个人介绍

姓名:董晓阳
职称:副教授
邮箱:
xiaoyangdong@tsinghua.edu.cn

 

教育背景

理学博士(信息安全),山东大学,中国,2012-2017
理学学士(数学类),山东大学,中国,2008-2012

工作履历

副教授、博导,清华大学,中国,2024.2-至今
副研究员,清华大学,中国,2020.2-2024.2
博士后,清华大学,中国,2017.7-2020.2

社会兼职

第四届中国密码学会密码数学理论专业委员会委员(2022-至今)
ASIACRYPT 2023 程序委员会委员

研究领域

       对称密码分析和设计,包括:比特分析法、量子分析法、密码分析自动化、人工智能与安全分析、分组密码、哈希函数、认证加密等。

奖励与支持

中国密码学会优秀青年奖 2023
北京信息科学与技术国家研究中心青年创新基金项目 2023
第十届北京市优秀青年人才 2023
国家自然科学基金面上项目 2023
密码科学技术国家重点实验室重点课题 2022
万人计划青年拔尖 2022
清华大学笃实专项 2022
国家自然科学基金青年科学基金 2020
中国科协青年人才托举 2018
“十三五”国家密码发展基金重点项目 2018
中国博士后科学基金第62批面上资助 2017

学术成果

[1] Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang: Generic MitM Attack Frameworks on Sponge Constructions. To appear at CRYPTO 2024
[2] Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang: Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR Trans. Symmetric Cryptol. 2024(1): 158-187 (2024)
[3] Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang: Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023)
[4] Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang: Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. ASIACRYPT (3) 2023: 3-33
[5] Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang: Automated Meet-in-the-Middle Attack Goes to Feistel. ASIACRYPT (3) 2023: 370-404
[6] Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing. EUROCRYPT (4) 2023: 158-188
[7] Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang: Improved MITM Cryptanalysis on Streebog. IACR Trans. Symmetric Cryptol. 2022(2): 63-91 (2022)
[8] Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang: Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. ASIACRYPT (1) 2022: 287-317
[9] Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham: Triangulating Rebound Attack on AES-like Hashing. CRYPTO (1) 2022: 94-124
[10] Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang: Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. EUROCRYPT (3) 2022: 3-33
[11] Rui Zong, Xiaoyang Dong, Huaifeng Chen, Yiyuan Luo, Si Wang, Zheng Li: Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128. IACR Trans. Symmetric Cryptol. 2021(1): 156-184 (2021)
[12] Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You: (Quantum) Collision Attacks on Reduced Simpira v2. IACR Trans. Symmetric Cryptol. 2021(2): 222-248 (2021)
[13] Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu: Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021)
[14] Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu: Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. ASIACRYPT (1) 2021: 241-271
[15] Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu: Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. CRYPTO (3) 2021: 278-308
[16] Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong: Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. DATE 2021: 176-181
[17] Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang: Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804
[18] Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang: Quantum attacks on some Feistel block ciphers. Des. Codes Cryptogr. 88(6): 1179-1203 (2020)
[19] Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020)
[20] Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu: Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. ASIACRYPT (2) 2020: 727-757
[21] Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang: MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptogr. 87(6): 1271-1296 (2019)
[22] Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier: New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019)
[23] Boxin Zhao, Xiaoyang Dong, Keting Jia: New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Trans. Symmetric Cryptol. 2019(3): 121-151 (2019)
[24] Baoyu Zhu, Xiaoyang Dong, Hongbo Yu: MILP-Based Differential Attack on Round-Reduced GIFT. CT-RSA 2019: 372-390
[25] Zheng Li, Xiaoyang Dong, Xiaoyun Wang: Conditional Cube Attack on Round-Reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1): 175-202 (2017)
[26] Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin: Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1): 259-280 (2017)
[27] Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang: Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127
[28] Xiaoyang Dong, Xiaoyun Wang: Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Trans. Symmetric Cryptol. 2016(1): 13-32 (2016)
[29] Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang: Improved Attacks on Reduced-Round Camellia-128/192/256. CT-RSA 2015: 59-83
[30] Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong: Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. FSE 2015: 48-70