基本信息
胡磊  男  博导  中国科学院信息工程研究所
电子邮件: hulei@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100093

招生信息

   
招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码协议理论与技术

工作经历

   
社会兼职
2015-03-01-今,中国密码学会理事, 理事
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委,
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委

教授课程

信息安全数学基础
后量子密码学
密码学基础
RFID安全算法与协议
密码分析学
代数编码

专利与奖励

   
奖励信息
(1) 2022年度岗位教师考核教学单项优秀, 研究所(学校), 2022
(2) 2021年度岗位教师考核教学单项优秀, 研究所(学校), 2021
(3) 岗位教师考核教学单项优秀, 研究所(学校), 2020
(4) 2020年中国标准创新贡献奖标准项目奖, 三等奖, 部委级, 2020
(5) 岗位教师考核科研成果单项优秀, 研究所(学校), 2019
(6) 岗位教师考核讲义单项优秀, , 研究所(学校), 2018
(7) 岗位教师考核教学单项优秀, 研究所(学校), 2017
(8) 非线性密码函数和循环码, 二等奖, 省级, 2017
(9) XXX密码算法, 一等奖, 部委级, 2009
(10) ×××的密码学特性及其构造, 二等奖, 部委级, 2002
专利成果
( 1 ) 分组密码抗线性攻击安全性的评估方法, 发明专利, 2014, 第 1 作者, 专利号: CN104158796A

