083900-网络空间安全

工作经历

社会兼职
2015-03-01-今,中国密码学会理事, 理事
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委,
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委

RFID安全算法与协议

专利与奖励

奖励信息
（1） 2021年度岗位教师考核教学单项优秀, 研究所（学校）, 2021
（2） 2020年中国标准创新贡献奖标准项目奖, 三等奖, 部委级, 2020
（3） 岗位教师考核教学单项优秀, 研究所（学校）, 2020
（4） 岗位教师考核科研成果单项优秀, 研究所（学校）, 2019
（5） 岗位教师考核讲义单项优秀, , 研究所（学校）, 2018
（6） 非线性密码函数和循环码, 二等奖, 省级, 2017
（7） 岗位教师考核教学单项优秀, 研究所（学校）, 2017
（8） XXX密码算法, 一等奖, 部委级, 2009
（9） ×××的密码学特性及其构造, 二等奖, 部委级, 2002
专利成果
（ 1 ） 分组密码抗线性攻击安全性的评估方法, 2014, 第 1 作者, 专利号: CN104158796A

（ 2 ） 获取分组密码活跃S盒个数下界的方法, 2013, 第 1 作者, 专利号: CN103427986A

出版信息

发表论文
（1） Attack Beyond-Birthday-Bound MACs in Quantum Setting, PQCrypto 2021, 2021, 第 1 作者
（2） Security analysis of Subterranean 2.0, DESIGNS CODES AND CRYPTOGRAPHY, 2021, 第 4 作者
（3） Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials, Asiacrypt 2021, 2021, 第 1 作者
（4） Camellia算法S盒的紧凑硬件实现, 密码学报, 2021, 第 1 作者
（5） A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs, Asiacrypt 2021, 2021, 第 5 作者
（6） Simon量子算法攻击下的可调加密方案研究, 信息安全学报, 2021, 第 1 作者
（7） Further results on optimal ternary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2021, 第 2 作者
（8） Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials, ASIACRYPT 2021, 2021,
（9） Integer LWE with Non-Subgaussian Error and Related Attacks, International Security Conference (ISC 2021), 2021, 第 1 作者
（10） Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks, CRYPTO 2021, 2021, 第 1 作者
（11） Cryptanalysis of elliptic curve hidden number problem from PKC 2017, DESIGNS CODES AND CRYPTOGRAPHY, 2020, 第 2 作者
（12） Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories, ASIACRYPT 2020, 2020, 第 1 作者
（13） Scrutinizing the Tower Field Implementation of the F(2^8) Inverter - with Applications to AES, Camellia, and SM4, International Journal of Information and Computer Security, 2020, 第 1 作者
（14） Convolutional Neural Network Based Side-Channel Attacks with Customized Filters, INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 第 5 作者
（15） Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions, ToSC 2020, IACR Transactions on Symmetric Cryptology (ToSC) （FSE 2020））, 2020, 第 1 作者
（16） Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging, The 21st International Conference on Information and Communications Security (ICICS 2019), 2019, 第 1 作者
（17） Boomerang Connectivity Table Revisited Application to SKINNY and AES, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 第 3 作者
（18） A smaller first-order DPA resistant AES implementation with no fresh randomness, SCIENCE CHINA Information Sciences, 2019, 第 1 作者
（19） Constructions of Involutions Over Finite Fields, IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 第 4 作者
（20） RSA变型方案小解密指数攻击的改进分析, Improved Analysis of Variant of RSA Scheme with Small Decryption Exponent, 密码学报, 2019, 第 3 作者
（21） Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 第 3 作者
（22） New results on permutation polynomials of the form(x^{p^m}−x+δ)^s+ x^{p^m}+x over F_{p^{2m}}, Cryptography and Communications, 2018, 第 1 作者
（23） Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints, Asiacrypt 2018, 2018, 第 1 作者
（24） Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy, ISC 2018-The 21st Information Security Conference-ISC2018, 2018, 第 1 作者
（25） Cryptanalysis of Dual RSA, DESIGNS CODES AND CRYPTOGRAPHY, 2017, 第 2 作者
（26） Further results on permutation trinomials over finite fields with even characteristic, FINITE FIELDS AND THEIR APPLICATIONS, 2017, 第 2 作者
（27） Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator., Design, Codes Cryptography, 2017, 第 1 作者
（28） Several Classes of Boolean Functions with Four-Valued Walsh Spectra, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 第 2 作者
（29） 有限域上置换多项式的几种构造, Several Constructions of Permutation Polynomials over Finite Fields, 密码学报, 2017, 第 2 作者
（30） Improved linear (hull) cryptanalysis of round-reduced versions of simon, SCIENCE CHINA-INFORMATION SCIENCES, 2017, 通讯作者
（31） Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}}, Finite Fields and Their Applications, 2016, 第 1 作者
（32） The weight distributions of two classes of binary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2015, 第 3 作者
（33） Improved MILP Modeling for Automatic Security Evaluation and Application to FOX, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, 第 2 作者
（34） Differential fault attack on Zorro block cipher, SECURITY AND COMMUNICATION NETWORKS, 2015, 第 2 作者
（35） The weight distributions of a class of non-primitive cyclic codes with two nonzeros, SCIENCE CHINA-MATHEMATICS, 2015, 第 3 作者
