Gaoli Wang
Orcid: 0000-0002-2121-9306
According to our database1,
Gaoli Wang
authored at least 63 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
HML-BFT: Hybrid multi-layer BFT consensus with reputation model for large-scale blockchain.
Peer Peer Netw. Appl., February, 2025
2024
IEEE Trans. Mob. Comput., April, 2024
Enhanced related-key differential neural distinguishers for SIMON and SIMECK block ciphers.
PeerJ Comput. Sci., 2024
J. Inf. Secur. Appl., 2024
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis.
IET Inf. Secur., 2024
IEICE Trans. Inf. Syst., 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol.
Symmetry, August, 2023
J. Inf. Secur. Appl., 2023
A Multifactor Combined Data Sharing Scheme for Vehicular Fog Computing Using Blockchain.
IEEE Internet Things J., 2023
Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network.
IEEE Internet Things J., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Trans. Symmetric Cryptol., 2022
Comput. J., 2022
Differentially Private Decentralized Traffic Flow Prediction Approach based on Federated Learning.
Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Comput. J., 2021
Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Improved Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Analysis.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
KSII Trans. Internet Inf. Syst., 2020
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT.
Des. Codes Cryptogr., 2020
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160.
Des. Codes Cryptogr., 2020
Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things.
IEEE Access, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
Comput. J., 2019
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
KSII Trans. Internet Inf. Syst., 2018
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Sci. China Inf. Sci., 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
IET Inf. Secur., 2015
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
Proceedings of the Information Security - 17th International Conference, 2014
2013
J. Comput. Sci. Technol., 2013
Inf. Process. Lett., 2013
Int. J. Distributed Sens. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the Information Security Practice and Experience, 2009
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.
Proceedings of the Progress in Cryptology, 2009
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Information Security Practice and Experience, 2007
2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005