( 2 ) 获取分组密码活跃S盒个数下界的方法, 发明专利, 2013, 第 1 作者, 专利号: CN103427986A

出版信息

   
发表论文
[1] 史丹萍, 孙思维, Ling Song, Lei Hu, Qianqian Yang. Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Sel¸cuk Meet-in-the-Middle Cryptanalysis of SKINNY. 欧密 2023null. 2023, [2] Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu. Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2023, https://doaj.org/article/b2ff2d1a4a674169b2712e44e5b3686e.
[3] Yunwen Liu, Siwei Sun, Zhongfeng Niu, Chao Li, 胡磊. Rotational Differential-Linear Cryptanalysis Revisited. Journal of Cryptology[J]. 2023, [4] Dong Fang, Guifang Huang, Mengfan Wang, Lei Hu. Decreasing Proof Size of BLS Scheme. The Computer Journal[J]. 2023, https://academic.oup.com/comjnl/advance-article-abstract/doi/10.1093/comjnl/bxad040/7135776?redirectedFrom=fulltext.
[5] Wenxiao Qiao, Hailun Yan, Siwei Sun, Lei Hu, Jiwu Jing. New cryptanalysis of LowMC with algebraic techniques. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2023, 91(5): 2057-2075, http://dx.doi.org/10.1007/s10623-022-01178-1.
[6] Guo, Hao, Zhang, Zhiyu, Yang, Qianqian, Hu, Lei, Luo, Yiyuan. A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT. COMPUTER JOURNAL[J]. 2023, 66(5): 1069-1082, http://dx.doi.org/10.1093/comjnl/bxab213.
[7] Yin Lv, Danping Shi, Yi Guo, 胡磊, Zihui Guo, Caibing Wang. Automatic Demirci-Selçuk meet-in-the-middle attack on SIMON,. The Computer Journal[J]. 2023, [8] Jun Xu, Santanu Sarkar, Wang Huaxiong, Lei Hu. Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. Asiacrypt 2022null. 2023, [9] 许军, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2023, [10] 王梦凡, 黄桂芳, 高红敏, 胡磊. 基于格的高效零知识证明. 信息安全学报[J]. 2023, [11] Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, 王彩冰. Improved linear cryptanalysis of block cipher BORON. The Computer Journal[J]. 2023, [12] Yi Guo, Danping Shi, 胡磊, Yin Lv. Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra. The 19th International Conference on Information Security and Cryptology (Inscrypt 2023)null. 2023, [13] Wei, Man, Sun, Siwei, Wei, Zihao, Gong, Zheng, Hu, Lei. A small first-order DPA resistant AES implementation with no fresh randomness. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2022, 65(6): 257-259, http://dx.doi.org/10.1007/s11432-019-1469-7.
[14] Ling Song, Nana Zhang, Qiaqian Yang, Danping Shi, Jiahao Zhao, 胡磊, Jian Weng. Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery, Asiacrypt 2022. 亚密 2022null. 2022, [15] Jing Gao, Jun Xu, Tianyu Wang, Lei Hu. New Results of Breaking the CLS Scheme from ACM-CCS 2014. ICICS 2022null. 2022, [16] Jing Gao, Jun Xu, Lei Hu. Inferring Sequences Produced by the Quadratic Generator. Inscrypt 2022null. 2022, [17] 王天宇, 许军, 刘月君, 胡磊, 周永彬. 基于格Fiat-Shamir签名随机数泄漏攻击的若干改进. 密码学报[J]. 2022, 9(6): 1039-1052, http://lib.cqvip.com/Qikan/Article/Detail?id=7108746309.
[18] Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang. Improved MITM Cryptanalysis on Streebog. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2022, https://doaj.org/article/b1a4961b86194bce9483f5c697c949ff.
[19] Tingting Guo, Peng Wang, Dingfeng Ye, 胡磊. Quantum Attacks on PRFs Based on Public Random Permutations. Indocrypt 2022null. 2022, [20] Shuping Mao, Tingting Guo, Peng Wang, 胡磊. Quantum attacks on Lai-Massey structure. PQCrypto 2022null. 2022, [21] 王梦凡, 黄桂芳, 高红敏, 胡磊. improved zero knowledge proofs for commitments from learning parity with noise. TRUSTCOMnull. 2022, https://conferences.computer.org/trustcompub/pdfs/TrustCom2022-4vviSeT2jitGOhptwbD5kH/942500a415/942500a415.pdf.
[22] Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye. Attack Beyond-Birthday-Bound MACs in Quantum Setting. PQCrypto 2021null. 2021, [23] Ling Song, Yi Tu, Danping Shi, Lei Hu. Security analysis of Subterranean 2.0. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2021, 89(8): 1875-1905, http://dx.doi.org/10.1007/s10623-021-00892-6.
[24] Lei Hu. Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. Asiacrypt 2021. 2021, [25] 胡磊. Camellia算法S盒的紧凑硬件实现. 密码学报. 2021, [26] Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding. A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. Asiacrypt 2021null. 2021, [27] 胡磊. A small first-order DPA resistant AES implementation with no fresh randomness. 2021, [28] 胡磊. Simon量子算法攻击下的可调加密方案研究. 信息安全学报. 2021, [29] Zha, Zhengbang, Hu, Lei, Liu, Yan, Cao, Xiwang. Further results on optimal ternary cyclic codes. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2021, 75: http://dx.doi.org/10.1016/j.ffa.2021.101898.
