaningful Collision Attack on MD4.  Computer Science, 44 (9), pp. 168-171, 2017  (in Chinese)
[39] Gaoli Wang*, Nan Gan. A Meet-in-the-Middle Attack on 8-Round mCrypton-96. Journal of Computer Research and Development, 53(3), pp. 666-673, 2016  (EI, in Chinese)
[40] Gaoli Wang, Gan Nan, Yue Li. Improved Differential Attack on 30-Round SIMON64. Wuhan University Journal of Natural Sciences. 21(1), pp. 75-83, 2016.
[41] Gaoli Wang*, Hongbo Yu. Improved Cryptanalysis on RIPEMD-128. IET Information Security, 9(6), pp. 354-364, 2015.    ( CACR B )
[42] Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved Boomerang Attacks on Round-Reduced SM3 and 8Keyed Permutation of BLAKE-256. IET Information Security, 9(3), pp.167-178, 2015.    ( CACR B )
[43] Yu Sasaki, Gaoli Wang, Lei Wang. Improved Single-Key Distinguisher on HMAC- MD5
and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 98(1), pp. 26-38, 2015.  (SCI)
[44] Gaoli Wang. Practical Collision Attack on 40-step RIPEMD-128. The Cryptographer’s Track at the RSA Conference 2014 (CT-RSA 2014), Lecture Notes in Computer Science 8366, Springer. pp. 444 - 460, San Franisco, CA, United states, Feb. 25-28, 2014.      ( CACR B )
[45] Gaoli Wang*, Yanzhao Shen. (Pseudo-)Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160. Information Security Conference (ISC 2014), Lecture Notes in Computer Science 8783, Springer. pp. 90-107, Hongkong, Nov. 1-4, 2014.  (CCF C, CACR C)
[46] Gaoli Wang*, Yanzhao Shen. Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding. Journal on Communications, 35(2), pp. 40-45, 2014.    (EI, in Chinese)
[47] Gaoli Wang*, Yanzhao Shen. Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function. Information Processing Letters, 113 (8), pp. 301-306, 2013.      ( CACR B )
[48] Gaoli Wang. Collision Attack on the Full Extended MD4 and Pseudo-preimage Attack on 
RIPEMD. Journal of Computer Science and Technology, 28(1), pp. 129-143, 2013.   ( CCF B )
[49] Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved Boomerang Attacks on SM3. The 18th Australasian Conference on Information Security and Privacy (ACISP 2013), Lecture Notes in Computer Science 7959, Springer. pp. 251-266, Brisbane, Australia, Jul. 1- 3, 2013.  ( CCF C, CACR C )
[50] Gaoli Wang*, Shasha Jiang, Yanzhao Shen, Yue Li. Improved 3-dimensional Meet-in-the-middle Cryptanalysis of KTANTAN32. Journal of Sichuan University (Engineering Science Edition), 45(6), pp. 8-14, 2013.  (EI, in Chinese)
[51] Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang*, Amr M.Youssef. Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. The 19th International Conference on Selected Areas in Cryptography (SAC 2012), Lecture Notes in Computer Science 7707, Springer. pp. 305-321, Windsor, Canada, Aug. 15-16, 2012. ( CCF C, CACR C )
[52] Gaoli Wang*, Shaohui Wang. Integral cryptanalysis of reduced-round MIBS block cipher. Journal of Chinese Computer Systems, 33 (4), pp.773-777, 2012.    (in Chinese)
[53] Gaoli Wang. Collision Attack for the Hash Function Extended MD4. The 13th
International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science 7043, Springer. pp. 228-241, Beijing, China, Nov. 23-26, 2011.(CCF C )
[54] Gaoli Wang*, Shaohui Wang. Improved Differential Cryptanalysis of Serpent. International Conference on Computational Intelligence and Security (CIS 2010), IEEE. pp. 367-371, Nanning, China, Dec. 11-14, 2010.   (EI)
[55] Gaoli Wang. Distinguishing Attacks on LPMAC Based on the full RIPEMD and Reduced-Step RIPEMD-{256,320}. The 6th International Conference on Information Security and Cryptology (INSCRYPT 2010), Lecture Notes in Computer Science 6584, Springer. p
p. 199-217, Shanghai, China, Oct. 20-24, 2010.   (CACR C)
[56] Gaoli Wang*, Shaohui Wang. Preimage Attack on Hash Function RIPEMD. The 5th International Conference on Information Security Practice and Experience (ISPEC 2009), Lecture Notes in Computer Science 5451, Springer. pp. 274-284, Xi an, China, Apr. 13-15, 2009. ( CACR C )
[57] Gaoli Wang*, Shaohui Wang. Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-5-Pass HAVAL. The 2nd International Conference on Cryptology in Africa (AFRICACRYPT 2009), Lecture Notes in Computer Science 5580, Springer. pp. 1-13, Gammarth, Tunisia, Jun. 21-25, 2009. ( CACR C)
[58] Gaoli Wang, Meiqin Wang. Cryptanalysis of reduced RIPEMD-128. 软件学报, 19(9), pp. 2442-2448, 2008. (一级学科国内顶级期刊)


获奖情况:

2016年度党政密码科学技术进步奖(省部级)二等奖(第一完成人)。

2022年华为公司“火花奖”。

国家/行业/团体标准:

团体标准. 《可信区块链:区块链中的国密算法应用指南》,参与编制. 

部分报告:

2024 密码分析前沿论坛(邀请报告)

2023 密码分析前沿论坛(邀请报告)

2021 中国密码学会2021年青年论坛(邀请报告)

2019 密码学与网络安全前沿论坛(邀请报告)

2019 密码学与数据安全学术会议(邀请报告)

2019 第五届“密码学沙龙——密码分析前沿”论坛(邀请报告)
2018 FSE 2018(大会报告)
2018 第五届密码与安全前瞻性论坛(邀请报告)
2017 “密码学沙龙——密码分析前沿”论坛(邀请报告)

2014 CT-RSA 2014(大会报告)

荣誉及奖励

密码算法若干关键问题研究,2016年度党政密码科学技术进步奖(省部级)二等奖(第一完成人)。

高性能对称密码计算研究,2022年华为公司“火花奖”。

上海市晨光学者。

10 访问

相关教师