教师详细信息

王小云

清华大学高等研究院“杨振宁讲座”教授。

2017年当选中国科学院院士。

2019年当选国际密码协会会士(IACR Fellow)

教育背景

1987年,山东大学 数学系获学士学位

1990年,山东大学 数学系获硕士学位

1993年,山东大学 数学系获博士学位

工作履历

1993.7-1995.6 山东大学 数学系 讲师

1995.7-2001.6 山东大学 数学系 副教授

2001.7至今 山东大学 数学学院 教授

2005.7至今 清华大学 高等研究院 杨振宁讲座教授

研究概况

主要从事密码理论及相关数学问题研究。在密码分析领域,提出了密码哈希函数的碰撞攻击理论,即模差分比特分析法;破解了包括MD5、SHA-1在内的5个国际通用哈希函数算法;将比特分析法进一步应用于带密钥的密码算法包括消息认证码、对称加密算法、认证加密算法的分析,给出系列重要算法HMAC-MD5、MD5-MAC、Keccak-MAC等重要分析结果;给出了格最短向量求解的启发式算法二重筛法以及带Gap格的反转定理等。在密码设计领域,主持设计的哈希函数SM3为国家密码算法标准,在金融、交通、国家电网等重要经济领域广泛使用,并于2018年10月正式成为ISO/IEC国际标准。

代表性论文50余篇,3篇获欧密会、美密会最佳论文。

奖励与荣誉

获2020年国际密码协会“最具时间价值奖”(IACR Test-of-Time Awards)、真实世界密码学奖(The Levchin Prize for Real-World Cryptography);2019 年未来科学大奖——数学与计算机科学奖;2018年北京市“三八”红旗奖章;2017年全国创新争先奖状;2016年全国优秀科技工作者、网络安全优秀人才奖;2014年中国密码学会密码创新奖特等奖;2010年苏步青应用数学奖;2008年国家自然科学二等奖;2006年陈嘉庚科学奖、求是杰出科学家奖、中国青年女科学家奖等。

学术成果

[1] Xiaoyun Wang*, Yiqun Lisa Yin, Hongbo Yu, Finding Collisions in the Full SHA-1, Advances in Cryptology-CRYPTO 2005, LNCS 3621, 2005, pp. 17-36 (Best Paper Award) ;

[2] Xiaoyun Wang*, Hongbo Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, 2005, pp. 19-35(Best Paper Award);

[3] Xiaoyun Wang*, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, 2005, pp. 1-18 (Best Paper Award);

[4] Hongbo Yu, Gaoli Wang, Guoyan Zhang,Xiaoyun Wang*, The Second-Preimage Attack on MD4, CANS 2005, LNCS 3810, 2005, pp. 1-12 (Best Paper Award);

[5] Ximing Fu,Xiaoyun Wang*, Xiaoyang Dong, Willi Meier.A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184

[6] Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu,Xiaoyun Wang*, New Birthday Attacks on Some MACs Based on Block Ciphers, Advances in Cryptology-CRYPTO 2009, LNCS 5677, 2009, pp. 209-230;

[7] Xiaoyun Wang*, Hongbo Yu, Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0, Advances in Cryptology-CRYPTO 2005, LNCS 3621, 2005, pp. 1-16;

[8] Senyang Huang,Xiaoyun Wang*, Guangwu Xu, Meiqin Wang, Jingyuan Zhao.Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT (2) 2017: 259-288

[9] Xiaoyun Wang*, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan, Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, Advances in Cryptology-EUROCRYPT 2009, LNCS 5479, 2009, pp. 121-133;

[10] Zheng Li, Wenquan Bi, Xiaoyang Dong,Xiaoyun Wang*.Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127

[11] Zheng Li, Xiaoyang Dong,Xiaoyun Wang*.Conditional Cube Attack on Round-Reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1): 175-202 (2017)

[12] Xiaoyang Dong, Zheng Li,Xiaoyun Wang*, Ling Qin.Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1): 259-280 (2017)