[30] 孙思维. Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. ASIACRYPT 2021. 2021, [31] Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu. Integer LWE with Non-Subgaussian Error and Related Attacks. International Security Conference (ISC 2021)null. 2021, [32] Wei, Man, Sun, Siwei, Wei, Zihao, Hu, Lei. Unbalanced sharing: a threshold implementation of SM4. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2021, 64(5): 214-216, https://www.webofscience.com/wos/woscc/full-record/WOS:000632905000001.
[33] Xiaoyang Dong, JialiangHua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu. Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. CRYPTO 2021[J]. 2021, [34] Jun Xu, Lei Hu, Santanu Sarkar. Cryptanalysis of elliptic curve hidden number problem from PKC 2017. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2020, 88(2): 341-361, https://www.webofscience.com/wos/woscc/full-record/WOS:000490197600001.
[35] 张英杰, 胡磊, 史丹萍, 王鹏, 孙思维, 魏荣. Grain-v1快速相关攻击的改进. 密码学报[J]. 2020, 7(6): 812-825, http://lib.cqvip.com/Qikan/Article/Detail?id=7103776919.
[36] Xiaoyang Dong, Sun Siwei, Danping Shi, fei gao, Xiaoyun Wang, Lei Hu. Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. 亚密 2020[J]. 2020, https://link.springer.com/chapter/10.1007/978-3-030-64834-3_25.
[37] Lei Hu. Scrutinizing the Tower Field Implementation of the F(2^8) Inverter - with Applications to AES, Camellia, and SM4. International Journal of Information and Computer Security. 2020, [38] Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang. Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2020, https://tosc.iacr.org/index.php/ToSC/article/view/8698.
[39] Lei Hu. Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions, ToSC 2020. IACR Transactions on Symmetric Cryptology (ToSC) (FSE 2020)). 2020, [40] Qiu Chen, Danping Shi, Siwei Sun, Lei Hu. Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging. The 21st International Conference on Information and Communications Security (ICICS 2019)null. 2019, https://link.springer.com/chapter/10.1007/978-3-030-41579-2_14.
[41] Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1null. 2019, 11692: 297-321, [42] Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu. Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. 美密 2019[J]. 2019, 11693: 180-209, https://link.springer.com/chapter/10.1007/978-3-030-26951-7_7.
[43] Ling Song, Xianrui Qin, Lei Hu. Boomerang Connectivity Table Revisited Application to SKINNY and AES. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2019, https://doaj.org/article/725c5fa6b6c848e3b3b7225151ac689c.
[44] Lei Hu. A smaller first-order DPA resistant AES implementation with no fresh randomness. SCIENCE CHINA Information Sciences. 2019, [45] Zheng, Dabin, Yuan, Mu, Li, Nian, Hu, Lei, Zeng, Xiangyong. Constructions of Involutions Over Finite Fields. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2019, 65(12): 7876-7883, https://www.webofscience.com/wos/woscc/full-record/WOS:000512370800015.
[46] Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu. Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. ICICS 2019[J]. 2019, 11999: 799-813, https://link.springer.com/chapter/10.1007/978-3-030-41579-2_46.
[47] Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu. Lightweight Iterative MDS Matrices: How Small Can We Go?. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2019, 2019(4): 147-170, http://dx.doi.org/10.13154/tosc.v2019.i4.147-170.
[48] 孙哲蕾, 彭力强, 胡磊, 王强. RSA变型方案小解密指数攻击的改进分析. 密码学报[J]. 2019, 6(4): 486-495, http://lib.cqvip.com/Qikan/Article/Detail?id=7002861735.
[49] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019[J]. 2019, 11898: 398-411, [50] Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun. On the Complexity of Impossible Differential Cryptanalysis. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, https://www.hindawi.com/journals/scn/2018/7393401/.
[51] Peng, Liqiang, Lu, Yao, Kunihiro, Noboru, Zhang, Rui, Hu, Lei, Susilo, W, Yang, G. A Deterministic Algorithm for Computing Divisors in an Interval. INFORMATION SECURITY AND PRIVACYnull. 2018, 10946: 3-12, [52] Lei Hu. New results on permutation polynomials of the form(x^{p^m}−x+δ)^s+ x^{p^m}+x over F_{p^{2m}}. Cryptography and Communications. 2018, [53] Danping Shi, Siwei Sun, Patrick Derbez, sasaki yu, bing sun, Lei Hu. Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints. 亚密 2018[J]. 2018, 11273: 3-34, https://link.springer.com/chapter/10.1007/978-3-030-03329-3_1.
