Wang Lei Professor


Office Telephone:

Office Address: SEIEE-3-519

Email: wanglei@cs.sjtu.edu.cn


  • Research
  • Education
  • Work Experience
  • Teaching Assignment
  • Publications
  • Project Fund
  • Awards
  • Academic Service


2002/09-2006/07    Shanghai Jiao Tong University    B.Eng

2007/04-2011/03    The University of Electro-Communications    PhD

2011/04-2012/06    The University of Electro-Communications,    JSPS Postdoctoral Researcher

2012/07-2015/06    Nanyang Technological University,    Research Fellow 

2015/07-present     Shanghai Jiao Tong University, Tenure-Track Research Professor

  • Discrete Mathematics
  • Big data security
Selected publications:
  •  Seraph: Enabling Cross-Platform Security Analysis for EVM and WASM Smart Contracts, ICSE 2020
  • Generic Attacks on Hash Combiners, Journal of Cryptology, 2019
  • Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security, Adcances in Cryptology- ASIACRYPT 2018
  • Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners, Advances in Cryptology - CRYPTO 2017
  • How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers, Advances in Cryptology - ASIACRYPT 2016
  • Known-key Distinguisher on Full PRESENT, Advances in Cryptology - CRYPTO 2015
  • The Sum Can Be Weaker Than Each Part, Advances in Cryptology - EUROCRYPT 2015
  • Updates on Generic Attacks against HMAC and NMAC, Advances in Cryptology - CRYPTO 2014
  • Generic Universal Forgery Attack on Iterative Hash-based MACs, Advances in Cryptology - EUROCRYPT 2014
  • Improved Cryptanalysis of Reduced RIPEMD-160, Advances in Cryptology -ASIACRYPT 2013
  • New Generic Attacks Against Hash-based MACs, Advances in Cryptology - ASIACRYPT 2013
  • Cryptanalysis of HMAC/NMAC-Whirlpool, Advances in Cryptology - ASIACRYPT 2013
  • Generic Related-key Attacks for HMAC, Advances in Cryptology - ASIACRYPT 2012
  • Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks,  Advances in Cryptology–ASIACRYPT 2012
  • Non-Full-Active Super-Sbox Analysis Application to ECHO and Groestl, Advances in Cryptology - ASIACRYPT 2010
  • How to Confirm Cryptosystems Security: The Original Merkle-Damgard is Still Alive!, Advances in Cryptology - ASIACRYPT 2009
  • Preimages for Step-Reduced SHA-2, Advances in Cryptology–ASIACRYPT 2009
  • New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5, Advances in Cryptology–EUROCRYPT 2008
National Nature Science Foundation of China, Youth Project, 2017-2019 (PI)

Natural Science Foundation of Shanghai, General Project, 2016-2019 (PI)

First Prize Award, Streebog Competition, 2015

Best Paper Award, IEICE Transactions, 2009

Best Paper Award, IWSEC 2009, 2012

General/Program Chair:

DIAC 2015, ASK 2015/2012

Program Committee:

ASIACRYPT 2017, FSE 2016-2019, EUROCRYPT 2014

Contact webmaster@cs.sjtu.edu.cn

Copyright @ 2013 SJTU Computer Science & Engineering All Rights Reserved