What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lei Hu
Google Scholar
53
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
New Results on the φ-Hiding Assumption and Factoring Related RSA Moduli.
Jun Xu
Jun Song
Lei Hu
2025
journals/tches
Improved Attacks Against Lattice-Based KEMs Using Hints From Hertzbleed.
Zhiwei Li
Jun Xu
Jun Song
Haomeng Xu
Yan Jia
Yanli Zou
Lei Hu
2024
journals/cic
Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes.
Zihao Wei
Siwei Sun
Fengmei Liu
Lei Hu
Zhiyu Zhang
2024
journals/tosc
Small Stretch Problem of the DCT Scheme and How to Fix It.
Yuchao Chen
Tingting Guo
Lei Hu
Lina Shang
Shuping Mao
Peng Wang
2024
journals/joc
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
Qianqian Yang
Ling Song
Nana Zhang
Danping Shi
Libo Wang
Jiahao Zhao
Lei Hu
Jian Weng
2024
conf/esorics
Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse Scenario.
Zhiwei Li
Jun Xu
Yanli Zou
Lei Hu
2024
conf/eurocrypt
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
Ling Song
Qianqian Yang
Yincen Chen
Lei Hu
Jian Weng
2024
conf/asiacrypt
Generic Differential Key Recovery Attacks and Beyond.
Ling Song
Huimin Liu
Qianqian Yang
Yincen Chen
Lei Hu
Jian Weng
2023
journals/tosc
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing.
Zhiyu Zhang
Siwei Sun
Caibing Wang
Lei Hu
2023
journals/joc
Rotational Differential-Linear Cryptanalysis Revisited.
Yunwen Liu
Zhongfeng Niu
Siwei Sun
Chao Li
Lei Hu
2023
conf/iwsec
Improved Boomerang Attacks on Deoxys-BC.
Jiahao Zhao
Nana Zhang
Qianqian Yang
Ling Song
Lei Hu
2023
conf/eurocrypt
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY.
Danping Shi
Siwei Sun
Ling Song
Lei Hu
Qianqian Yang
2022
journals/tosc
New Properties of the Double Boomerang Connectivity Table.
Qianqian Yang
Ling Song
Siwei Sun
Danping Shi
Lei Hu
2022
journals/tosc
Improved MITM Cryptanalysis on Streebog.
Jialiang Hua
Xiaoyang Dong
Siwei Sun
Zhiyu Zhang
Lei Hu
Xiaoyun Wang
2022
conf/icics
New Results of Breaking the CLS Scheme from ACM-CCS 2014.
Jing Gao
Jun Xu
Tianyu Wang
Lei Hu
2022
conf/asiacrypt
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.
Jun Xu
Santanu Sarkar
Huaxiong Wang
Lei Hu
2022
conf/asiacrypt
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
Ling Song
Nana Zhang
Qianqian Yang
Danping Shi
Jiahao Zhao
Lei Hu
Jian Weng
2021
conf/crypto
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Xiaoyang Dong
Jialiang Hua
Siwei Sun
Zheng Li
Xiaoyun Wang
Lei Hu
2021
conf/asiacrypt
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Yue Qin
Chi Cheng
Xiaohan Zhang
Yanbin Pan
Lei Hu
Jintai Ding
2021
conf/asiacrypt
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials.
Xiaoyang Dong
Zhiyu Zhang
Siwei Sun
Congming Wei
Xiaoyun Wang
Lei Hu
2020
journals/tosc
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions.
Hao Guo
Siwei Sun
Danping Shi
Ling Sun
Yao Sun
Lei Hu
Meiqin Wang
2020
conf/asiacrypt
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories.
Xiaoyang Dong
Siwei Sun
Danping Shi
Fei Gao
Xiaoyun Wang
Lei Hu
2019
journals/tosc
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.
Shun Li
Siwei Sun
Chaoyun Li
Zihao Wei
Lei Hu
2019
journals/tosc
Lightweight Iterative MDS Matrices: How Small Can We Go?
Shun Li
Siwei Sun
Danping Shi
Chaoyun Li
Lei Hu
2019
journals/tosc
Boomerang Connectivity Table Revisited. Application to SKINNY and AES.
Ling Song
Xianrui Qin
Lei Hu
2019
conf/crypto
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
Jun Xu
Santanu Sarkar
Lei Hu
Huaxiong Wang
Yanbin Pan
2019
conf/crypto
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Danping Shi
Siwei Sun
Yu Sasaki
Chaoyun Li
Lei Hu
2019
conf/icics
Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging.
Qiu Chen
Danping Shi
Siwei Sun
Lei Hu
2019
conf/icics
Convolutional Neural Network Based Side-Channel Attacks with Customized Filters.
Man Wei
Danping Shi
Siwei Sun
Peng Wang
Lei Hu
2018
conf/acisp
A Deterministic Algorithm for Computing Divisors in an Interval.
Liqiang Peng
Yao Lu
Noboru Kunihiro
Rui Zhang
Lei Hu
2018
conf/asiacrypt
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
Danping Shi
Siwei Sun
Patrick Derbez
Yosuke Todo
Bing Sun
Lei Hu
2017
journals/tosc
Analysis of AES, SKINNY, and Others with Constraint Programming.
Siwei Sun
David Gérault
Pascal Lafourcade
Qianqian Yang
Yosuke Todo
Kexin Qiao
Lei Hu
2016
conf/fse
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck.
Kai Fu
Meiqin Wang
Yinghua Guo
Siwei Sun
Lei Hu
2016
conf/icisc
Improved Results on Cryptanalysis of Prime Power RSA.
Liqiang Peng
Lei Hu
Yao Lu
2016
conf/iwsec
Related-Key Impossible Differential Analysis of Full Khudra.