[54] Shan, Jinyong, Hu, Lei, Zeng, Xiangyong, Li, Chunlei. A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2018, 31(4): 1042-1064, http://lib.cqvip.com/Qikan/Article/Detail?id=675001509.
[55] Lei Hu. Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy. ISC 2018-The 21st Information Security Conference-ISC2018. 2018, [56] Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2018, 86(9): 1997-2033, http://dx.doi.org/10.1007/s10623-017-0435-4.
[57] Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu. Analysis of AES, SKINNY, and Others with Constraint Programming. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2017, 281-306, https://doaj.org/article/d8028eb26a5544bd999bee7740ca3a44.
[58] Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang. Cryptanalysis of Dual RSA. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 83(1): 1-21, https://www.webofscience.com/wos/woscc/full-record/WOS:000394969100001.
[59] Zha, Zhengbang, Hu, Lei, Fan, Shuqin. Further results on permutation trinomials over finite fields with even characteristic. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2017, 45: 43-52, https://www.webofscience.com/wos/woscc/full-record/WOS:000399063100003.
[60] Lei Hu. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.. Design, Codes Cryptography. 2017, [61] Sun, Zhiqiang, Hu, Lei. Several Classes of Boolean Functions with Four-Valued Walsh Spectra. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE[J]. 2017, 28(4): 357-377, https://www.webofscience.com/wos/woscc/full-record/WOS:000407230400004.
[62] 查正邦, 胡磊. 有限域上置换多项式的几种构造. 密码学报[J]. 2017, 4(3): 291-298,  http://dx.doi.org/10.13868/j.cnki.jcr.000182.
[63] Shi, Danping, Hu, Lei, Sun, Siwei, Song, Ling, Qiao, Kexin, Ma, Xiaoshuang. Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 60(3): http://www.corc.org.cn/handle/1471x/2376207.
[64] Lei Hu. Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}}. Finite Fields and Their Applications. 2016, [65] Fu Kai, Wang Meiqin, Guo Yinghua, Sun Siwei, Hu Lei, Peyrin T. MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. FAST SOFTWARE ENCRYPTION (FSE 2016)null. 2016, 9783: 268-288, [66] Wang, Xiaoqiang, Zheng, Dabin, Hu, Lei, Zeng, Xiangyong. The weight distributions of two classes of binary cyclic codes. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2015, 34: 192-207, https://www.webofscience.com/wos/woscc/full-record/WOS:000353250100013.
[67] Qiao, Kexin, Hu, Lei, Sun, Siwei, Ma, Xiaoshuang, Kan, Haibin. Improved MILP Modeling for Automatic Security Evaluation and Application to FOX. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2015, E98A(1): 72-80, [68] Shan, Jinyong, Hu, Lei, Sun, Siwei, Karthigaikumar, P, Arulmurugan, C, Manojkumar, T. Security of LBlock-s against Related-Key Differential Attack. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS)null. 2015, 1278-1283, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380619600251.
[69] Danping Shi, Lei Hu, Ling Song, Siwei Sun. Differential fault attack on Zorro block cipher. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 8(16): 2826-2835, https://www.webofscience.com/wos/woscc/full-record/WOS:000363086500019.
[70] Liqiang Peng, Lei Hu, Lu Yao, Santanu Sarkar, Jun Xu, Zhangjie Huang. Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015null. 2015, 9462: 105-123, [71] Zheng DaBin, Zhou FengLi, Hu Lei, Zeng XiangYong. The weight distributions of a class of non-primitive cyclic codes with two nonzeros. SCIENCE CHINA-MATHEMATICS[J]. 2015, 58(6): 1285-1296, https://www.webofscience.com/wos/woscc/full-record/WOS:000354217200011.
[72] Zha, Zhengbang, Hu, Lei, Cao, Xiwang. Constructing permutations and complete permutations over finite fields via subfield-valued polynomials. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2015, 31: 162-177, https://www.webofscience.com/wos/woscc/full-record/WOS:000345808200010.
[73] Zheng, Dabin, Wang, Xiaoqiang, Zeng, Xiangyong, Hu, Lei. The weight distribution of a family of p-ary cyclic codes. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2015, 75(2): 263-275, https://www.webofscience.com/wos/woscc/full-record/WOS:000351745900008.
[74] Zha, Zhengbang, Hu, Lei. Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2015, 61(3): 1491-1495, https://www.webofscience.com/wos/woscc/full-record/WOS:000350160400025.
[75] Li, Jiao, Carlet, Claude, Zeng, Xiangyong, Li, Chunlei, Hu, Lei, Shan, Jinyong. Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2015, 76(2): 279-305, https://www.webofscience.com/wos/woscc/full-record/WOS:000356360000009.