[13] Huaifeng Chen,Xiaoyun Wang*. Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques. FSE 2016, LNCS 9783, pp. 428-449;

[14] Xiaoyang Dong,Xiaoyun Wang*. Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Trans. Symmetric Cryptol. 2016(1): 13-32 (2016)

[15] Leibo Li, Keting Jia,Xiaoyun Wang*, Xiaoyang Dong, Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia, FSE 2015, LNCS 9054, pp. 48-70;

[16] Leibo Li, Keting Jia,Xiaoyun Wang*, Improved Single-Key Attacks on 9-Round AES-192/256, FSE 2014, LNCS 8540, 2015, pp. 1-20;

[17] Hongbo Yu, Jiazhe Chen,Xiaoyun Wang, Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256, FSE 2013, LNCS 8424, 2014, pp. 263–283;

[18] Xiaoyun Wang*, Wei Wang, Keting Jia, Meiqin Wang, New Distinguishing Attack on MAC using Secret-Prefix Method, FSE 2009, LNCS 5665, 2009, pp. 363-374;

[19] Hongbo Yu,Xiaoyun Wang*, Aaram Yun, Sangwoo Park, Cryptanalysis of the Full HAVAL with 4 and 5 Passes, FSE 2006, LNCS 4047, 2006, pp. 89-110;

[20] Yang Yu, Guangwu Xu,Xiaoyun Wang*.Provably Secure NTRU Instances over Prime Cyclotomic Rings. Public Key Cryptography (1) 2017: 409-434

[21] Xiaoyun Wang*, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan. Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000, LNCS 1751, pp. 167-177

[22] Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong,Xiaoyun Wang*.MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptogr. 87(6): 1271-1296 (2019)

[23] Wenquan Bi, Zheng Li, Xiaoyang Dong , Lu Li,Xiaoyun Wang*.Conditional cube attack on round-reduced River Keyak. Des. Codes Cryptogr. 86(6): 1295-1310 (2018)

[24] Xiaoyang Dong, Zheng Li,Xiaoyun Wang*.Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2): 22501:1-22501:12 (2019)

[25] Rui Zong, Xiaoyang Dong,Xiaoyun Wang*.Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci. China Inf. Sci. 62(3): 32102:1-32102:12 (2019)

[26] Ning Wang,Xiaoyun Wang*, Keting Jia, Jingyuan Zhao.Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Inf. Sci. 61(9): 098103:1-098103:3 (2018)

[27] Zhongxiang Zheng,Xiaoyun Wang*, Guangwu Xu, Yang Yu.Orthogonalized lattice enumeration for solving SVP. Sci. China Inf. Sci. 61(3): 32115:1-32115:15 (2018)

[28] Xiaoyang Dong,Xiaoyun Wang*.Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10): 102501:1-102501:7 (2018)

[29] Yaoling Ding,Xiaoyun Wang*, Ning Wang, Wei Wang.Improved automatic search of impossible differentials for camellia with FL/FL -1 layers. Sci. China Inf. Sci. 61(3): 038103:1-038103:3 (2018)

[30] Meiqin Wang,Xiaoyun Wang, Lucas C.K. Hui, Differential-algebraic cryptanalysis of reduced-round of Serpent-256, Science China Information Sciences, 53(3), 2010, pp. 546-556;

[31] Lidong Han,Xiaoyun Wang, Gusangwu Xu,On an Attack on RSA with Small CRT-Exponents,Science China Information Sciences, 53(8), 2010, pp. 1511-1518;

[32] Haina Zhang, Lin Li,Xiaoyun Wang*, Fast Correlation Attack on Stream Cipher ABC v3, Science in China Series F, Information Sciences, 51(7), 2007, pp. 936-947;

[33] Xiaoyun Wang*, Dengguo Feng, Xiuyuan Yu, An Attack on Hash Function HAVAL-128, Science in China Series F, Information Sciences, 48(5), 2005, pp. 545-556;

下一篇:翟荟

图片新闻

more +