Jun Xu

Orcid: 0000-0002-1179-7487

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, State Key State Laboratory of Information Security, Beijing, China
  • Chinese Academy of Sciences, Data Assurance and Communication Security Research Center, Beijing, China


According to our database1, Jun Xu authored at least 33 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Revisiting Modular Inversion Hidden Number Problem and Its Applications.
IEEE Trans. Inf. Theory, August, 2023

Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2023

2022
Revisiting orthogonal lattice attacks on approximate common divisor problems.
Theor. Comput. Sci., 2022

Lattice Signature can be as Simple as Lattice Encryption.
IACR Cryptol. ePrint Arch., 2022

Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.
IACR Cryptol. ePrint Arch., 2022

New Results of Breaking the CLS Scheme from ACM-CCS 2014.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Inferring Sequences Produced by the Quadratic Generator.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
On the Ideal Shortest Vector Problem over Random Rational Primes.
IACR Cryptol. ePrint Arch., 2021

Integer LWE with Non-subgaussian Error and Related Attacks.
Proceedings of the Information Security - 24th International Conference, 2021

2020
Cryptanalysis of elliptic curve hidden number problem from PKC 2017.
Des. Codes Cryptogr., 2020

2019
Certifying multi-power RSA.
IET Inf. Secur., 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2019

Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

2018
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications.
IACR Cryptol. ePrint Arch., 2018

Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018

2017
Cryptanalysis of Dual RSA.
Des. Codes Cryptogr., 2017

2016
Cryptanalysis of Multi-Prime Φ-Hiding Assumption.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Proceedings of the Information Security - 19th International Conference, 2016

Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Implicit Factorization of RSA Moduli Revisited (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2015

Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant.
Proceedings of the Information Security Practice and Experience, 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Recovering a Sum of Two Squares Decomposition Revisited.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Cryptanalysis of countermeasures against multiple transmission attacks on NTRU.
IET Commun., 2014

Cryptanalysis of two cryptosystems based on multiple intractability assumptions.
IET Commun., 2014

Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2014

Modular Inversion Hidden Number Problem Revisited.
Proceedings of the Information Security Practice and Experience, 2014

Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Partial Key Exposure Attacks on Takagi's Variant of RSA.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Analysis of two knapsack public key cryptosystems.
IET Commun., 2013

2012
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012


  Loading...