[76] 单进勇, 胡磊, 宋凌, 孙思维, 马小双. 19轮RECTANGLE-80的相关密钥差分分析. 密码学报[J]. 2015, 54-65, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849534849484855.
[77] Sun Siwei, Hu Lei, Wang Meiqin, Yang Qianqian, Qiao Kexin, Ma Xiaoshuang, Song Ling, Shan Jinyong, Lopez J, Mitchell CJ. Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. INFORMATION SECURITY, ISC 2015null. 2015, 9290: 141-157, [78] Zha, Zhengbang, Hu, Lei, Sun, Siwei, Sun, Yao. New constructions of APN polynomial functions in odd characteristic. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING[J]. 2014, 25(4): 249-263, https://www.webofscience.com/wos/woscc/full-record/WOS:000339870700002.
[79] Cao, Weiwei, Hu, Lei. Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2014, 73(3): 719-730, https://www.webofscience.com/wos/woscc/full-record/WOS:000340681700001.
[80] Jun Xu, Lei Hu, Siwei Sun, yonghong xie. Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET COMMUNICATIONS[J]. 2014, 8(12): 2142-2146, http://www.corc.org.cn/handle/1471x/2157588.
[81] Zheng Dabin, Yu Long, Hu Lei. Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 23(4): 767-772, http://lib.cqvip.com/Qikan/Article/Detail?id=663209928.
[82] Tu, Ziran, Zeng, Xiangyong, Hu, Lei. Several classes of complete permutation polynomials. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2014, 25: 182-193, https://www.webofscience.com/wos/woscc/full-record/WOS:000328006800015.
[83] Wang, Weijia, Hu, Lei. A generic homomorphic MAC construction for authentication in network coding. SECURITY AND COMMUNICATION NETWORKS[J]. 2014, 7(2): 429-433, http://dx.doi.org/10.1002/sec.847.
[84] Li, Chaoyun, Zeng, Xiangyong, Helleseth, Tor, Li, Chunlei, Hu, Lei. The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2014, 60(5): 3052-3061, http://dx.doi.org/10.1109/TIT.2014.2310748.
[85] Zha, Zhengbang, Hu, Lei, Sun, Siwei. Constructing new differentially 4-uniform permutations from the inverse function. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2014, 25: 64-78, https://www.webofscience.com/wos/woscc/full-record/WOS:000328006800007.
[86] Sun Siwei, Hu Lei, Wang Peng, Qiao Kexin, Ma Xiaoshuang, Song Ling, Sarkar P, Iwata T. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT Inull. 2014, 8873: 158-178, [87] Zheng, Dabin, Wang, Xiaoqiang, Hu, Lei, Zeng, Xiangyong. The weight distributions of two classes of p-ary cyclic codes. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2014, 29: 202-224, https://www.webofscience.com/wos/woscc/full-record/WOS:000338596400013.
[88] Cao, Xiwang, Hu, Lei, Zha, Zhengbang. Constructing permutation polynomials from piecewise permutations. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2014, 26: 162-174, https://www.webofscience.com/wos/woscc/full-record/WOS:000330334000012.
[89] Jun Xu, Lei Hu, Siwei Sun. Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET COMMUNICATIONS[J]. 2014, 8(14): 2433-2437, http://www.corc.org.cn/handle/1471x/2155421.
[90] Shan, Jinyong, Hu, Lei, Zeng, Xiangyong. Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2014, 6(3): 233-254, https://www.webofscience.com/wos/woscc/full-record/WOS:000343877700003.
[91] 彭力强, 胡磊, 黄章杰, 许军. 模背包向量问题的实际复杂度与基于格密码体制的实际安全性. 密码学报[J]. 2014, 225-234, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849524851484850.
[92] Peng Liqiang, Zuo Jinyin, Hu Lei, Xu Jun. Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 23(1): 175-178, http://www.corc.org.cn/handle/1471x/2087156.
[93] Zha, Zhengbang, Hu, Lei. CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE[J]. 2013, 24(8): 1209-1219, https://www.webofscience.com/wos/woscc/full-record/WOS:000335513900002.
[94] Zhang XiaoLei, Hu Lei. Periods of polynomials over a Galois ring. SCIENCE CHINA-MATHEMATICS[J]. 2013, 56(9): 1761-1772, https://www.webofscience.com/wos/woscc/full-record/WOS:000323437100003.
[95] Cai, Han, Zeng, Xiangyong, Tang, Xiaohu, Hu, Lei. NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE[J]. 2013, 24(4): 533-545, https://www.webofscience.com/wos/woscc/full-record/WOS:000322770800008.
[96] Peng, Liqiang, Hu, Lei, Xu, Jun, Xie, Yonghong, Zuo, Jinyin. Analysis of two knapsack public key cryptosystems. IET COMMUNICATIONS[J]. 2013, 7(15): 1638-1643, https://www.webofscience.com/wos/woscc/full-record/WOS:000325980500008.
[97] Zheng, Dabin, Yu, Long, Hu, Lei. On a class of binomial bent functions over the finite fields of odd characteristic. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING[J]. 2013, 24(6): 461-475, https://www.webofscience.com/wos/woscc/full-record/WOS:000327220800003.
