当前位置: X-MOL首页全球导师 国内导师 › 王小云

个人简介

教育背景 1987年,山东大学 数学系获学士学位 1990年,山东大学 数学系获硕士学位 1993年,山东大学 数学系获博士学位 工作履历 1993.7-1995.6 山东大学 数学系 讲师 1995.7-2001.6 山东大学 数学系 副教授 2001.7至今 山东大学 数学学院 教授 2005.7至今 清华大学 高等研究院 杨振宁讲座教授 奖励与荣誉 获2020年国际密码协会“最具时间价值奖”(IACR Test-of-Time Awards)、真实世界密码学奖(The Levchin Prize for Real-World Cryptography);2019 年未来科学大奖——数学与计算机科学奖;2018年北京市“三八”红旗奖章;2017年全国创新争先奖状;2016年全国优秀科技工作者、网络安全优秀人才奖;2014年中国密码学会密码创新奖特等奖;2010年苏步青应用数学奖;2008年国家自然科学二等奖;2006年陈嘉庚科学奖、求是杰出科学家奖、中国青年女科学家奖等。

研究领域

主要从事密码理论及相关数学问题研究。在密码分析领域,提出了密码哈希函数的碰撞攻击理论,即模差分比特分析法;破解了包括MD5、SHA-1在内的5个国际通用哈希函数算法;将比特分析法进一步应用于带密钥的密码算法包括消息认证码、对称加密算法、认证加密算法的分析,给出系列重要算法HMAC-MD5、MD5-MAC、Keccak-MAC等重要分析结果;给出了格最短向量求解的启发式算法二重筛法以及带Gap格的反转定理等。在密码设计领域,主持设计的哈希函数SM3为国家密码算法标准,在金融、交通、国家电网等重要经济领域广泛使用,并于2018年10月正式成为ISO/IEC国际标准。

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Xiaoyun Wang*, Yiqun Lisa Yin, Hongbo Yu, Finding Collisions in the Full SHA-1, Advances in Cryptology-CRYPTO 2005, LNCS 3621, 2005, pp. 17-36 (Best Paper Award) ; Xiaoyun Wang*, Hongbo Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, 2005, pp. 19-35(Best Paper Award); Xiaoyun Wang*, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, 2005, pp. 1-18 (Best Paper Award); Hongbo Yu, Gaoli Wang, Guoyan Zhang,Xiaoyun Wang*, The Second-Preimage Attack on MD4, CANS 2005, LNCS 3810, 2005, pp. 1-12 (Best Paper Award); Ximing Fu,Xiaoyun Wang*, Xiaoyang Dong, Willi Meier.A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184 Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu,Xiaoyun Wang*, New Birthday Attacks on Some MACs Based on Block Ciphers, Advances in Cryptology-CRYPTO 2009, LNCS 5677, 2009, pp. 209-230; Xiaoyun Wang*, Hongbo Yu, Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0, Advances in Cryptology-CRYPTO 2005, LNCS 3621, 2005, pp. 1-16; Senyang Huang,Xiaoyun Wang*, Guangwu Xu, Meiqin Wang, Jingyuan Zhao.Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT (2) 2017: 259-288 Xiaoyun Wang*, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan, Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, Advances in Cryptology-EUROCRYPT 2009, LNCS 5479, 2009, pp. 121-133; Zheng Li, Wenquan Bi, Xiaoyang Dong,Xiaoyun Wang*.Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127 Zheng Li, Xiaoyang Dong,Xiaoyun Wang*.Conditional Cube Attack on Round-Reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1): 175-202 (2017) Xiaoyang Dong, Zheng Li,Xiaoyun Wang*, Ling Qin.Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1): 259-280 (2017) Huaifeng Chen,Xiaoyun Wang*. Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques. FSE 2016, LNCS 9783, pp. 428-449; Xiaoyang Dong,Xiaoyun Wang*. Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Trans. Symmetric Cryptol. 2016(1): 13-32 (2016) Leibo Li, Keting Jia,Xiaoyun Wang*, Xiaoyang Dong, Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia, FSE 2015, LNCS 9054, pp. 48-70; Leibo Li, Keting Jia,Xiaoyun Wang*, Improved Single-Key Attacks on 9-Round AES-192/256, FSE 2014, LNCS 8540, 2015, pp. 1-20; Hongbo Yu, Jiazhe Chen,Xiaoyun Wang, Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256, FSE 2013, LNCS 8424, 2014, pp. 263–283; Xiaoyun Wang*, Wei Wang, Keting Jia, Meiqin Wang, New Distinguishing Attack on MAC using Secret-Prefix Method, FSE 2009, LNCS 5665, 2009, pp. 363-374; Hongbo Yu,Xiaoyun Wang*, Aaram Yun, Sangwoo Park, Cryptanalysis of the Full HAVAL with 4 and 5 Passes, FSE 2006, LNCS 4047, 2006, pp. 89-110; Yang Yu, Guangwu Xu,Xiaoyun Wang*.Provably Secure NTRU Instances over Prime Cyclotomic Rings. Public Key Cryptography (1) 2017: 409-434 Xiaoyun Wang*, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan. Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000, LNCS 1751, pp. 167-177 Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong,Xiaoyun Wang*.MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptogr. 87(6): 1271-1296 (2019) Wenquan Bi, Zheng Li, Xiaoyang Dong , Lu Li,Xiaoyun Wang*.Conditional cube attack on round-reduced River Keyak. Des. Codes Cryptogr. 86(6): 1295-1310 (2018) Xiaoyang Dong, Zheng Li,Xiaoyun Wang*.Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2): 22501:1-22501:12 (2019) Rui Zong, Xiaoyang Dong,Xiaoyun Wang*.Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci. China Inf. Sci. 62(3): 32102:1-32102:12 (2019) Ning Wang,Xiaoyun Wang*, Keting Jia, Jingyuan Zhao.Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Inf. Sci. 61(9): 098103:1-098103:3 (2018) Zhongxiang Zheng,Xiaoyun Wang*, Guangwu Xu, Yang Yu.Orthogonalized lattice enumeration for solving SVP. Sci. China Inf. Sci. 61(3): 32115:1-32115:15 (2018) Xiaoyang Dong,Xiaoyun Wang*.Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10): 102501:1-102501:7 (2018) Yaoling Ding,Xiaoyun Wang*, Ning Wang, Wei Wang.Improved automatic search of impossible differentials for camellia with FL/FL -1 layers. Sci. China Inf. Sci. 61(3): 038103:1-038103:3 (2018) Meiqin Wang,Xiaoyun Wang, Lucas C.K. Hui, Differential-algebraic cryptanalysis of reduced-round of Serpent-256, Science China Information Sciences, 53(3), 2010, pp. 546-556; Lidong Han,Xiaoyun Wang, Gusangwu Xu,On an Attack on RSA with Small CRT-Exponents,Science China Information Sciences, 53(8), 2010, pp. 1511-1518; Haina Zhang, Lin Li,Xiaoyun Wang*, Fast Correlation Attack on Stream Cipher ABC v3, Science in China Series F, Information Sciences, 51(7), 2007, pp. 936-947; Xiaoyun Wang*, Dengguo Feng, Xiuyuan Yu, An Attack on Hash Function HAVAL-128, Science in China Series F, Information Sciences, 48(5), 2005, pp. 545-556;

推荐链接
down
wechat
bug