Qiao Kexin
Special Associate Researcher, Master's Supervisor
Date of birth: March 1990
E-mail: qiao.kexin@bit.edu.cn
Office Location: 504 Central Teaching Building
2020/10-present, Special Associate Researcher, School of Cyberspace Security, Beijing Institute of Technology
2017/07-2020/10, Beijing UnionPay Gold Card Technology Co., LTD., Engineer
2015/12-2016/05, School of Mathematics and Physics, Nanyang Technological University, Singapore, Exchange Student
2012/09-2017/07, State Key Laboratory of Information Security /DCS Center, Institute of Information Engineering, Chinese Academy of Sciences, PhD
2008/09-2012/07, School of Mathematics, Shandong University, B.S.
Cryptographic algorithms, Symmetric Cryptanalysis, Side Channel Cryptanalysis
2020/10-present, Special Associate Researcher, School of Cyberspace Security, Beijing Institute of Technology
2017/07-2020/10, Beijing UnionPay Gold Card Technology Co., LTD., Engineer
2015/12-2016/05, School of Mathematics and Physics, Nanyang Technological University, Singapore, Exchange Student
2012/09-2017/07, State Key Laboratory of Information Security /DCS Center, Institute of Information Engineering, Chinese Academy of Sciences, PhD
2008/09-2012/07, School of Mathematics, Shandong University, B.S.
2020/10-present, Special Associate Researcher, School of Cyberspace Security, Beijing Institute of Technology
2017/07-2020/10, Beijing UnionPay Gold Card Technology Co., LTD., Engineer
2015/12-2016/05, School of Mathematics and Physics, Nanyang Technological University, Singapore, Exchange Student
2012/09-2017/07, State Key Laboratory of Information Security /DCS Center, Institute of Information Engineering, Chinese Academy of Sciences, PhD
2008/09-2012/07, School of Mathematics, Shandong University, B.S.
In 2017, he won the Network Security Scholarship of the Network Security Special Fund of China Internet Development Foundation and the Zhu Liyuehua Excellent Doctoral Scholarship of Chinese Academy of Sciences.
Won the Best Student Paper Award of ICISSP in 2016
In the study of symmetric cryptographic algorithm analysis, collision attack on SHA-3 hash function standard