[98] Jia WenJie, Zeng XiangYong, Li ChunLei, Helleseth, Tor, Hu Lei. Permutation polynomials with low differential uniformity over finite fields of odd characteristic. SCIENCE CHINA-MATHEMATICS[J]. 2013, 56(7): 1429-1440, https://www.webofscience.com/wos/woscc/full-record/WOS:000321587300010.
[99] Lifeng Guo, Lei Hu. Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security. COMPUTERS AND MATHEMATICS WITH APPLICATIONS. 2012, 63(1): 151-157, http://dx.doi.org/10.1016/j.camwa.2011.11.002.
[100] Xie, Yonghong, Hu, Lei. A matrix construction of Boolean functions with maximum algebraic immunity. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2012, 25(4): 792-801, http://lib.cqvip.com/Qikan/Article/Detail?id=43280795.
[101] Zeng, Xiangyong, Shan, Jinyong, Hu, Lei. A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2012, 18(1): 70-92, https://www.webofscience.com/wos/woscc/full-record/WOS:000299405800007.
[102] Cao XiWang, Hu Lei. A construction of hyperbent functions with polynomial trace form. SCIENCE CHINA-MATHEMATICS[J]. 2011, 54(10): 2229-2234, https://www.webofscience.com/wos/woscc/full-record/WOS:000295483900016.
[103] CAO Weiwei HU Lei. Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure. 电子学报:英文版[J]. 2011, 20(3): 511-515, http://lib.cqvip.com/Qikan/Article/Detail?id=38822550.
[104] Su, Wei, Zeng, Xiangyong, Hu, Lei. Construction of 1-resilient Boolean functions with optimum algebraic immunity. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS[J]. 2011, 88(2): 222-238, https://www.webofscience.com/wos/woscc/full-record/WOS:000286514900001.
[105] 胡磊. 诚实发送者承诺与诚实接收者承诺电子与信息学报,. 电子与信息学报. 2011, [106] Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n}. Appl. Algebra Eng. Commun. Comput.. 2010, [107] Lei Hu. An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model. 中国科学院研究生院学报. 2010, [108] 黄桂芳, 胡磊, 林东岱. 从Σ-协议到公共参考串模型下可否认零知识的高效编译器. 中国科学院研究生院学报[J]. 2010, 27(6): 831-837, http://lib.cqvip.com/Qikan/Article/Detail?id=36104151.
[109] Cao, Weiwei, Nie, Xinyun, Hu, Lei, Tang, Xiling, Ding, Jintai, Sendrier, N. Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGSnull. 2010, 6061: 41-+, [110] Tang, Xiaohu, Helleseth, Tor, Hu, Lei, Jiang, Wenfeng. Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2009, 55(4): 1833-1840, http://www.corc.org.cn/handle/1471x/2402585.
[111] Cao Weiwei, Hu Lei, Youm HY, Yung M. Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure. INFORMATION SECURITY APPLICATIONSnull. 2009, 5932: 254-267, [112] Jiang, Wenfeng, Hu, Lei, Tang, Xiaohu, Zeng, Xiangyong. New Optimal Quadriphase Sequences With Larger Linear Span. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2009, 55(1): 458-470, http://www.corc.org.cn/handle/1471x/2394658.
[113] Lei Hu. GMW sequences over Galois rings and their linear complexities. FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA. 2009, [114] Helleseth, Tor, Hu, Lei, Kholosha, Alexander, Zeng, Xiangyong, Li, Nian, Jiang, Wenfeng. Period-Different m-Sequences With at Most Four-Valued Cross Correlation. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2009, 55(7): 3305-3311, https://www.webofscience.com/wos/woscc/full-record/WOS:000267222000026.
[115] Carlet, Claude, Zeng, Xiangyong, Li, Chunlei, Hu, Lei. Further properties of several classes of Boolean functions with optimum algebraic immunity. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2009, 52(3): 303-338, https://www.webofscience.com/wos/woscc/full-record/WOS:000266007400005.
[116] Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. 2008, [117] 李德荣, 王绍斌, 胡磊. 一种改进的WLAN与3GPP系统互连框架. 微电子学与计算机[J]. 2008, 25(9): 98-101, http://lib.cqvip.com/Qikan/Article/Detail?id=28238809.
[118] 李胜华, 曾祥勇, 胡磊, 刘合国. 基于两族函数的低相关二元序列集构造. 电子学报[J]. 2007, 35(11): 2215-2219, http://lib.cqvip.com/Qikan/Article/Detail?id=26156679.
[119] 李学俊, 胡磊. 指数对的k阶自适应窗口表示算法. 电子学报[J]. 2006, 34(8): 1513-1516, https://d.wanfangdata.com.cn/periodical/dianzixb200608031.
[120] 曾祥勇, 江文峰, 胡磊, 刘合国. 一类零相关区序列集构造方法的改进. 电子学报[J]. 2005, 33(8): 1476-1479, http://lib.cqvip.com/Qikan/Article/Detail?id=20030450.
[121] Zeng, Xiangyong, Hu, Lei, Jiang, Wenfeng, Yue, Qin, Cao, Xiwang. Weight Distribution of A p-ary Cyclic Code. http://arxiv.org/abs/0901.2391.
[122] Zha, Zhengbang, Hu, Lei, Sun, Siwei, Shan, Jinyong. Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$. http://arxiv.org/abs/1502.03874.
发表著作
(1) 信息安全中的数学方法与技术, 清华大学出版社, 2009-10, 