Qianqian Yang
Lei Hu
Siwei Sun
Ling Song
2015
conf/iwsec
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Siwei Sun
Lei Hu
Kexin Qiao
Xiaoshuang Ma
Jinyong Shan
Ling Song
2015
conf/iwsec
Implicit Factorization of RSA Moduli Revisited (Short Paper).
Liqiang Peng
Lei Hu
Yao Lu
Zhangjie Huang
Jun Xu
2015
conf/sacrypt
Towards Optimal Bounds for Implicit Factorization Problem.
Yao Lu
Liqiang Peng
Rui Zhang
Lei Hu
Dongdai Lin
2014
conf/acns
Partial Key Exposure Attacks on Takagi's Variant of RSA.
Zhangjie Huang
Lei Hu
Jun Xu
Liqiang Peng
Yonghong Xie
2014
conf/lightsec
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers.
Ling Song
Lei Hu
Bingke Ma
Danping Shi
2014
conf/icics
Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
Ling Song
Lei Hu
Siwei Sun
Zhang Zhang
Danping Shi
Ronglin Hao
2014
conf/asiacrypt
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Siwei Sun
Lei Hu
Peng Wang
Kexin Qiao
Xiaoshuang Ma
Ling Song
2014
conf/africacrypt
Further Improvement of Factoring RSA Moduli with Implicit Hint.
Liqiang Peng
Lei Hu
Jun Xu
Zhangjie Huang
Yonghong Xie
2013
conf/lightsec
Differential Fault Attack on the PRINCE Block Cipher.
Ling Song
Lei Hu
2012
conf/icics
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.
Jun Xu
Lei Hu
Siwei Sun
2012
conf/cans
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem.
Jun Xu
Lei Hu
Siwei Sun
Ping Wang
2011
conf/cans
Cube Cryptanalysis of Hitag2 Stream Cipher.
Siwei Sun
Lei Hu
Yonghong Xie
Xiangyong Zeng
2010
conf/iwsec
On the Kipnis-Shamir Method Solving the MinRank Problem.
Xin Jiang
Lei Hu
Jintai Ding
Siwei Sun
2009
conf/wisa
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.
Weiwei Cao
Lei Hu
2007
conf/acisp
Analysis of the SMS4 Block Cipher.
Fen Liu
Wen Ji
Lei Hu
Jintai Ding
Shuwang Lv
Andrei Pyshkin
Ralf-Philipp Weinmann
2007
conf/acns
Cryptanalysis of the TRMC-4 Public Key Cryptosystem.
Xuyun Nie
Lei Hu
Jintai Ding
Jianyu Li
John Wagner
2007
conf/pkc
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
Jintai Ding
Lei Hu
Xuyun Nie
Jianyu Li
John Wagner
2006
conf/acns
Breaking a New Instance of TTM Cryptosystems.
Xuyun Nie
Lei Hu
Jianyu Li
Crystal Updegrove
Jintai Ding
Coauthors
Andrei Pyshkin
(1)
Bing Sun
(1)
Bingke Ma
(1)
Caibing Wang
(1)
Chao Li
(1)
Chaoyun Li
(3)
Chi Cheng
(1)
Congming Wei
(1)
Crystal Updegrove
(1)
Danping Shi
(13)
David Gérault
(1)
Dongdai Lin
(1)
Fei Gao
(1)
Fen Liu
(1)
Fengmei Liu
(1)
Hao Guo
(1)
Haomeng Xu
(1)
Huaxiong Wang
(2)
Huimin Liu
(1)
Jiahao Zhao
(3)
Jialiang Hua
(2)
Jian Weng
(4)
Jianyu Li
(3)
Jing Gao
(1)
Jintai Ding
(6)
Jinyong Shan
(1)
John Wagner
(2)
Jun Song
(2)
Jun Xu
(3)
Jun Xu
(8)
Kai Fu
(1)
Kexin Qiao
(3)
Lei Hu
(53)
Libo Wang
(1)
Lina Shang
(1)
Ling Song
(14)
Ling Sun
(1)
Liqiang Peng
(6)
Man Wei
(1)
Meiqin Wang
(2)
Nana Zhang
(3)
Noboru Kunihiro
(1)
Pascal Lafourcade
(1)
Patrick Derbez
(1)
Peng Wang
(3)
Ping Wang
(1)
Qianqian Yang
(9)
Qiu Chen
(1)
Ralf-Philipp Weinmann
(1)
Ronglin Hao
(1)
Rui Zhang
(2)
Santanu Sarkar
(2)
Shun Li
(2)
Shuping Mao
(1)
Shuwang Lv
(1)
Siwei Sun
(26)
Tianyu Wang
(1)
Tingting Guo
(1)
Weiwei Cao
(1)
Wen Ji
(1)
Xiangyong Zeng
(1)
Xianrui Qin
(1)
Xiaohan Zhang
(1)
Xiaoshuang Ma
(2)
Xiaoyang Dong
(4)
Xiaoyun Wang
(4)
Xin Jiang
(1)
Xuyun Nie
(3)
Yan Jia
(1)
Yanbin Pan
(2)
Yanli Zou
(2)
Yao Lu
(4)
Yao Sun
(1)
Yincen Chen
(2)
Yinghua Guo
(1)
Yonghong Xie
(3)
Yosuke Todo
(2)
Yu Sasaki
(1)
Yuchao Chen
(1)
Yue Qin
(1)
Yunwen Liu
(1)
Zhang Zhang
(1)
Zhangjie Huang
(3)
Zheng Li
(1)
Zhiwei Li
(2)
Zhiyu Zhang
(4)
Zhongfeng Niu
(1)
Zihao Wei
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to