头像

Wanggaoli

      

About

  • Department:
  • Graduate School:
  • Degree:
  • Academic Credentials:
  • PostCode:
  • Tel: 15021607967
  • Fax:
  • Email: glwang@sei.ecnu.edu.cn
  • Office: 3663 North Zhongshan Road, Science Buidling B1209, Shanghai 200062
  • Address: 3663 North Zhongshan Road, Science Buidling B1209, Shanghai 200062

Education

WorkExperience

Resume

Other Appointments

Research Fields

Cryptography and Network Security, Cryptanalysis and Design of Cryptographic Algorithm

Enrollment and Training

Course

Scientific Research

Academic Achievements

[1] Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe. 

Finding Practical Distinguishers for ZUC-256 Using Modular Differences. https://eprint.iacr.org/2021/1104

[2]Gao Wang, Gaoli Wang*. Improved Differential-ML Distinguisher: Machine Learning Based GeneriExtension for Differential Analysis. ICICS 2021, Part II, LNCS 12919. (CCF C)

[3] Yanzhao Shen, Ting Wu, Gaoli Wang*, Xinfeng Dong, Haifeng Qian. Improved Collision Detection Of MD5 Using Sufficient Condition Combination. The Computer Journal, bxab109, https://doi.org/10.1093/comjnl/bxab109   (CCF B)

[4] Gao Wang, Gaoli Wang*, Yu He. Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers. TrustCom 2021.     (CCF C)

[5] Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. The Computer Journal, 64(8), pp. 1264-1276, 2021.   (CCF B)

[6] Gaoli Wang*, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig. Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. Designs, Codes and Cryptography, 88(5), pp. 887-930, 2020.    (CCF B)

[7] Shiqiang Zhu, Gaoli Wang*, Yu He, Haifeng Qian. Integral Attacks on Some Lightweight Block Ciphers. KSII Transactions on Internet and Information Systems, 14 (11), pp. 4502-4521, 2020.   (SCI)

[8] Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang. Generalized Related-key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT. Designs, Codes and Cryptography, 88(6): 1103-1126, 2020.     (CCF B)

[9] Yu He, Gaoli Wang*, Wenshan Li, Yizhi Ren. Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things. IEEE Access 8: 20920-20930, 2020.

[10] Fukang Liu, Christoph Dobraunig, FlorianMendel, Takanori Isobe, Gaoli Wang*, Zhenfu Cao*. Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO 2019, Part II, LNCS 11693, Springer. pp. 117-149,  Santa Barbara, CA, USA, August 18-22, 2019.  (三大国际密码顶级会议之一)
[11] Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao. New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol.2019(3), pp. 169-192 (2019) (FSE 2020).   (CCF B, CACR B)
[12] Chunbo Zhu, Gaoli Wang*, Boyu Zhu. Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192. ACISP 2019, LNCS 11547, Springer. pp. 573-587, Christchurch, New 
Zealand, July 3-5, 2019. ( CCF C,CACR C)
[13] Gaoli Wang*, Zhenfu Cao, Xiaolei Dong. Improved Fault-Tolerant Aggregate Signatures. The Computer Journal, 62(4), pp. 481-489, 2019 (CCF B)