科研活动

   
科研项目
( 1 ) 国家自然科学基金, 负责人, 国家任务, 2015-01--2018-12
( 2 ) 有限域上代数方程算法问题研究, 负责人, 国家任务, 2013-01--2017-08
( 3 ) 保密课题, 负责人, 其他国际合作项目, 2017-05--2017-12
( 4 ) 保密项目, 参与, 其他国际合作项目, 2017-01--2017-12
( 5 ) 量子安全的轻量级密码与安全协议, 负责人, 国家任务, 2018-01--2022-12
( 6 ) 保密课题, 负责人, 其他国际合作项目, 2017-07--2019-12
( 7 ) 基于自动化搜索与深度学习的密码分析与设计, 负责人, 国家任务, 2019-11--2024-10
参与会议
(1)Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY   2023-04-22
(2)New Properties of Double Boomerang Connectivity Table   2023-03-20
(3)Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange   2022-12-05
(4)Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery   2022-12-05
(5)Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials   2021-12-01
(6)Integer LWE with Non-Subgaussian Error and Related Attacks   2021-11-01
(7) Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks   2021-08-19
(8)Attack Beyond-Birthday-Bound MACs in Quantum Setting   2021-07-20
(9)Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories   2020-12-01
(10)Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions   2020-11-02
(11)Lightweight Iterative MDS Matrices: How Small Can We Go   2020-03-16
(12)Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging   2019-12-15
(13)Convolutional Neural Network based Side-Channel Attacks with Customized Filters   2019-12-15
(14)Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction, Indocrypt'2019Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction    2019-12-10
(15)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS   2019-08-19
(16)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator   2019-08-19
(17)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits   2019-03-18
(18)Boomerang Connectivity Table Revisited   2019-03-18
(19)Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints   2018-12-04
(20)A Deterministic Algorithm for Computing Divisors in an Interval   2018-07-11
(21)Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy   2018-05-02
(22)Improved Results on Cryptanalysis of Prime Power RSA   2016-11-30
(23)An Improved Analysis on Three Variants of the RSA Cryptosystem   2016-11-04
(24)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR   2016-09-28
(25)Related-key Impossible Differential Analysis of Full \emph{Khudra}   2016-09-12
(26)Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption   2016-09-07
(27)Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication   2016-09-07
(28)MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck   2016-03-20
(29)Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents   2015-11-28
(30)Recovering a Sum of Two Squares Decomposition Revisited   2015-11-01
(31)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s   2015-09-07
(32)Implicit Factorization of RSA Moduli Revisited   2015-09-07
(33)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis   2015-08-27
(34)Improved Differential Analysis of Block Cipher PRIDE   Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan and Xiaoshuang Ma   2015-05-18
(35)Partial Prime Factor Exposure Attacks on RSA and Its Takag Variant   Liqiang Peng, Lei Hu, Jun Xu and Zhangjie Huang   2015-05-18
(36)Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers   [12] Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song   2014-12-09
(37)Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization   Zhangjie Huang, Lei Hu and Jun Xu   2014-10-21
(38)Tighter Security Bound of MIBS Block Cipher Against Differential Attack   Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan   2014-10-10
(39)Error-Tolerant Algebraic Side-Channel Attacks Uing BEE   Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi and Ronglin Hao   2014-08-29
(40)Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers   Ling Song, Lei Hu, Bingke Ma and Danping Shi   2014-07-18
(41)Partial Key Exposure Attacks on Takagi Variant of RSA   Zhangjie Huang and Lei Hu and Jun Xu and Liqiang Peng and Yonghong Xie   2014-06-10
(42) Further Improvement of Factoring RSA Moduli with Implicit Hint   Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie   2014-05-27
(43)Modular Inversion Hidden Number Problem Revisited   Jun Xu, Lei Hu, Zhangjie Huang and Liqiang Peng   2014-05-05
(44)Automatic Security Evaluation of Block Ciphers with S-bP Structures against Differential Attack   [21] Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang   2013-11-27
(45)Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher   Ling Song and Lei Hu   2013-05-12
(46)Differential Fault Attack on the PRINCE Block Cipher   Ling Song and Lei Hu   2013-05-05
(47)Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem   Jun Xu, Lei Hu, Siwei Sun, Ping Wang   2012-12-12
(48)Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem   Jun Xu, Lei Hu, Siwei Sun   2012-10-30
(49)Cube Cryptanalysis of Hitag2 Stream Cipher   Siwei Sun, Lei Hu, Yonghong Xie and Xiangyong Zeng   2011-12-16
(50)A New Family of Quadriphase Sequences with Low Correlation   Jie Li, Xiangyong Zeng, Lei Hu   2011-05-30
(51)Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme   Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin   2011-05-29
(52)How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols   Weijia Wang, Lei Hu, Yong Li   2010-10-20
(53)Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme   第三届国际后量子密码学会议   Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding   2010-05-25
(54)A Class of Boolean Functions With Four-Valued Walsh Spectra   Yonghong Xie, Lei Hu, Wenfeng Jiang, XiangyongZeng   2009-10-08
(55)Cryptanalysis of A Multivariate Public Key Encryption Scheme With Internal Perturbation Structure   Weiwei Cao, Lei Hu   2009-08-25
(56)Constructing Linear Transformations of MPKCs By Generalized Central Symmetric Matrices   Xin Jiang, Lei Hu, Jintai Ding    2009-08-22
(57)Algebraic Attack of SMS4 and the Comparison with AES,   Wen Ji, Lei Hu, Haiwen Ou   2009-08-18
(58)Period-Different m-Sequences With At Most Four-Valued Cross Correlation   Lei Hu, Xiangyong Zeng, Nian Li, Wenfeng Jiang   2008-11-19
(59)ROAD: an RFID Offline Authentication, privacy preserving protocol with Dos resilience   Fen Liu, Lei Hu   2008-10-15

