热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
王高丽
2023-05-10 19:25
  • 王高丽
  • 王高丽 - 博士 博导-华东师范大学-软件工程学院-个人资料

近期热点

资料介绍

个人简历


教育经历
1999~2003年,山东大学,数学与系统科学学院,学士学位(专业:基础数学),
2003~2008年,山东大学,数学学院,博士学位(专业:信息安全,导师:王小云院士)
主讲本科课程
现代密码学:2018年~2019年
网络安全导论:2016年~至今
信息安全数学基础:2008年~2015年
应用密码学:2009年~2015年
离散数学:2013. 3~2013. 7

科研项目
国家自然科学基金(面上、青年项目,主持)
国家密码发展基金(主持)
国家重点实验室基金(主持)
国家自然科学基金(参加)
国防科技预研计划(参加)
晨光学者

获奖情况:
获得2016年度党政密码科学技术进步奖(省部级)二等奖(第一完成人)。
部分报告:
2019 密码学与网络安全前沿论坛(邀请报告)
2019 密码学与数据安全学术会议(邀请报告)
2019 第五届“密码学沙龙——密码分析前沿”论坛(邀请报告)
2018 FSE 2018(大会报告)
2018 第五届密码与安全前瞻性论坛(邀请报告)
2017 “密码学沙龙——密码分析前沿”论坛(邀请报告)
荣誉及奖励
获得2016年度党政密码科学技术进步奖(省部级)二等奖(第一完成人)。

研究领域


密码算法的分析与设计,密码学与信息安全""

