Position: Home >> Academic Staff >> Hongbo Yu
¡¡

Biographical and Personal Information:

Mailing Address: Center for Advanced Study in Tsinghua University, Beijing 100084, China.
E-mail: yuhongbo@tsinghua.edu.cn.
Tel.: 86-10-62797327
.

Education:

B.S.: School of Mathematics & System Science of Shandong University, Shandong University,2002.
Ph.D.: School of Mathematics & System Science of Shandong University, Shandong University, 2007.

Research Interest:

Cryptology theory.

Professional Positions:

2007.7-2010.11, Associate Researcher, Center for Advanced Study in Tsinghua University.
2010.11-present, Associate Researcher, Department of Computer Science and Technology in Tsinghua University.

Publications:

  1. Cryptanalysis of the Compression Function of SIMD , Hongbo Yu, Xiaoyun Wang, http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/Program_SHA3_Aug2010.pdf, 2010
  2. Near-Collision Attack on the Compression Function of Dynamic SHA2, Hongbo Yu, Xiaoyun Wang, http://eprint.iacr.org/2009/179.pdf, 2009
  3. Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL , Hongbo Yu£¬Xiaoyun Wang, ISPEC 2009, LNCS 5451,pp.285-297,2009.
  4. Distinguishing Attack on the Secret-Prefix MAC Based on the 39-step SHA-256, Hongbo Yu£¬Xiaoyun Wang, ACISP 2009, LNCS 5594, pp.185-201,2009.
  5. Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan, Eurocrypt 2009, LNCS 5479, pp.121-133, 2009.
  6. Nonrandomness of 39-step SHA-256£¬ Hongbo Yu, Xiaoyun Wang, Eurocrypt 2008 rump session, 2008.
  7. Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL£¬Hongbo Yu, Xiaoyun Wang, ICISC 2007, LNCS 4817, pp.206-226,2007
  8. Cryptanalysis of the Full HAVAL with 4 and 5 Passes£¬ FSE 2006, Hongbo Yu, Xiaoyun Wang, Aaram Yun and Sangwoo Park, LNCS 4047, pp.89-110, 2006.
  9. Collisions for Some Hash Functions MD4, MD5, HAVAL-128, RIPRMD, Xiaoyun Wang, Dengguo Feng, Xuejia Lai and Hongbo Yu,
    http://eprint.iacr.org/2004/264/199.pdf £¬2004
  10. How to break MD5 and Other Hash Functions£¬ Eurocrypt 2005, Xiaoyun Wang, Hongbo Yu, LNCS 3494, pp.19-35, 2005.
  11. Efficient collision search attacks on SHA-0£¬ Crypto 2005, Xiaoyun Wang, Hongbo Yu, and Yinqun Lisa Yin, LNCS 3621, pp.1-16, 2005.
  12. Finding Collisions in the Full SHA-1£¬ Crypto 2005, Xiaoyun Wang, Yinqun Lisa Yin and Hongbo Yu, LNCS 3621, pp.17-36, 2005.
  13. The Second-Preimage Attack On MD4£¬ CANS 2005, Hongbo Yu, Gaoli Wang, Guoyan Zhang and Xiaoyun Wang, LNCS 3810, pp.1-25, 2005.

¡¡