Lei Hu
Orcid: 0000-0002-9920-5342
  According to our database1,
  Lei Hu
  authored at least 130 papers
  between 2007 and 2024.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
 
On csauthors.net:
Bibliography
  2024
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY.
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
    IACR Commun. Cryptol., 2024
    
  
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
    
  
    Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
    
  
    Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
    
  
  2023
    IEEE Trans. Inf. Theory, August, 2023
    
  
    Des. Codes Cryptogr., May, 2023
    
  
Searching the space of tower field implementations of the 픽<sub>2<sup>8</sup></sub> inverter - with applications to AES, Camellia and SM4.
    
  
    Int. J. Inf. Comput. Secur., 2023
    
  
    IACR Cryptol. ePrint Arch., 2023
    
  
Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol.
    
  
    IACR Cryptol. ePrint Arch., 2023
    
  
    IACR Cryptol. ePrint Arch., 2023
    
  
    Proceedings of the Advances in Information and Computer Security, 2023
    
  
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY.
    
  
    Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
    
  
  2022
    Theor. Comput. Sci., 2022
    
  
    IACR Cryptol. ePrint Arch., 2022
    
  
    IACR Cryptol. ePrint Arch., 2022
    
  
    IACR Cryptol. ePrint Arch., 2022
    
  
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
    
  
    IACR Cryptol. ePrint Arch., 2022
    
  
    Sci. China Inf. Sci., 2022
    
  
    Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
    
  
    Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
    
  
    Proceedings of the Information and Communications Security - 24th International Conference, 2022
    
  
    Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
    
  
  2021
    IACR Cryptol. ePrint Arch., 2021
    
  
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
    
  
    IACR Cryptol. ePrint Arch., 2021
    
  
    Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
    
  
    Proceedings of the Information Security - 24th International Conference, 2021
    
  
    Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
    
  
    Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
    
  
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials.
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
    
  
  2020
    IACR Cryptol. ePrint Arch., 2020
    
  
    IACR Cryptol. ePrint Arch., 2020
    
  
    Des. Codes Cryptogr., 2020
    
  
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories.
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
    
  
  2019
    IACR Trans. Symmetric Cryptol., 2019
    
  
    IACR Trans. Symmetric Cryptol., 2019
    
  
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
    
  
    IACR Cryptol. ePrint Arch., 2019
    
  
    IACR Cryptol. ePrint Arch., 2019
    
  
    IACR Cryptol. ePrint Arch., 2019
    
  
Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction.
    
  
    Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
    
  
    Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
    
  
    Proceedings of the Information and Communications Security - 21st International Conference, 2019
    
  
    Proceedings of the Information and Communications Security - 21st International Conference, 2019
    
  
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
    
  
    Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
    
  
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
    
  
    Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
    
  
  2018
    Secur. Commun. Networks, 2018
    
  
    J. Syst. Sci. Complex., 2018
    
  
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications.
    
  
    IACR Cryptol. ePrint Arch., 2018
    
  
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
    
  
    Des. Codes Cryptogr., 2018
    
  
    Proceedings of the Information Security - 21st International Conference, 2018
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
    
  
    Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
    
  
  2017
    IACR Cryptol. ePrint Arch., 2017
    
  
    Sci. China Inf. Sci., 2017
    
  
  2016
    IACR Cryptol. ePrint Arch., 2016
    
  
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
    
  
    Proceedings of the Network and System Security - 10th International Conference, 2016
    
  
    Proceedings of the Advances in Information and Computer Security, 2016
    
  
Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
    
  
    Proceedings of the Information Security - 19th International Conference, 2016
    
  
    Proceedings of the Information Security - 19th International Conference, 2016
    
  
    Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
    
  
    Proceedings of the Information Systems Security and Privacy, 2016
    
  
    Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
    
  
    Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
    
  
    Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
    
  
    Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
    
  
  2015
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
    
  
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
    
  
    Des. Codes Cryptogr., 2015
    
  
Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
    
  
    CoRR, 2015
    
  
    Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
    
  
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
    
  
    Proceedings of the Advances in Information and Computer Security, 2015
    
  
    Proceedings of the Advances in Information and Computer Security, 2015
    
  
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
    
  
    Proceedings of the Information Security - 18th International Conference, 2015
    
  
    Proceedings of the Information Security Practice and Experience, 2015
    
  
    Proceedings of the Information Security Practice and Experience, 2015
    
  
    Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
    
  
    Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
    
  
  2014
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs.
    
  
    IEEE Trans. Inf. Theory, 2014
    
  
    J. Syst. Sci. Complex., 2014
    
  
    IET Commun., 2014
    
  
    IET Commun., 2014
    
  
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    Finite Fields Their Appl., 2014
    
  
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher.
    
  
    Cryptogr. Commun., 2014
    
  
    Appl. Algebra Eng. Commun. Comput., 2014
    
  
    Proceedings of the Network and System Security - 8th International Conference, 2014
    
  
    Proceedings of the Lightweight Cryptography for Security and Privacy, 2014
    
  
    Proceedings of the Information Security Practice and Experience, 2014
    
  
    Proceedings of the IEEE International Conference on Information and Automation, 2014
    
  
    Proceedings of the Information and Communications Security - 16th International Conference, 2014
    
  
    Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
    
  
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
    
  
    Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
    
  
    Proceedings of the Applied Cryptography and Network Security, 2014
    
  
  2013
New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type.
    
  
    Int. J. Found. Comput. Sci., 2013
    
  
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
    
  
    IACR Cryptol. ePrint Arch., 2013
    
  
    Proceedings of the Lightweight Cryptography for Security and Privacy, 2013
    
  
    Proceedings of the Information Security Practice and Experience, 2013
    
  
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks.
    
  
    Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
    
  
  2012
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions.
    
  
    Finite Fields Their Appl., 2012
    
  
    Proceedings of the Information and Communications Security - 14th International Conference, 2012
    
  
    Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
    
  
  2011
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
    
  
    IEEE Trans. Inf. Theory, 2011
    
  
    Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
    
  
  2010
    IACR Cryptol. ePrint Arch., 2010
    
  
On the Kipnis-Shamir Method Solving the MinRank Problem.
  
    Proceedings of the Advances in Information and Computer Security, 2010
    
  
  2009
    IEEE Trans. Inf. Theory, 2009
    
  
    IEEE Trans. Inf. Theory, 2009
    
  
  2007
Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity.
    
  
    IACR Cryptol. ePrint Arch., 2007
    
  
    Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007