姓名:于洪波
职称:副教授
邮箱:yuhongbo@tsinghua.edu.cn
教育背景
1998.09-2002.07 山东大学数学院(计算数学)学士
2002.09-2007.07 山东大学数学院(信息安全)博士
研究领域
密码算法与设计研究
研究概况
长期从事密码算法与设计研究。在杂凑算法设计与分析方面取得重要研究成果,获得国家科技进步一等奖1次(6/12,待授奖)和国家自然科学二等奖1次(2/2,2008年),省部级一等奖2次。关于MD5破解得论文获得2008年汤姆森路透社卓越研究奖,关于SHA-1破解的论文2020年获得国际密码学会授予的“最具时间检验奖”。参与设计的我国密码杂凑函数标准SM3,2018年被纳入国际ISO/IEC标准。代表性论文发表在Crypto, Eurocrypt, FSE (IACR Transactions on Symmetric Cryptology),CT-RSA 等密码学顶级会议或期刊上, 被Web of Science 他引上千次,Google Scholar引用超过3000次。负责或参与了“973”计划、“863”课题、自然科学基金重点项目、自然科学基金面上项目、科技部重点研发项目等多项国家级项目或课题。
奖励和荣誉
[1] 国家科技进步一等奖, 6/12,待授奖, 2020
[2] 国家自然科学二等奖, 2/2,2008年
[3]国际密码学会授予的“最具时间检验奖”,2020
[4] 汤姆森路透社卓越研究奖, 2008
[5] 中国密码学会优秀青年奖(2011年)
部分研究成果
[1] Improved Preimage Attacks on 4-Round Keccak-224/256, IACR Transactions on Symmetric Cryptology, 2021 Issue 1. Le He, Xiaoen Lin, Hongbo Yu*.
[2] MILP-Based Differential Attack on Round-Reduced GIFT, Topics in Cryptology - CT-RSA 2019, pp.372-390, 2019, Baoyu Zhu&, Xiaoyang Dong, Hongbo Yu*.
[3] Improved Cryptanalysis of step-reduced SM3, SCIENCE CHINA INFORMATON SCIENCES, volume 61(3), 2018, Yanzhao Shen, Dongxia Bai, Hongbo Yu*.
[4] Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack, SCIENCE CHINA INFORMATON SCIENCES, volume 9(5), 2016. Hongbo Yu*, Yonglin Hao, Dongxia Bai.
[5]Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. IET Information Security 9(3): 167-178, 2016, Dongxia Bai, Hongbo Yu*, Gaoli Wang, Xiaoyun Wang.
[6] SM3 密码杂凑算法,信息安全研究.2016(11). 983-994. 王小云,于红波。
[7] Evaluate the security margins of SHA-512, SHA-256 and DHA-256against the boomerang attack,SCIENCE CHINA,2016.3.10,59(5), YU Hongbo(#)(*),HAO Yonglin,Bai Dongxia.
[8] Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256, IET Information Security, volume 9(3), 2015, pp.167-178. Dongxia Bai& , Hongbo Yu*, Gaoli Wang, Xiaoyun Wang
[9] Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256, FSE 2013, 2014, LNCS 8424, pp.263-283. Hongbo Yu*, Jiazhe Chen, Xiaoyun Wang
[10] Cryptanalysis of GOST R hash function,Information ProcessingLetters,2014.7.7,2014(114):655~662. Zongyue Wang (#),Hongbo Yu (*),Xiaoyun Wang
[11] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA,ISC2013,Dongxia Ba(#),Hongbo Yu(*)
[12] Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, Eurocrypt 2009, 2009, LNCS 5479, pp.121-133. Xiaoyun Wang*, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan
[13] How to Break MD5 and Other Hash Functions, Eurocrypt 2005,2005, LNCS 3494, pp.19-35. Xiaoyun Wang*, Hongbo Yu
[14] Finding Collisions in the full SHA-1, Crypto 2005, 2005, LNCS 3621, pp.17-36. Xiaoyun Wang*, Yiqun Lisa Yin, Hongbo Yu