基本信息

刘美成  男  博导  中国科学院信息工程研究所
电子邮件: liumeicheng@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100193

个人简介

刘美成,中国科学院信息工程研究所研究员、博士生导师,国家优青获得者。研究方向为密码学,包括序列密码、分组密码、认证加密和哈希函数的设计与分析。曾解决密码函数方面十年未决的难题;针对欧洲 eSTREAM 计划获胜算法 Trivium、美国第三代杂凑算法标准 SHA-3 和国际通用加密算法 ChaCha,曾提出原创性的密码攻击技术取得国际先进结果,至今保持 SHA-3 原像挑战最高攻破轮数记录。在密码学三大旗舰会议美密会 CRYPTO、欧密会 EUROCRYPT、亚密会 ASIACRYPT 和密码学顶级期刊 Journal of Cryptology、IEEE Transactions on Information Theory 上发表论文十余篇,曾获中国科学院院长奖(2013)、中国科学院优秀博士学位论文(2014)和中国密码学会优秀青年奖(2017),入选2023年度中国科学院青年创新促进会”优秀会员。

研究领域

轻量级密码设计与分析

哈希函数设计与分析

FHE/MPC/ZK友好的对称密码设计与分析

密码学中的代数方法及应用

招生信息

招收博士后、研究生和实习生,欢迎联系

招生专业
083900-网络空间安全
招生方向
密码理论与技术
招生要求

数学或计算机相关专业,具备良好的逻辑思维能力和编程基础

教育背景

   
学位

2013.1,中国科学院信息工程研究所,信息安全,博士(导师:林东岱研究员)

2009.7,广州大学,应用数学,硕士(导师:裴定一教授)

2006.7,安徽大学,数学系,本科

工作经历

2021-至今,中国科学院信息工程研究所,研究员

2015-2021,中国科学院信息工程研究所,副研究员

2015-2016,新加坡南洋理工大学,Research Scientist

2013-2015,中国科学院信息工程研究所,助理研究员

专利与奖励

   
奖励信息
(1) 中国密码学会优秀青年奖, , 部委级, 2017
(2) 中国科学院优秀博士论文, 院级, 2014
(3) 中国科学院院长优秀奖, 院级, 2013

出版信息

代表性论著

2019–2023

1. Shichang Wang, Meicheng Liu, Shiqi Hou, and Dongdai Lin. Moving a step of chacha in syncopated rhythm. In Helena Handschuh and Anna Lysyanskaya, editors, Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, August 20-24, 2023, Proceedings, Part III, volume 14083 of LNCS, pages 273–304. Springer, 2023. (CCF A)

2. Shichang Wang, Meicheng Liu, Dongdai Lin, and Li Ma. On grain-like small state stream ciphers against fast correlation attacks: Cryptanalysis of plantlet, fruit-v2 and fruit-80. Comput. J., 66(6):1376–1399, 2023. (CCF B)

3. Zhongyi Zhang, Chengan Hou, and Meicheng Liu. Collision attacks on round-reduced SHA-3 using conditional internal differentials. In Carmit Hazay and Martijn Stam, editors, Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, April 23-27, 2023, Proceedings, Part IV, volume 14007 of LNCS, pages 220–251. Springer, 2023. (CCF A)

4. Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, and Yi Tu. Enhancing differential-neural cryptanalysis. In Shweta Agrawal and Dongdai Lin, editors, Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, December 5-9, 2022, Proceedings, Part I, volume 13791 of LNCS, pages 318–347. Springer, 2022. (CCF B)

5. Xiaojuan Lu, Bohan Li, Meicheng Liu, and Dongdai Lin. Improved conditional differential attacks on lightweight hash family QUARK. Cybersecur., 5(1):12, 2022. (CCF C)

6. Lulu Zhang, Meicheng Liu, Shuaishuai Li, and Dongdai Lin. Cryptanalysis of ciminion. In Yi Deng and Moti Yung, editors, Information Security and Cryptology - 18th International Conference, Inscrypt 2022, December 11-13, 2022, volume 13837 of LNCS, pages 234–251. Springer, 2022. (CCF C)

