Kai Hu
Orcid: 0000-0003-3552-7200Affiliations:
- Shandong University, Qingdao, Shandong, China
According to our database1,
Kai Hu
authored at least 44 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Meet-in-the-middle attack on round-reduced SCARF under single pair-of-tweaks setting.
Des. Codes Cryptogr., May, 2025
IACR Trans. Symmetric Cryptol., 2025
Towards Better Integral Distinguishers over 픽<sub>p</sub> Based on Exact Coefficients of Monomials.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Exploring Core Monomial Prediction Further: Weak-Key Superpoly Recovery for 852-Round Trivium.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025
Quasidifferential Saves Infeasible Differential - Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings with a Break-Fix Strategy.
IACR Trans. Symmetric Cryptol., 2024
IACR Cryptol. ePrint Arch., 2024
uKNIT: Breaking Round-alignment for Cipher Design - Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations - Improved Attacks on TWINE and LBlock.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
2023
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha.
IACR Cryptol. ePrint Arch., 2022
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version).
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
J. Comput. Sci. Technol., 2021
IACR Cryptol. ePrint Arch., 2021
Sci. China Inf. Sci., 2021
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
2018
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version).
IACR Cryptol. ePrint Arch., 2018
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018