The second-preimage attack on MD4 H Yu, G Wang, G Zhang, X Wang International Conference on Cryptology and Network Security, 1-12, 2005 | 88 | 2005 |
Differential fault analysis on PRESENT key schedule G Wang, S Wang Computational Intelligence and Security (CIS), 2010 International Conference …, 2010 | 77 | 2010 |
Related-key impossible-differential attack on reduced-round SKINNY R Ankele, S Banik, A Chakraborti, E List, F Mendel, SM Sim, G Wang International Conference on Applied Cryptography and Network Security, 208-228, 2017 | 58 | 2017 |
Boomerang and slide-rotational analysis of the SM3 hash function A Kircanski, Y Shen, G Wang, AM Youssef International Conference on Selected Areas in Cryptography, 304-320, 2012 | 32 | 2012 |
The delicate issues of addition with respect to XOR differences G Wang, N Keller, O Dunkelman International Workshop on Selected Areas in Cryptography, 212-231, 2007 | 26 | 2007 |
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256 D Bai, H Yu, G Wang, X Wang IET Information Security 9 (3), 167-178, 2014 | 25 | 2014 |
Related-key rectangle attack on 43-round SHACAL-2 G Wang International Conference on Information Security Practice and Experience, 33-42, 2007 | 20 | 2007 |
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function. G Wang, Y Shen Inf. Process. Lett. 113 (8), 301-306, 2013 | 14 | 2013 |
Preimage attack on hash function RIPEMD G Wang, S Wang International Conference on Information Security Practice and Experience …, 2009 | 14 | 2009 |
Improved boomerang attacks on SM3 D Bai, H Yu, G Wang, X Wang Australasian Conference on Information Security and Privacy, 251-266, 2013 | 12 | 2013 |
Integral cryptanalysis of reduced-round MIBS block cipher GL Wang, SHX Wang Journal of Chinese Computer Systems 33 (4), 773-777, 2012 | 12 | 2012 |
Improved Preimage Attacks on RIPEMD-160 and HAS-160. Y Shen, G Wang KSII Transactions on Internet & Information Systems 12 (2), 2018 | 10 | 2018 |
Cryptanalysis of 48-step RIPEMD-160 G Wang, Y Shen, F Liu IACR Transactions on Symmetric Cryptology 2017 (2), 177-202, 2017 | 10 | 2017 |
A hybrid authenticated group key agreement protocol in wireless sensor networks Y Li, D Chen, W Li, G Wang, P Smith International Journal of Distributed Sensor Networks 9 (4), 716265, 2013 | 10 | 2013 |
Cryptanalysis of reduced RIPEMD-128 G Wang, M Wang Journal of Software 19 (9), 2442-2448, 2008 | 9* | 2008 |
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 F Liu, F Mendel, G Wang International Conference on the Theory and Application of Cryptology and …, 2017 | 8 | 2017 |
Single key recovery attacks on reduced AES-192 and Kalyna-128/256 G Wang, C Zhu Science China Information Sciences 60 (9), 099101, 2017 | 8 | 2017 |
Practical collision attack on 40-step RIPEMD-128 G Wang Cryptographers’ Track at the RSA Conference, 444-460, 2014 | 7 | 2014 |
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160 G Wang, Y Shen International Conference on Information Security, 90-103, 2014 | 5 | 2014 |
Improved cryptanalysis on RIPEMD-128 G Wang, H Yu IET Information Security 9 (6), 354-364, 2015 | 4 | 2015 |