Lei Hu

Orcid: 0000-0002-9920-5342

According to our database1, Lei Hu authored at least 130 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A quantum-secure partial parallel MAC QPCBC.
Des. Codes Cryptogr., December, 2024

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
IACR Cryptol. ePrint Arch., 2024

Breaking Bicoptor from S&P 2023 Based on Practical Secret Recovery Attack.
IACR Cryptol. ePrint Arch., 2024

Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY.
IACR Cryptol. ePrint Arch., 2024

Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes.
IACR Commun. Cryptol., 2024

Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

Generic Differential Key Recovery Attacks and Beyond.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Revisiting Modular Inversion Hidden Number Problem and Its Applications.
IEEE Trans. Inf. Theory, August, 2023

New cryptanalysis of LowMC with algebraic techniques.
Des. Codes Cryptogr., May, 2023

Rotational Differential-Linear Cryptanalysis Revisited.
J. Cryptol., 2023

Searching the space of tower field implementations of the 픽<sub>2<sup>8</sup></sub> inverter - with applications to AES, Camellia and SM4.
Int. J. Inf. Comput. Secur., 2023

Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2023

Quantum Security of TNT.
IACR Cryptol. ePrint Arch., 2023

Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2023

Small Stretch Problem of the DCT Scheme and How to Fix it.
IACR Cryptol. ePrint Arch., 2023

Improved Boomerang Attacks on Deoxys-BC.
Proceedings of the Advances in Information and Computer Security, 2023

Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Revisiting orthogonal lattice attacks on approximate common divisor problems.
Theor. Comput. Sci., 2022

Lattice Signature can be as Simple as Lattice Encryption.
IACR Cryptol. ePrint Arch., 2022

New Properties of Double Boomerang Connectivity Table.
IACR Cryptol. ePrint Arch., 2022

XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022

LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022

Improved MITM Cryptanalysis on Streebog.
IACR Cryptol. ePrint Arch., 2022

A small first-order DPA resistant AES implementation with no fresh randomness.
Sci. China Inf. Sci., 2022

Quantum Attacks on Lai-Massey Structure.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Quantum Attacks on PRFs Based on Public Random Permutations.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

New Results of Breaking the CLS Scheme from ACM-CCS 2014.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Inferring Sequences Produced by the Quadratic Generator.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
A Note on the Bias of Rotational Differential-Linear Distinguishers.
IACR Cryptol. ePrint Arch., 2021

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021

Unbalanced sharing: a threshold implementation of SM4.
Sci. China Inf. Sci., 2021

Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Integer LWE with Non-subgaussian Error and Related Attacks.
Proceedings of the Information Security - 24th International Conference, 2021

Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Security Analysis of Subterranean 2.0.
IACR Cryptol. ePrint Arch., 2020

Attack Beyond-Birthday-Bound MACs in Quantum Setting.
IACR Cryptol. ePrint Arch., 2020

Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of elliptic curve hidden number problem from PKC 2017.
Des. Codes Cryptogr., 2020

Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Boomerang Connectivity Table Revisited. Application to SKINNY and AES.
IACR Trans. Symmetric Cryptol., 2019

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.
IACR Trans. Symmetric Cryptol., 2019

Boomerang Connectivity Table Revisited.
IACR Cryptol. ePrint Arch., 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019

Lightweight Iterative MDS Matrices: How Small Can We Go?
IACR Cryptol. ePrint Arch., 2019

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit.
IACR Cryptol. ePrint Arch., 2019

Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Zero-sum Distinguishers for Round-reduced GIMLI Permutation.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Convolutional Neural Network Based Side-Channel Attacks with Customized Filters.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
On the Complexity of Impossible Differential Cryptanalysis.
Secur. Commun. Networks, 2018

A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties.
J. Syst. Sci. Complex., 2018

Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications.
IACR Cryptol. ePrint Arch., 2018

Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018

Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy.
Proceedings of the Information Security - 21st International Conference, 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

A Deterministic Algorithm for Computing Divisors in an Interval.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Dual RSA.
Des. Codes Cryptogr., 2017

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.
Sci. China Inf. Sci., 2017

2016
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Multi-Prime Φ-Hiding Assumption.
IACR Cryptol. ePrint Arch., 2016

Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016

MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016

Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016

Related-Key Impossible Differential Analysis of Full Khudra.
Proceedings of the Advances in Information and Computer Security, 2016

Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Proceedings of the Information Security - 19th International Conference, 2016

Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.
Proceedings of the Information Security - 19th International Conference, 2016

Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques.
Proceedings of the Information Systems Security and Privacy, 2016

Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Improved Results on Cryptanalysis of Prime Power RSA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

An Improved Analysis on Three Variants of the RSA Cryptosystem.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Differential fault attack on Zorro block cipher.
Secur. Commun. Networks, 2015

Improved MILP Modeling for Automatic Security Evaluation and Application to FOX.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015

Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015

Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
CoRR, 2015

Towards Optimal Bounds for Implicit Factorization Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015

Implicit Factorization of RSA Moduli Revisited (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

Improved Differential Analysis of Block Cipher PRIDE.
Proceedings of the Information Security Practice and Experience, 2015

Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant.
Proceedings of the Information Security Practice and Experience, 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Recovering a Sum of Two Squares Decomposition Revisited.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs.
IEEE Trans. Inf. Theory, 2014

Families of <i>p</i>-ary sequences with low correlation and large linear complexity.
J. Syst. Sci. Complex., 2014

Cryptanalysis of countermeasures against multiple transmission attacks on NTRU.
IET Commun., 2014

Cryptanalysis of two cryptosystems based on multiple intractability assumptions.
IET Commun., 2014

Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2014

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014

Related-Key Differential Attack on Round Reduced RECTANGLE-80.
IACR Cryptol. ePrint Arch., 2014

Constructing new differentially 4-uniform permutations from the inverse function.
Finite Fields Their Appl., 2014

Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher.
Cryptogr. Commun., 2014

New constructions of APN polynomial functions in odd characteristic.
Appl. Algebra Eng. Commun. Comput., 2014

Tighter Security Bound of MIBS Block Cipher against Differential Attack.
Proceedings of the Network and System Security - 8th International Conference, 2014

Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014

Modular Inversion Hidden Number Problem Revisited.
Proceedings of the Information Security Practice and Experience, 2014

Differentially 6-uniform permutations by modifying the Gold function.
Proceedings of the IEEE International Conference on Information and Automation, 2014

Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Partial Key Exposure Attacks on Takagi's Variant of RSA.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type.
Int. J. Found. Comput. Sci., 2013

Analysis of two knapsack public key cryptosystems.
IET Commun., 2013

Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
IACR Cryptol. ePrint Arch., 2013

A Class of Binomial Permutation Polynomials.
CoRR, 2013

Differential Fault Attack on the PRINCE Block Cipher.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher.
Proceedings of the Information Security Practice and Experience, 2013

Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions.
Finite Fields Their Appl., 2012

Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2011

Cube Cryptanalysis of Hitag2 Stream Cipher.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity.
IACR Cryptol. ePrint Arch., 2010

On the Kipnis-Shamir Method Solving the MinRank Problem.
Proceedings of the Advances in Information and Computer Security, 2010

2009
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences.
IEEE Trans. Inf. Theory, 2009

Period-different m-sequences with at most four-valued cross correlation.
IEEE Trans. Inf. Theory, 2009

2007
Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity.
IACR Cryptol. ePrint Arch., 2007

A New Family of Gold-Like Sequences.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007


  Loading...