Lei Hu
Orcid: 0000-0002-9920-5342Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
According to our database1,
Lei Hu
authored at least 179 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proceedings of the 34th USENIX Security Symposium, 2025
2024
Des. Codes Cryptogr., November, 2024
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY.
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Comput. J., December, 2023
IEEE Trans. Inf. Theory, August, 2023
Des. Codes Cryptogr., May, 2023
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To <tt>Midori</tt>, <tt>SKINNY</tt> And <tt>CRAFT</tt>.
Comput. J., May, 2023
Searching the space of tower field implementations of the 픽<sub>2<sup>8</sup></sub> inverter - with applications to AES, Camellia and SM4.
Int. J. Inf. Comput. Secur., 2023
IACR Cryptol. ePrint Arch., 2023
Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Information and Computer Security, 2023
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Theor. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022
Discret. Appl. Math., 2022
Sci. China Inf. Sci., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Finite Fields Their Appl., 2020
Des. Codes Cryptogr., 2020
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Secur. Commun. Networks, 2018
J. Syst. Sci. Complex., 2018
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications.
IACR Cryptol. ePrint Arch., 2018
Finite Fields Their Appl., 2018
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018
New results on permutation polynomials of the form (x p m - x + δ) s + x p m + x over 𝔽 p<sup>2m</sup>.
Cryptogr. Commun., 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Further results on permutation trinomials over finite fields with even characteristic.
Finite Fields Their Appl., 2017
Sci. China Inf. Sci., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016
Some classes of permutation polynomials of the form (x<sup>p<sup>m</sup></sup>-x+δ)<sup>s</sup>+x over F<sub>p<sup>2m</sup></sub>.
Finite Fields Their Appl., 2016
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Information Systems Security and Privacy, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015
Finite Fields Their Appl., 2015
Des. Codes Cryptogr., 2015
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015
Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
CoRR, 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs.
IEEE Trans. Inf. Theory, 2014
J. Syst. Sci. Complex., 2014
IET Commun., 2014
IET Commun., 2014
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Finite Fields Their Appl., 2014
Finite Fields Their Appl., 2014
Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH.
Des. Codes Cryptogr., 2014
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher.
Cryptogr. Commun., 2014
Appl. Algebra Eng. Commun. Comput., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the IEEE International Conference on Information and Automation, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type.
Int. J. Found. Comput. Sci., 2013
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
IACR Cryptol. ePrint Arch., 2013
Appl. Algebra Eng. Commun. Comput., 2013
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013
Proceedings of the Information Security Practice and Experience, 2013
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Int. J. Distributed Sens. Networks, 2012
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions.
Finite Fields Their Appl., 2012
Des. Codes Cryptogr., 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2011
Appl. Algebra Eng. Commun. Comput., 2011
Appl. Algebra Eng. Commun. Comput., 2011
Proceedings of the Information Security Practice and Experience, 2011
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
IEEE Commun. Lett., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
On the Kipnis-Shamir Method Solving the MinRank Problem.
Proceedings of the Advances in Information and Computer Security, 2010
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
IEEE Trans. Inf. Theory, 2009
IEEE Trans. Inf. Theory, 2009
2008
IEEE Trans. Parallel Distributed Syst., 2008
Proceedings of the Sequences and Their Applications, 2008
2007
Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Third International Workshop on Security, 2007
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.
Proceedings of the Sequences and Their Applications, 2006
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Progress in Cryptology, 2006
Pairing-Based Multi-Recipient Public Key Encryption.
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
Proceedings of the Coding and Cryptography, International Workshop, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005