Xiaoyun Wang
C. N. Yang Professor
Academician of Chinese Academy of Sciences
IACR fellow

  

Education background

B.S.,   Mathematics Department , Shandong University, 1987.

M.S.,  Mathematics Department , Shandong University, 1990.

Ph.D., Mathematics Department , Shandong University, 1993.

Experience

Xiaoyun Wang was honored C. N. Yang Professorship in 2005, was appointed as “Yangtze-River” Scholar in 2006., the Academician of Chinese Academy of Sciences in 2017, and the International Association for Cryptologic Research (IACR) fellow in 2019.

Research Status

Xiaoyun Wang has been dedicating herself to cryptology and cryptologic mathematics. She developed the bit-based cryptanalysis theory, and gave the collision attack on five dedicated hash functions, including widely deployed MD5 and SHA-1 in the network world. She was in charge of designing SM3 cryptographic hash function, as the Chinese standard, which has currently been deployed widely in financial, transportation, state grid and other important economic fields in China. In October 2018, SM3 officially became one of the ISO/IEC international standards of new generation hash functions, which can provide the key technique of digital signatures, blockchains and many other cryptosystems. She also analysed some important cryptographic primitives with keys, including message authentication codes, symmetric ciphers and authenticated encryption schemes, and achieved very important results on HMAC-MD5, MD5-MAC, SIMON, Keccak-MAC, etc.
Main contributions of Xiaoyun Wang were published over 50 papers, many of which are in international top conferences in cryptology. There are 4 papers awarded the Best Paper, including CRYPTO 2005 and EUROCRYPT 2005 best papers.

Honors And Awards

She has made a significant contribution to cryptology and that won her numerous prizes and awards including the 2005 Test-of-Time Award for Crypto (2020), the Levchin Prize for Real-World Cryptography (2020), the Mathematics and Computer Science Prize of Future Science Prize (2019), the Special Prize for Cryptographic Innovation of Chinese Association for Cryptologic Research (2014), the CSIAM Su Buchin Prize (2010), the 2nd Class Prize of Chinese National Natural Science Award (2008), the Thomson Reuters Research Fronts Award (2007), the Tan Kah Kee Science Award (2006), and the Qiushi Outstanding Scientist Award (2006), etc.