（36） Constructing permutations and complete permutations over finite fields via subfield-valued polynomials, FINITE FIELDS AND THEIR APPLICATIONS, 2015, 第 2 作者
（37） The weight distribution of a family of p-ary cyclic codes, DESIGNS CODES AND CRYPTOGRAPHY, 2015, 第 4 作者
（38） Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications, IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 第 2 作者
（39） 19轮RECTANGLE-80的相关密钥差分分析, Related-Key Differential Attack on 19-Round Reduced RECTANGLE-80, 密码学报, 2015, 第 2 作者
（40） Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks, DESIGNS CODES AND CRYPTOGRAPHY, 2015, 第 5 作者
（41） Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH, DESIGNS CODES AND CRYPTOGRAPHY, 2014, 第 2 作者
（42） New constructions of APN polynomial functions in odd characteristic, APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2014, 第 2 作者
（43） Cryptanalysis of countermeasures against multiple transmission attacks on ntru, IET COMMUNICATIONS, 2014, 第 2 作者
（44） Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者
（45） Several classes of complete permutation polynomials, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 3 作者
（46） A generic homomorphic MAC construction for authentication in network coding, SECURITY AND COMMUNICATION NETWORKS, 2014, 第 2 作者
（47） The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs, IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 第 5 作者
（48） Constructing new differentially 4-uniform permutations from the inverse function, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 2 作者
（49） The weight distributions of two classes of p-ary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 3 作者
（50） Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher, CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 第 2 作者
（51） Cryptanalysis of two cryptosystems based on multiple intractability assumptions, IET COMMUNICATIONS, 2014, 第 2 作者
（52） Constructing permutation polynomials from piecewise permutations, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 2 作者
（53） 模背包向量问题的实际复杂度与基于格密码体制的实际安全性, 密码学报, 2014, 第 2 作者
（54） Analysis of two public key cryptosystems based on randomized knapsack sequences∗, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者
（55） CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 第 2 作者
（56） Periods of polynomials over a Galois ring, SCIENCE CHINA-MATHEMATICS, 2013, 通讯作者
（57） NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 第 4 作者
（58） Analysis of two knapsack public key cryptosystems, IET COMMUNICATIONS, 2013, 第 2 作者
（59） On a class of binomial bent functions over the finite fields of odd characteristic, APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 第 3 作者
（60） Permutation polynomials with low differential uniformity over finite fields of odd characteristic, SCIENCE CHINA-MATHEMATICS, 2013, 第 5 作者
（61） Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security, Computers and Mathematics with Applications, 2012, 第 2 作者
（62） A matrix construction of Boolean functions with maximum algebraic immunity, JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2012, 第 2 作者
（63） A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions, FINITE FIELDS AND THEIR APPLICATIONS, 2012, 第 3 作者
（64） A construction of hyperbent functions with polynomial trace form, SCIENCE CHINA-MATHEMATICS, 2011, 第 2 作者
（65） Construction of 1-resilient Boolean functions with optimum algebraic immunity, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 第 3 作者
（66） 诚实发送者承诺与诚实接收者承诺电子与信息学报，, 电子与信息学报, 2011, 第 1 作者
（67） Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n}, Appl. Algebra Eng. Commun. Comput., 2010,
（68） An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model, 中国科学院研究生院学报, 2010, 第 1 作者
（69） Two new families of optimal binary sequences obtained from quaternary sequences, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 3 作者
（70） New optimal quadriphase sequences with larger linear span, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 2 作者
（71） GMW sequences over Galois rings and their linear complexities, FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA, 2009, 第 1 作者
（72） Further properties of several classes of Boolean functions with optimum algebraic immunity, DESIGNS CODES AND CRYPTOGRAPHY, 2009, 第 4 作者
（73） Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008,
（74） Weight Distribution of A p-ary Cyclic Code, 第 2 作者
（75） Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$, 第 2 作者
发表著作
（ 1 ） 信息安全中的数学方法与技术, 清华大学出版社, 2009-10,