7. Meicheng Liu, Xiaojuan Lu, and Dongdai Lin. Differential-linear cryptanalysis from an algebraic perspective. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, August 16-20, 2021, Proceedings, Part III, volume 12827 of LNCS, pages 247–277. Springer, 2021. (CCF A)

8. Shichang Wang, Shiqi Hou, Meicheng Liu, and Dongdai Lin. Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT. In Yu Yu and Moti Yung, editors, Information Security and Cryptology - 17th International Conference, Inscrypt 2021, August 12-14, 2021, volume 13007 of LNCS, pages 171–190. Springer, 2021. (CCF C)

9. Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, and Ling Song. Practical collision attacks against round-reduced SHA-3. J. Cryptol., 33(1):228–270, 2020. (CCF A)

10. Bohan Li, Meicheng Liu, and Dongdai Lin. FPGA implementations of grain v1, mickey 2.0, trivium, lizard and plantlet. Microprocess. Microsystems, 78:103210, 2020. (CCF C)

11. Jingchun Yang, Meicheng Liu, and Dongdai Lin. Cube cryptanalysis of round-reduced ACORN. In Zhiqiang Lin, Charalampos Papamanthou, and Michalis Polychronakis, editors, Information Security - 22nd International Conference, ISC 2019, September 16-18, 2019, Proceedings, volume 11723 of LNCS, pages 44–64. Springer, 2019. (CCF C)

2014–2018

12. Meicheng Liu, Jingchun Yang, Wenhao Wang, and Dongdai Lin. Correlation cube attacks: From weak-key distinguisher to key recovery. In Jesper Buus Nielsen and Vincent Rijmen, editors, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, April 29 - May 3, 2018 Proceedings, Part II, volume 10821 of LNCS, pages 715–744. Springer, 2018. (CCF A)

13. Jingchun Yang, Meicheng Liu, Dongdai Lin, and Wenhao Wang. Symbolic-like computation and conditional differential cryptanalysis of QUARK. In Atsuo Inomata and Kan Yasuda, editors, Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, volume 11049 of LNCS, pages 244–261. Springer, 2018.

14. Xiaojuan Zhang, Meicheng Liu, and Dongdai Lin. Conditional cube searching and applications on trivium-variant ciphers. In Liqun Chen, Mark Manulis, and Steve A. Schneider, editors, Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings, volume 11060 of LNCS, pages 151–168. Springer, 2018. (CCF C)

15. Meicheng Liu. Degree evaluation of nfsr-based cryptosystems. In Jonathan Katz and Hovav Shacham, editors, Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III, volume 10403 of LNCS, pages 227–249. Springer, 2017. (CCF A)

16. Meicheng Liu and Dongdai Lin. Results on highly nonlinear boolean functions with provably good immunity to fast algebraic attacks. Inf. Sci., 421:181–203, 2017. (CCF B)

17. Kexin Qiao, Ling Song, Meicheng Liu, and Jian Guo. New collision attacks on round-reduced keccak. In Jean-Sebastien Coron and Jesper Buus Nielsen, editors, Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, volume 10212 of LNCS, pages 216–243, 2017. (CCF A)

18. Guoyan Zhang and Meicheng Liu. A distinguisher on present-like permutations with application to SPONGENT. SCIENCE CHINA Inf. Sci., 60(7):72101, 2017. (CCF B)

19. Jian Guo, Meicheng Liu, and Ling Song. Linear structures: Applications to cryptanalysis of round-reduced keccak. In Jung Hee Cheon and Tsuyoshi Takagi, editors, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, volume 10031 of LNCS, pages 249–274, 2016. (CCF B)

20. Meicheng Liu and Siang Meng Sim. Lightweight MDS generalized circulant matrices. In Thomas Peyrin, editor, Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, volume 9783 of LNCS, pages 101–120. Springer, 2016. (CCF B)

21. Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, and Vincent Rijmen. New insights on aes-like SPN ciphers. In Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, volume 9814 of LNCS, pages 605–624. Springer, 2016. (CCF A)

22. Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, and Ruilin Li. Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis. In Marc Fischlin and Jean-S´ ebastien Coron, editors, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, volume 9665 of LNCS, pages 196–213. Springer, 2016. (CCF A)

23. Meicheng Liu, Dongdai Lin, and Wenhao Wang. Searching cubes for testing boolean functions and its application to trivium. In IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015, pages 496–500. IEEE, 2015. 

