Computer Science & Engineering

  • Name:Lei Wang
  • Title:Research Professor
  • Office:519
  • Office Phone:
  • Website:

Research Field



2002/09-2006/07????Shanghai Jiao Tong University????B.Eng
2007/04-2011/03????The University of Electro-Communications????PhD

Work experience

2011/04-2012/06????The University of Electro-Communications,????JSPS Postdoctoral Researcher
2012/07-2015/06????Nanyang Technological University,????Research Fellow?
2015/07-present???? Shanghai Jiao Tong University, Tenure-Track?Research Professor


mainly interested in the field of symmetric-key cryptography, including block cipher, hash function, message authentication code, authenticated encryption, etc.

Awards and Honors

1000 People Plan (Young Talents), 2017
First Prize Award, Streebog Competition, 2015
Best Paper Award, IEICE Transactions, 2009
Best Paper Award, IWSEC 2009, 2012


Discrete Mathematics
Big data security


Selected publications:
Functional Graph Revisited: Updates on?(Second) Preimage Attacks on Hash Combiners, Advances in Cryptology - CRYPTO 2017
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers, Advances in Cryptology - ASIACRYPT 2016
Known-key Distinguisher on Full PRESENT, Advances in Cryptology - CRYPTO 2015
The Sum Can Be Weaker Than Each Part, Advances in Cryptology - EUROCRYPT 2015
Updates on Generic Attacks against HMAC and NMAC, Advances in Cryptology - CRYPTO 2014
Generic Universal Forgery Attack on Iterative Hash-based MACs, Advances in Cryptology - EUROCRYPT 2014
Improved Cryptanalysis of Reduced RIPEMD-160, Advances in Cryptology -ASIACRYPT 2013
New Generic Attacks Against Hash-based MACs, Advances in Cryptology - ASIACRYPT 2013
Cryptanalysis of HMAC/NMAC-Whirlpool, Advances in Cryptology - ASIACRYPT 2013
Generic Related-key Attacks for HMAC, Advances in Cryptology - ASIACRYPT 2012
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks,? Advances in Cryptology–ASIACRYPT 2012
Non-Full-Active Super-Sbox Analysis Application to ECHO and Groestl, Advances in Cryptology - ASIACRYPT 2010
How to Confirm Cryptosystems Security: The Original Merkle-Damgard is Still Alive!, Advances in Cryptology - ASIACRYPT 2009
Preimages for Step-Reduced SHA-2, Advances in Cryptology–ASIACRYPT 2009
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5, Advances in Cryptology–EUROCRYPT 2008