科研活动

科研项目
（ 1 ） 国家自然科学基金, 负责人, 国家任务, 2015-01--2018-12
（ 2 ） 有限域上代数方程算法问题研究, 负责人, 国家任务, 2013-01--2017-08
（ 3 ） 保密课题, 负责人, 其他任务, 2017-05--2017-12
（ 4 ） 保密项目, 参与, 其他任务, 2017-01--2017-12
（ 5 ） 量子安全的轻量级密码与安全协议, 负责人, 国家任务, 2018-01--2022-12
（ 6 ） 保密课题, 负责人, 其他任务, 2017-07--2019-12
（ 7 ） 基于自动化搜索与深度学习的密码分析与设计, 负责人, 国家任务, 2019-11--2024-10
参与会议
（1）Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials   2021-12-01
（2）Integer LWE with Non-Subgaussian Error and Related Attacks   2021-11-01
（3） Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks   2021-08-19
（4）Attack Beyond-Birthday-Bound MACs in Quantum Setting   2021-07-20
（5）Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories   2020-12-01
（6）Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions   2020-11-02
（7）Lightweight Iterative MDS Matrices: How Small Can We Go   2020-03-16
（8）Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging   2019-12-15
（9）Convolutional Neural Network based Side-Channel Attacks with Customized Filters   2019-12-15
（10）Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction, Indocrypt'2019Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction    2019-12-10
（11）Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS   2019-08-19
（12）New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator   2019-08-19
（13）Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits   2019-03-18
（14）Boomerang Connectivity Table Revisited   2019-03-18
（15）Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints   2018-12-04
（16）A Deterministic Algorithm for Computing Divisors in an Interval   2018-07-11
（17）Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy   2018-05-02
（18）Improved Results on Cryptanalysis of Prime Power RSA   2016-11-30
（19）An Improved Analysis on Three Variants of the RSA Cryptosystem   2016-11-04
（20）Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR   2016-09-28
（21）Related-key Impossible Differential Analysis of Full \emph{Khudra}   2016-09-12
（22）Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption   2016-09-07
（23）Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication   2016-09-07
（24）MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck   2016-03-20
（25）Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents   2015-11-28
（26）Recovering a Sum of Two Squares Decomposition Revisited   2015-11-01
（27）Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s   2015-09-07
（28）Implicit Factorization of RSA Moduli Revisited   2015-09-07
（29）Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis   2015-08-27
（30）Improved Differential Analysis of Block Cipher PRIDE   Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan and Xiaoshuang Ma   2015-05-18
（31）Partial Prime Factor Exposure Attacks on RSA and Its Takag Variant   Liqiang Peng, Lei Hu, Jun Xu and Zhangjie Huang   2015-05-18
（32）Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers   [12] Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song   2014-12-09
（33）Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization   Zhangjie Huang, Lei Hu and Jun Xu   2014-10-21
（34）Tighter Security Bound of MIBS Block Cipher Against Differential Attack   Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan   2014-10-10
（35）Error-Tolerant Algebraic Side-Channel Attacks Uing BEE   Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi and Ronglin Hao   2014-08-29
（36）Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers   Ling Song, Lei Hu, Bingke Ma and Danping Shi   2014-07-18
（37）Partial Key Exposure Attacks on Takagi Variant of RSA   Zhangjie Huang and Lei Hu and Jun Xu and Liqiang Peng and Yonghong Xie   2014-06-10
（38） Further Improvement of Factoring RSA Moduli with Implicit Hint   Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie   2014-05-27
（39）Modular Inversion Hidden Number Problem Revisited   Jun Xu, Lei Hu, Zhangjie Huang and Liqiang Peng   2014-05-05
（40）Automatic Security Evaluation of Block Ciphers with S-bP Structures against Differential Attack   [21] Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang   2013-11-27
（41）Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher   Ling Song and Lei Hu   2013-05-12
（42）Differential Fault Attack on the PRINCE Block Cipher   Ling Song and Lei Hu   2013-05-05
（43）Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem   Jun Xu, Lei Hu, Siwei Sun, Ping Wang   2012-12-12
（44）Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem   Jun Xu, Lei Hu, Siwei Sun   2012-10-30
（45）Cube Cryptanalysis of Hitag2 Stream Cipher   Siwei Sun, Lei Hu, Yonghong Xie and Xiangyong Zeng   2011-12-16
（46）A New Family of Quadriphase Sequences with Low Correlation   Jie Li, Xiangyong Zeng, Lei Hu   2011-05-30
（47）Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme   Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin   2011-05-29
（48）How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols   Weijia Wang, Lei Hu, Yong Li   2010-10-20
（49）Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme   第三届国际后量子密码学会议   Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding   2010-05-25
（50）A Class of Boolean Functions With Four-Valued Walsh Spectra   Yonghong Xie, Lei Hu, Wenfeng Jiang, XiangyongZeng   2009-10-08
（51）Cryptanalysis of A Multivariate Public Key Encryption Scheme With Internal Perturbation Structure   Weiwei Cao, Lei Hu   2009-08-25
（52）Constructing Linear Transformations of MPKCs By Generalized Central Symmetric Matrices   Xin Jiang, Lei Hu, Jintai Ding    2009-08-22
（53）Algebraic Attack of SMS4 and the Comparison with AES,   Wen Ji, Lei Hu, Haiwen Ou   2009-08-18
（54）Period-Different m-Sequences With At Most Four-Valued Cross Correlation   Lei Hu, Xiangyong Zeng, Nian Li, Wenfeng Jiang   2008-11-19
（55）ROAD: an RFID Offline Authentication, privacy preserving protocol with Dos resilience   Fen Liu, Lei Hu   2008-10-15