24. Tianze Wang, Meicheng Liu, Shangwei Zhao, and Dongdai Lin. Construction of cubic rotation symmetric bent functions in power-of-two variables. In IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015, pages 486–490. IEEE, 2015. 

25. Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, and Meicheng Liu. A new classification of 4-bit optimal s-boxes and its application to present, RECTANGLE and SPONGENT. In Gregor Leander, editor, Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, volume 9054 of LNCS, pages 494–515. Springer, 2015. (CCF B)

26. Shaoyu Du, Meicheng Liu, Yin Zhang, and Dongdai Lin. On the nonlinearity and correlation immunity of two classes of boolean functions. Int. J. Softw. Informatics, 8(2):177–192, 2014. 

27. Meicheng Liu and Dongdai Lin. Almost perfect algebraic immune functions with good nonlinearity. In 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pages 1837–1841. IEEE, 2014. 

28. Yin Zhang, Meicheng Liu, and Dongdai Lin. On the immunity of rotation symmetric boolean functions against fast algebraic attacks. Discret. Appl. Math., 162:17– 27, 2014. (CCF C)

2009–2013

29. Meicheng Liu, Yin Zhang, and Dongdai Lin. Perfect algebraic immune functions. In Xiaoyun Wang and Kazue Sako, editors, Advances in Cryptology - ASIACRYPT 2012. Proceedings, volume 7658 of LNCS, pages 172–189. Springer, 2012. (CCF B)

30. Meicheng Liu, Dongdai Lin, and Dingyi Pei. Results on the immunity of boolean functions against probabilistic algebraic attacks. ACISP 2011, volume 6812 of LNCS, pages 34–46. Springer, 2011. (CCF C)

31. Tianze Wang, Meicheng Liu, and Dongdai Lin. Construction of resilient and nonlinear boolean functions with almost perfect immunity to algebraic and fast algebraic attacks. Inscrypt 2012, volume 7763 of LNCS, pages 276–293. Springer, 2012. (CCF C)

32. Yusong Du, Fangguo Zhang, and Meicheng Liu. On the resistance of boolean functions against fast algebraic attacks. ICISC 2011, volume 7259 of LNCS, pages 261–274. Springer, 2011. (CCF C)

33. Meicheng Liu, Dongdai Lin, and Dingyi Pei. Fast algebraic attacks and decomposition of symmetric boolean functions. IEEE Trans. Inf. Theory, 57(7):4817–4821, 2011. (CCF A)

34. Meicheng Liu, Yusong Du, Dingyi Pei, Dongdai Lin. On designated-weight Boolean functions with highest algebraic immunity. SCIENCE CHINA Mathematics 53(11):2847-2854, 2010.

35. Meicheng Liu, Dingyi Pei, and Yusong Du. Identification and construction of boolean functions with maximum algebraic immunity. SCIENCE CHINA Inf. Sci., 53(7):1379–1396, 2010. (CCF B)


详见 dblp: Meicheng Liu

科研活动

   
科研项目
( 1 ) 代数免疫函数的性质与构造, 负责人, 国家任务, 2014-01--2016-12
( 2 ) 轻量级密码算法的代数攻击, 负责人, 国家任务, 2017-01--2020-12
( 3 ) 中国科学院青年创新促进会, 负责人, 中国科学院计划, 2019-01--2022-12
( 4 ) 对称密码算法分析, 负责人, 研究所自主部署, 2020-01--2022-12
( 5 ) 新型密码算法数学基础研究, 参与, 国家任务, 2023-01--2027-12
( 6 ) 对称密码分析, 负责人, 国家任务, 2022-01--2024-12