[14] Fukang Liu, Zhenfu Cao, Gaoli Wang. Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. IWSEC 2019, LNCS 11689, pp. 287-305.
[15] Lele Chen, Gaoli Wang*, Guoyan Zhang. MILP-Based Related-key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. The Computer Journal, 62(12), pp. 1805- 1821, 2019(CCF B)
[16] Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang. Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. The 25th Conference on Selected Areas in Cryptography (SAC 2018),  LNCS 11349, Springer. pp. 1-23, Alberta, Canada, August 15-17, 2018. ( CCF C,CACR C)
[17] Yanzhao Shen, Gaoli Wang*. Improved Preimage Attacks on RIPEMD-160 and HAS-160. KSII Transactions on Internet and Information Systems, 12 (2), pp. 727-746. 2018. (SCI)
[18] Binbin Cui, Gaoli Wang*. Improved Distinguishing Attack on Step-reduced RIPEMD-
160. Computer Engineering. DOI:10.19678/j.issn.1000-3428.0052363 (in Chinese)
[19] Gaoli Wang*, Yanzhao Shen, Fukang Liu. Cryptanalysis of 48-step RIPEMD-160. IACR Transactions on Symmetric Cryptology (FSE -- Fast Software Encryption 2018), 2017(2), pp. 177-202.  (CCF B, CACR B)
[20] Fukang Liu, Florian Mendel, Gaoli Wang*. Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. The 23rd International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt 2017), Lecture Notes in Computer Science 10624, Springer. pp. 158-186, HongKong, China, December 3-7, 2017.   (三大国际密码顶级会议之一)
[21] Gaoli Wang*, Chunbo Zhu. Single Key Recovery Attacks on Reduced AES-192 and Kalyna-128/256. SCIENCE CHINA, Information Sciences, 60 (9), pp. 99-101, 2017.  (Supplementary material is available for this article at  10.1007/s11432-016-0417-7)    ( CCF B, CACR B )
[22] Ralph Ankele1, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang 
Meng Sim, Gaoli Wang. Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. International Conference on Applied Cryptography and Network Security (ACNS 2017), Lecture Notes in Computer Science 10355, Springer. pp. 2508-228, Kanazawa, Japan, Jul. 10-12, 2017.   ( CCF C, CACR C )
[23] Yongpeng Zhou, Gaoli Wang*. Improved Meaningful Collision Attack on MD4.  Computer Science, 44 (9), pp. 168-171, 2017  (in Chinese)
[24] Gaoli Wang*, Nan Gan. A Meet-in-the-Middle Attack on 8-Round mCrypton-96. Journal of Computer Research and Development, 53(3), pp. 666-673, 2016  (EI, in Chinese)
[25] Gaoli Wang, Gan Nan, Yue Li. Improved Differential Attack on 30-Round SIMON64. Wuhan University Journal of Natural Sciences. 21(1), pp. 75-83, 2016.
[26] Gaoli Wang*, Hongbo Yu. Improved Cryptanalysis on RIPEMD-128. IET Information Security, 9(6), pp. 354-364, 2015.    ( CACR B )
[27] Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved Boomerang Attacks on Round-Reduced SM3 and 8Keyed Permutation of BLAKE-256. IET Information Security, 9(3), pp.167-178, 2015.    ( CACR B )
[28] Yu Sasaki, Gaoli Wang, Lei Wang. Improved Single-Key Distinguisher on HMAC- MD5
and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 98(1), pp. 26-38, 2015.  (SCI)
[29] Gaoli Wang. Practical collision attack on 40-step RIPEMD-128. The Cryptographer’s Track at the RSA Conference 2014 (CT-RSA 2014), Lecture Notes in Computer Science 8366, Springer. pp. 444 - 460, San Franisco, CA, United states, Feb. 25-28, 2014.      ( CACR B )
[30] Gaoli Wang*, Yanzhao Shen. (Pseudo-)Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160. Information Security Conference (ISC 2014), Lecture Notes in Computer Science 8783, Springer. pp. 90-107, Hongkong, Nov. 1-4, 2014.  (CCF C, CACR C)
[31] Gaoli Wang*, Yanzhao Shen. Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding. Journal on Communications, 35(2), pp. 40-45, 2014.    (EI, in Chinese)
[32] Gaoli Wang*, Yanzhao Shen. Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function. Information Processing Letters, 113 (8), pp. 301-306, 2013.      ( CACR B )
[33] Gaoli Wang. Collision Attack on the Full Extended MD4 and Pseudo-preimage Attack on
RIPEMD. Journal of Computer Science and Technology, 28(1), pp. 129-143, 2013.   ( CCF B )
[34] Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved Boomerang Attacks on SM3. The 18th Australasian Conference on Information Security and Privacy (ACISP 2013), Lecture Notes in Computer Science 7959, Springer. pp. 251-266, Brisbane, Australia, Jul. 1- 3, 2013.  ( CCF C, CACR C )
[35] Gaoli Wang*, Shasha Jiang, Yanzhao Shen, Yue Li. Improved 3-dimensional Meet-in-the-middle Cryptanalysis of KTANTAN32. Journal of Sichuan University (Engineering Science Edition),45(6), pp. 8-14, 2013.  (EI, in Chinese)
[36] Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang*, Amr M.Youssef. Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. The 19th International Conference on Selected Areas in Cryptography (SAC 2012), Lecture Notes in Computer Science 7707, Springer. pp. 305-321, Windsor, Canada, Aug. 15-16, 2012. ( CCF C, CACR C )
[37] Gaoli Wang*, Shaohui Wang. Integral cryptanalysis of reduced-round MIBS block cipher. Journal of Chinese Computer Systems, 33 (4), pp.773-777, 2012.    (in Chinese)
[38] Gaoli Wang. Collision Attack for the Hash Function Extended MD4. The 13th 
International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science 7043, Springer. pp. 228-241, Beijing, China, Nov. 23-26, 2011.(CCF C )
[39] Gaoli Wang*, Shaohui Wang. Improved Differential Cryptanalysis of Serpent. International Conference on Computational Intelligence and Security (CIS 2010), IEEE. pp. 367-371, Nanning, China, Dec. 11-14, 2010.(EI)
[40] Gaoli Wang. Distinguishing Attacks on LPMAC Based on the full RIPEMD and Reduced-Step RIPEMD-{256,320}. The 6th International Conference on Information Security and Cryptology (INSCRYPT 2010), Lecture Notes in Computer Science 6584, Springer. p
p. 199-217, Shanghai, China, Oct. 20-24, 2010. ( CACR C)
[41] Gaoli Wang*, Shaohui Wang. Preimage Attack on Hash Function RIPEMD. The 5th International Conference on Information Security Practice and Experience (ISPEC 2009), Lecture Notes in Computer Science 5451, Springer. pp. 274-284, Xi an, China, Apr. 13-15, 2009. ( CACR C )
[42] Gaoli Wang*, Shaohui Wang. Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-5-Pass HAVAL. The 2nd International Conference on Cryptology in Africa (AFRICACRYPT 2009), Lecture Notes in Computer Science 5580, Springer. pp. 1-13, Gammarth, Tunisia, Jun. 21-25, 2009. ( CACR C)
[43] Gaoli Wang*, Meiqin Wang. Cryptanalysis of reduced RIPEMD-128. 软件学报, 19(9), pp. 2442-2448, 2008. (一级学科国内顶级期刊)


Honor

10 Visits

Related to the teacher