威尼斯(中国)官方入口-welcome NO.1

首页 -  师资队伍 -  教师名录 -  硕士生导师

硕士生导师

北理工威尼斯官方入口welcome_乔珂欣_FYY_1719.jpg

乔珂欣(Qiao Kexin)

特别副研究员,硕士生导师


出生年月:1990年3月

电子邮件:qiao.kexin@bit.edu.cn

办公地点:中心教学楼504




所在学科

网络空间安全


研究方向

密码算法,对称密码分析,侧信道密码分析


个人简历

2020/10-至今,北京理工大学,威尼斯官方入口welcome,特别副研究员

2017/07-2020/10,北京银联金卡科技有限公司,工程师

2015/12-2016/05,新加坡南洋理工大学,数理科学院,交流生

2012/09-2017/07,中国科学院信息工程研究所,信息安全国家重点实验室/DCS中心,博士

2008/09-2012/07,山东大学,数学学院,学士


代表性论著

代表性论文:

1. Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao and Ling Song. “Practical collision attacks against round-reduced SHA-3.”Journal of Cryptology 33,no.1 (2020): 228-270. (CCF-A)

2. Changhai Ou, Siew-Kei Lam, Degang Sun, Xinping Zhou, Kexin Qiao* and Qu Wang. “SNR-Centric Power Trace Extractors for Side-Channel Attacks.” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, DOI: 10.1109/TCAD.2020.3003849 (CCF-A,SCI 1区)

3. Kexin Qiao, Ling Song, Meicheng Liu, and Jian Guo. "New collision attacks on round-reduced Keccak." Advances in Cryptology-EUROCRYPT 2017, pp. 216-243. Paris, France, April 30 - May 4, 2017. (CCF-A)

4. Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu. “Analysis of AES, SKINNY, and Others with Constraint Programming.” IACR Transactions on Symmetric Cryptology, 2017(1), 281-306 (CCF-B)

5. Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma. “Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON.” Science China Information Sciences, 2017, Vol 60, Issue 3 (CCF-B)

6. Kexin Qiao, Lei Hu, Siwei Sun. “Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques.” Communications in Computer and Information Sciences. Springer 2017, Vol 691: 64–85.(EI)

7. Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim. “Invariant Subspace Attack Against Midori64 and the Resistance Criteria for S-box Designs.” IACR Transactions on Symmetric Cryptology, 2016(1), 33-56 (CCF-B)

8. Kexin Qiao, Lei Hu, and Siwei Sun. "Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques." In Proceedings of the 2nd International Conference on Information Systems Security and Privacy, pp. 74-84. Rome, Italy, February 19-21, 2016(EI)

9. Kexin Qiao, Lei Hu, Siwei Sun, Xiaoshuang Ma, and Haibin Kan. "Improved MILP modeling for automatic security evaluation and application to FOX." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 98, no. 1 (2015): 72-80. (SCI)

10. Kexin Qiao, Lei Hu, Siwei Sun, and Xiaoshuang Ma. "Related-key rectangle cryptanalysis of reduced-round block cipher MIBS." In 2015 9th International Conference on Application of Information and Communication Technologies (AICT), pp. 216-220. IEEE, Rostov-on-Don, Russia, October 14-16, 2015.(EI)

11. Xiaoshuang Ma, Kexin Qiao*. “Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher.” Network and System Security (NSS) 2015, pp. 331-344, New York, USA, November 3-5, 2015 (EI)

12. Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan. “Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.” Information Security Conference (ISC) 2015: 141-157. Trondheim, Norway, September 9-11, 2015 (CCF-C)

13. Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song. “Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.” International Workshop on Security (IWSEC) 2015: 97-111. Nara, Japan, August 26-28, 2015 (EI)

14. Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma. “Improved Differential Analysis of Block Cipher PRIDE.” International Conference on Information Security Practice and Experience (ISPEC) 2015: 209-219. Beijing, China, May 5-8, 2015 (EI)

15. Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song. “Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.” Advances in Cryptology-ASIACRYPT 2014: 158-178. Kaoshiung, Taiwan, December 7-11, 2014 (CCF-B)

16. Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan. “Tighter Security Bound of MIBS Block Cipher against Differential Attack.” Network and System Security (NSS) 2014: 518-525. Xi’an, China, October 15-17, 2014 (EI)


研究成果

在对称密码算法分析的研究上,对SHA-3 杂凑函数标准的碰撞攻击研究成果打破了此前由图灵奖获得者Adi Shamir 团队保持了长达五年的攻击记录, 是当前对该标准的最佳攻击结果;对分组密码的分析上,用基于约束规划的自动化分析方法对十余种分组密码算法给出安全性分析结果,部分得到最佳安全评估界。在密码学顶级会议及期刊EUROCRYPT、Journal of Cryptology、ASIACRYPT、FSE、SCIENCE CHINA 等发表十余篇论文。


荣获奖项

2017年荣获中国互联网发展基金会网络安全专项基金网络安全奖学金、中国科学院朱李月华优秀博士生奖学金等

2016 年荣获ICISSP最佳学生论文奖等