基本信息

孙思维  男  硕导  中国科学院信息工程研究所
电子邮件: sunsiwei@iie.ac.cn

主页:https://siweisun.github.io/


主要研究兴趣为对称密码算法设计与分析自动化、密码算法的优化与安全实现。近些年在CRYPTO、ASIACRYPT、FSE、USENIX Security等密码学和信息安全顶级会议发表论文30余篇,参与了973和国家重点研发计划等多个重要项目,国家重点研发计划课题负责人。设计并开发了⼀套基于混合整数规划的自动化密码分析软件框架,在多个国家相关部门的算法分析与设计任务中得到了重要应用。



研究生毕业去向

​毕业生去向:留所或在高校从事科研工作、相关管理部门、航天某研究所、金融、兴唐、移动等。

论文

Bowen Liu, Pawel Szalachowski, Siwei Sun: Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. CoRR abs/2003.06127 (2020)

Bowen Liu, Siwei Sun, Pawel Szalachowski: SMACS: Smart Contract Access Control Service. CoRR abs/2003.07495 (2020)

Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang: Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020)

Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu: Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits. IACR Trans. Symmetric Cryptol. 2019(1): 84-117 (2019)

Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu: Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Trans. Symmetric Cryptol. 2019(4): 147-170 (2019)

Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu: Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS. CRYPTO (2) 2019: 180-209

Chunpeng Ge, Siwei Sun, Pawel Szalachowski: Permission less Block chains and Secure Logging. IEEE ICBC 2019: 56-60

Qiu Chen, Danping Shi, Siwei Sun, Lei Hu: Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. ICICS 2019: 233-247

Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu: Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. ICICS 2019: 799-813

Jiahao Cai, Zihao Wei, Yingjie Zhang, Siwei Sun, Lei Hu: Zero-sum Distinguishers for Round-reduced GIMLI Permutation. ICISSP 2019: 38-43

Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun: StrongChain: Transparent and Collaborative Proof-of-Work Consensus. USENIX Security Symposium 2019: 819-836

Chunpeng Ge, Siwei Sun, Pawel Szalachowski: Permissionless Blockchains and Secure Logging. CoRR abs/1903.03954 (2019)

Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun: StrongChain: Transparent and Collaborative Proof-of-Work Consensus. CoRR abs/1905.09655 (2019)

Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu: Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit. IACR Cryptol. ePrint Arch. 2019: 107 (2019)

Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu: Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. IACR Cryptol. ePrint Arch. 2019: 172 (2019)

Zihao Wei, Siwei Sun, Lei Hu, Man Wei, Joan Boyar, René Peralta: Scrutinizing the Tower Field Implementation of the 픽28 Inverter - with Applications to AES, Camellia, and SM4. IACR Cryptol. ePrint Arch. 2019: 738 (2019)

Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu: Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Cryptol. ePrint Arch. 2019: 1310 (2019) 2018

Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun: On the Complexity of Impossible Differential Cryptanalysis. Security and Communication Networks 2018: 7393401:1-7393401:11 (2018)

Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018)

Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. ASIACRYPT (2) 2018: 3-34

Yingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu:Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy. ISC 2018: 101-115

Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. IACR Cryptol. ePrint Arch. 2018: 813 (2018)2017

Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. Sci. China Inf. Sci. 60(3): 39101:1-39101:3 (2017)

Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Trans. Symmetric Cryptol. 2017(1): 281-306 (2017)

Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 162 (2017)2016

Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. FSE 2016: 268-288

Kexin Qiao, Lei Hu, Siwei Sun:Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques. ICISSP (Revised Selected Papers) 2016: 64-85

Kexin Qiao, Lei Hu, Siwei Sun:Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. ICISSP 2016: 74-84

Danping Shi, Lei Hu, Siwei Sun, Ling Song:Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. ICISSP 2016: 364-371

Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Related-Key Impossible Differential Analysis of Full Khudra. IWSEC 2016: 135-146

Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. NSS 2016: 398-411

Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher. IACR Cryptol. ePrint Arch. 2016: 84 (2016)

Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu:Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or. IACR Cryptol. ePrint Arch. 2016: 338 (2016)

Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck. IACR Cryptol. ePrint Arch. 2016: 407 (2016)

2015

Kexin Qiao, Lei Hu, Siwei Sun, Xiaoshuang Ma, Haibin Kan:Improved MILP Modeling for Automatic Security Evaluation and Application to FOX. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 72-80 (2015)

Danping Shi, Lei Hu, Ling Song, Siwei Sun:Differential fault attack on Zorro block cipher. Security and Communication Networks 8(16): 2826-2835 (2015)

Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:Improved Differential Analysis of Block Cipher PRIDE. ISPEC 2015: 209-219

Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan:Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. ISC 2015: 141-157

Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song:Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s. IWSEC 2015: 97-111

Zhengbang Zha, Lei Hu, Siwei Sun, Jinyong Shan:Further results on differentially 4-uniform permutations over F22m. CoRR abs/1502.03874 (2015)

Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. IACR Cryptol. ePrint Arch. 2015: 122 (2015)

Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Related-key Impossible Differential Analysis of Full Khudra. IACR Cryptol. ePrint Arch. 2015: 840 (2015)

Kexin Qiao, Lei Hu, Siwei Sun:Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. IACR Cryptol. ePrint Arch. 2015: 902 (2015)

Danping Shi, Lei Hu, Siwei Sun, Ling Song:Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN. IACR Cryptol. ePrint Arch. 2015: 964 (2015)

2014

Zhengbang Zha, Lei Hu, Siwei Sun, Yao Sun:New constructions of APN polynomial functions in odd characteristic. Appl. Algebra Eng. Commun. Comput. 25(4): 249-263 (2014)

Zhengbang Zha, Lei Hu, Siwei Sun:Constructing new differentially 4-uniform permutations from the inverse function. Finite Fields Their Appl. 25: 64-78 (2014)

Jun Xu, Lei Hu, Siwei Sun, Yonghong Xie:Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET Communications 8(12): 2142-2146 (2014)

Jun Xu, Lei Hu, Siwei Sun:Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET Communications 8(14): 2433-2437 (2014)

Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song:Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. ASIACRYPT (1) 2014: 158-178

Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:Error-Tolerant Algebraic Side-Channel Attacks Using BEE. ICICS 2014: 1-15

Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan:Tighter Security Bound of MIBS Block Cipher against Differential Attack. NSS 2014: 518-525

Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:Error-Tolerant Algebraic Side-Channel Attacks Using BEE. IACR Cryptol. ePrint Arch. 2014: 683 (2014)

Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song:Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications. IACR Cryptol. ePrint Arch. 2014: 747 (2014)

Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON. IACR Cryptol. ePrint Arch. 2014: 973 (2014)

Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:Improved Differential Analysis of Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 978 (2014)

Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma:Related-Key Differential Attack on Round Reduced RECTANGLE-80. IACR Cryptol. ePrint Arch. 2014: 986 (2014)

2013

Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks. Inscrypt 2013: 39-51

Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 547 (2013)

Siwei Sun, Lei Hu, Peng Wang:Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others. IACR Cryptol. ePrint Arch. 2013: 676 (2013)

2012

Jun Xu, Lei Hu, Siwei Sun, Ping Wang:Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. CANS 2012: 32-42

Jun Xu, Lei Hu, Siwei Sun:Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem. ICICS 2012: 45-57 2011

Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng:Cube Cryptanalysis of Hitag2 Stream Cipher. CANS 2011: 15-25 2010

Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun:On the Kipnis-Shamir Method Solving the MinRank Problem. IWSEC (Short Papers) 2010: 1-13