Academic Achievement

[1] Xiaoyun Wang*, Yiqun Lisa Yin, Hongbo Yu, Finding Collisions in the Full SHA-1, Advances in Cryptology-CRYPTO 2005, LNCS 3621, 2005, pp. 17-36 (Best Paper Award) ;
[2] Xiaoyun Wang*, Hongbo Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, 2005, pp. 19-35(Best Paper Award);
[3] Xiaoyun Wang*, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, 2005, pp. 1-18 (Best Paper Award);
[4] Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang*, The Second-Preimage Attack on MD4, CANS 2005, LNCS 3810, 2005, pp. 1-12 (Best Paper Award);
[5] Ximing Fu, Xiaoyun Wang*, Xiaoyang Dong, Willi Meier.A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184
[6] Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang*, New Birthday Attacks on Some MACs Based on Block Ciphers, Advances in Cryptology-CRYPTO 2009, LNCS 5677, 2009, pp. 209-230;
[7] Xiaoyun Wang*, Hongbo Yu, Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0, Advances in Cryptology-CRYPTO 2005, LNCS 3621, 2005, pp. 1-16;
[8] Senyang Huang, Xiaoyun Wang*, Guangwu Xu, Meiqin Wang, Jingyuan Zhao.Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT (2) 2017: 259-288
[9] Xiaoyun Wang*, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan, Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, Advances in Cryptology-EUROCRYPT 2009, LNCS 5479, 2009, pp. 121-133;
[10] Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang*.Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127
[11] Zheng Li, Xiaoyang Dong, Xiaoyun Wang*.Conditional Cube Attack on Round-Reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1): 175-202 (2017)
[12] Xiaoyang Dong, Zheng Li, Xiaoyun Wang*, Ling Qin.Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1): 259-280 (2017)
[13] Huaifeng Chen, Xiaoyun Wang*. Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques. FSE 2016, LNCS 9783, pp.  428-449;
[14] Xiaoyang Dong, Xiaoyun Wang*. Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Trans. Symmetric Cryptol. 2016(1): 13-32 (2016)
[15] Leibo Li, Keting Jia, Xiaoyun Wang*, Xiaoyang Dong, Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia, FSE 2015, LNCS 9054, pp. 48-70;
[16] Leibo Li, Keting Jia, Xiaoyun Wang*, Improved Single-Key Attacks on 9-Round AES-192/256, FSE 2014, LNCS 8540, 2015, pp. 1-20;
[17] Hongbo Yu, Jiazhe Chen, Xiaoyun Wang, Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256, FSE 2013, LNCS 8424, 2014, pp. 263–283;
[18] Xiaoyun Wang*, Wei Wang, Keting Jia, Meiqin Wang, New Distinguishing Attack on MAC using Secret-Prefix Method, FSE 2009, LNCS 5665, 2009, pp. 363-374;
[19] Hongbo Yu, Xiaoyun Wang*, Aaram Yun, Sangwoo Park, Cryptanalysis of the Full HAVAL with 4 and 5 Passes, FSE 2006, LNCS 4047, 2006, pp. 89-110;
[20] Yang Yu, Guangwu Xu, Xiaoyun Wang*.Provably Secure NTRU Instances over Prime Cyclotomic Rings. Public Key Cryptography (1) 2017: 409-434
[21] Xiaoyun Wang*, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan. Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000, LNCS 1751, pp. 167-177
[22] Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang*.MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptogr. 87(6): 1271-1296 (2019)
[23] Wenquan Bi, Zheng Li, Xiaoyang Dong , Lu Li, Xiaoyun Wang*.Conditional cube attack on round-reduced River Keyak. Des. Codes Cryptogr. 86(6): 1295-1310 (2018)
[24] Xiaoyang Dong, Zheng Li, Xiaoyun Wang*.Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2): 22501:1-22501:12 (2019)
[25] Rui Zong, Xiaoyang Dong, Xiaoyun Wang*.Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci. China Inf. Sci. 62(3): 32102:1-32102:12 (2019)
[26] Ning Wang, Xiaoyun Wang*, Keting Jia, Jingyuan Zhao.Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Inf. Sci. 61(9): 098103:1-098103:3 (2018)
[27] Zhongxiang Zheng, Xiaoyun Wang*, Guangwu Xu, Yang Yu.Orthogonalized lattice enumeration for solving SVP. Sci. China Inf. Sci. 61(3): 32115:1-32115:15 (2018)
[28] Xiaoyang Dong, Xiaoyun Wang*.Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10): 102501:1-102501:7 (2018)
[29] Yaoling Ding, Xiaoyun Wang*, Ning Wang, Wei Wang.Improved automatic search of impossible differentials for camellia with FL/FL -1 layers. Sci. China Inf. Sci. 61(3): 038103:1-038103:3 (2018)
[30] Meiqin Wang, Xiaoyun Wang, Lucas C.K. Hui, Differential-algebraic cryptanalysis of reduced-round of Serpent-256, Science China Information Sciences, 53(3), 2010, pp. 546-556;
[31] Lidong Han, Xiaoyun Wang, Gusangwu Xu,On an Attack on RSA with Small CRT-Exponents,Science China Information Sciences, 53(8), 2010, pp. 1511-1518;
[32] Haina Zhang, Lin Li, Xiaoyun Wang*, Fast Correlation Attack on Stream Cipher ABC v3, Science in China Series F, Information Sciences, 51(7), 2007, pp. 936-947;
[33] Xiaoyun Wang*, Dengguo Feng, Xiuyuan Yu, An Attack on Hash Function HAVAL-128, Science in China Series F, Information Sciences, 48(5), 2005, pp. 545-556;