近期论文


[1] Gaoli Wang, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig. Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. Designs, Codes and Cryptography, 88(5): 887-930, 2020. (CCF B)
[2] Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang. Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Designs, Codes and Cryptography, 88(6): 1103-1126, 2020. (CCF B)
[3] Yu He, Gaoli Wang*, Wenshan Li, Yizhi Ren. Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things. IEEE Access 8: 20920-20930, 2020.
[4] Fukang Liu, Christoph Dobraunig, FlorianMendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao. Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO 2019, Part II, LNCS 11693, Springer. pp. 117-149, Santa Barbara, CA, USA, August 18-22, 2019. (三大国际密码顶级会议之一)
[5] Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao. New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol.2019(3), pp. 169-192 (2019) (FSE 2020). (CCF B, CACR B)
[6] Chunbo Zhu, Gaoli Wang*, Boyu Zhu. Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192. ACISP 2019, LNCS 11547, Springer. pp. 573-587, Christchurch, New Zealand, July 3-5, 2019. ( CCF C,CACR C)
[7] Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved Fault-Tolerant Aggregate Signatures. The Computer Journal, 62(4), pp. 481-489, 2019 (CCF B)
[8] Fukang Liu, Zhenfu Cao, Gaoli Wang. Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. IWSEC 2019, LNCS 11689, pp. 287-305.
[9] Lele Chen, Gaoli Wang, Guoyan Zhang. MILP-Based Related-key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. The Computer Journal, 62(12), pp. 1805- 1821, 2019(CCF B)
[10] Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang. Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. The 25th Conference on Selected Areas in Cryptography (SAC 2018), LNCS 11349, Springer. pp. 1-23, Alberta, Canada, August 15-17, 2018. ( CCF C,CACR C)
[11] Yanzhao Shen, Gaoli Wang*. Improved Preimage Attacks on RIPEMD-160 and HAS-160. KSII Transactions on Internet and Information Systems, 12 (2), pp. 727-746. 2018. (SCI)
[12] Binbin Cui, Gaoli Wang*. Improved Distinguishing Attack on Step-reduced RIPEMD-160. Computer Engineering. DOI:10.19678/j.issn.1000-3428.0052363 (in Chinese)
[13] Gaoli Wang*, Yanzhao Shen, Fukang Liu. Cryptanalysis of 48-step RIPEMD-160. IACR Transactions on Symmetric Cryptology (FSE -- Fast Software Encryption 2018), 2017(2), pp. 177-202. (CCF B, CACR B)
[14] Fukang Liu, Florian Mendel, Gaoli Wang*. Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. The 23rd International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt 2017), Lecture Notes in Computer Science 10624, Springer. pp. 158-186, HongKong, China, December 3-7, 2017. (三大国际密码顶级会议之一)
[15] Gaoli Wang*, Chunbo Zhu. Single Key Recovery Attacks on Reduced AES-192 and Kalyna-128/256. SCIENCE CHINA, Information Sciences, 60 (9), pp. 99-101, 2017. (Supplementary material is available for this article at 10.1007/s11432-016-0417-7) ( CCF B, CACR B )
[16] Ralph Ankele1, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang. Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. International Conference on Applied Cryptography and Network Security (ACNS 2017), Lecture Notes in Computer Science 10355, Springer. pp. 208-228, Kanazawa, Japan, Jul. 10-12, 2017. ( CCF C, CACR C )
[17] Yongpeng Zhou, Gaoli Wang*. Improved Meaningful Collision Attack on MD4. Computer Science, 44 (9), pp. 168-171, 2017 (in Chinese)
[18] Gaoli Wang*, Nan Gan. A Meet-in-the-Middle Attack on 8-Round mCrypton-96. Journal of Computer Research and Development, 53(3), pp. 666-673, 2016 (EI, in Chinese)
[19] Gaoli Wang, Gan Nan, Yue Li. Improved Differential Attack on 30-Round SIMON64. Wuhan University Journal of Natural Sciences. 21(1), pp. 75-83, 2016.
[20] Gaoli Wang*, Hongbo Yu. Improved Cryptanalysis on RIPEMD-128. IET Information Security, 9(6), pp. 354-364, 2015. ( CACR B )
[21] Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256. IET Information Security, 9(3), pp.167-178, 2015. ( CACR B )
[22] Yu Sasaki, Gaoli Wang, Lei Wang. Improved Single-Key Distinguisher on HMAC- MD5and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 98(1), pp. 26-38, 2015. (SCI)
[23] Gaoli Wang. Practical collision attack on 40-step RIPEMD-128. The Cryptographer’s Track at the RSA Conference 2014 (CT-RSA 2014), Lecture Notes in Computer Science 8366, Springer. pp. 444 - 460, San Francisco, CA, United states, Feb. 25-28, 2014. ( CACR B )
[24] Gaoli Wang*, Yanzhao Shen. (Pseudo-)Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160. Information Security Conference (ISC 2014), Lecture Notes in Computer Science 8783, Springer. pp. 90-107, Hongkong, Nov. 1-4, 2014. (CCF C, CACR C)
[25] Gaoli Wang*, Yanzhao Shen. Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding. Journal on Communications, 35(2), pp. 40-45, 2014. (EI, in Chinese)
[26] Gaoli Wang*, Yanzhao Shen. Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function. Information Processing Letters, 113 (8), pp. 301-306, 2013. ( CACR B )
[27] Gaoli Wang. Collision Attack on the Full Extended MD4 and Pseudo-preimage Attack onRIPEMD. Journal of Computer Science and Technology, 28(1), pp. 129-143, 2013. ( CCF B )
[28] Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved Boomerang Attacks on SM3. The 18th Australasian Conference on Information Security and Privacy (ACISP 2013), Lecture Notes in Computer Science 7959, Springer. pp. 251-266, Brisbane, Australia, Jul. 1- 3, 2013. ( CCF C, CACR C )
[29] Gaoli Wang*, Shasha Jiang, Yanzhao Shen, Yue Li. Improved 3-dimensional Meet-in-the-middle Cryptanalysis of KTANTAN32. Journal of Sichuan University (Engineering Science Edition),45(6), pp. 8-14, 2013. (EI, in Chinese)
[30] Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang*, Amr M.Youssef. Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. The 19th International Conference on Selected Areas in Cryptography (SAC 2012), Lecture Notes in Computer Science 7707, Springer. pp. 305-321, Windsor, Canada, Aug. 15-16, 2012. ( CCF C, CACR C )
[31] Gaoli Wang*, Shaohui Wang. Integral cryptanalysis of reduced-round MIBS block cipher. Journal of Chinese Computer Systems, 33 (4), pp.773-777, 2012. (in Chinese)
[32] Gaoli Wang. Collision Attack for the Hash Function Extended MD4. The 13th International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science 7043, Springer. pp. 228-241, Beijing, China, Nov. 23-26, 2011.(CCF C )
[33] Gaoli Wang*, Shaohui Wang. Improved Differential Cryptanalysis of Serpent. International Conference on Computational Intelligence and Security (CIS 2010), IEEE. pp. 367-371, Nanning, China, Dec. 11-14, 2010.(EI)
[34] Gaoli Wang. Distinguishing Attacks on LPMAC Based on the full RIPEMD and Reduced-Step RIPEMD-{256,320}. The 6th International Conference on Information Security and Cryptology (INSCRYPT 2010), Lecture Notes in Computer Science 6584, Springer. pp. 199-217, Shanghai, China, Oct. 20-24, 2010. ( CACR C)
[35] Gaoli Wang*, Shaohui Wang. Preimage Attack on Hash Function RIPEMD. The 5th International Conference on Information Security Practice and Experience (ISPEC 2009), Lecture Notes in Computer Science 5451, Springer. pp. 274-284, Xi an, China, Apr. 13-15, 2009. ( CACR C )
[36] Gaoli Wang*, Shaohui Wang. Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-5-Pass HAVAL. The 2nd International Conference on Cryptology in Africa (AFRICACRYPT 2009), Lecture Notes in Computer Science 5580, Springer. pp. 1-13, Gammarth, Tunisia, Jun. 21-25, 2009. ( CACR C)
[37] Gaoli Wang*, Meiqin Wang. Cryptanalysis of reduced RIPEMD-128. 软件学报, 19(9), pp. 2442-2448, 2008. ( CACR C )
社会服务:密码学多个重要国际会议和期刊的审稿人;国基函评。

相关热点

扫码添加好友