指导学生

已指导学生

汪维家  博士研究生  081220-信息安全  

鲁力  博士研究生  081202-计算机软件与理论  

孙霓刚  博士研究生  081220-信息安全  

聂旭云  博士研究生  081220-信息安全  

李剑宇  硕士研究生  081203-计算机应用技术  

周知远  硕士研究生  081220-信息安全  

张培清  硕士研究生  081202-计算机软件与理论  

冀文  博士研究生  081220-信息安全  

张晓磊  博士研究生  081220-信息安全  

李伟博  硕士研究生  081220-信息安全  

刘芬  博士研究生  081220-信息安全  

江文峰  博士研究生  081220-信息安全  

蒋鑫  博士研究生  081220-信息安全  

解永宏  博士研究生  081220-信息安全  

曹巍巍  博士研究生  081220-信息安全  

孙思维  博士研究生  081220-信息安全  

许军  博士研究生  081220-信息安全  

单进勇  博士研究生  081220-信息安全  

黄章杰  博士研究生  081220-信息安全  

宋凌  博士研究生  081220-信息安全  

彭力强  博士研究生  0812Z1-信息安全  

史丹萍  博士研究生  0812Z1-信息安全  

乔珂欣  博士研究生  0812Z1-信息安全  

马小双  博士研究生  0812Z1-信息安全  

王申晖  硕士研究生  0812Z1-信息安全  

杨倩倩  博士研究生  0812Z1-信息安全  

张英杰  博士研究生  083900-网络空间安全  

李顺  博士研究生  083900-网络空间安全  

蔡家豪  硕士研究生  085211-计算机技术  

魏曼  博士研究生  083900-网络空间安全  

魏子豪  博士研究生  083900-网络空间安全  

王天宇  博士研究生  083900-网络空间安全  

陈秋  硕士研究生  083900-网络空间安全  

高婧  博士研究生  083900-网络空间安全  

王彩冰  博士研究生  083900-网络空间安全  

徐博文  博士研究生  083900-网络空间安全  

郭浩  博士研究生  083900-网络空间安全  

王梦凡  博士研究生  083900-网络空间安全  

现指导学生

郭一  博士研究生  083900-网络空间安全  

赵佳豪  博士研究生  083900-网络空间安全  

闫振国  博士研究生  083900-网络空间安全  

乔文潇  博士研究生  083900-网络空间安全  

张志宇  博士研究生  083900-网络空间安全  

毛淑平  博士研究生  083900-网络空间安全  

方栋  博士研究生  083900-网络空间安全  

陈芷如  博士研究生  083900-网络空间安全  

徐浩萌  博士研究生  083900-网络空间安全  

李志伟  博士研究生  083900-网络空间安全