发表论文
[1] Ling Song, Qianqian Yang, Yincen Chen, 胡磊, Jian Weng. Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. EuroCrypt 2024. 2024, 第 4 作者null(null): [2] 高红敏, 黄桂芳, 王梦凡, 胡磊. 关于ISIS问题的零知识证明实例化. 信息安全学报[J]. 2024, 第 4 作者null(null): https://jcs.iie.ac.cn/ch/reader/pdf.aspx?file_no=202111220000001&journal_id=xxaqxb.[3] Yang, Qianqian, Song, Ling, Zhang, Nana, Shi, Danping, Wang, Libo, Zhao, Jiahao, Hu, Lei, Weng, Jian. Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. JOURNAL OF CRYPTOLOGY[J]. 2024, 第 7 作者37(2): http://dx.doi.org/10.1007/s00145-024-09499-1.[4] Yuchao Chen, 郭婷婷, 胡磊, Lina Shang, 毛淑平, 王鹏. Small Stretch Problem of the DCT Scheme and How to Fix It. IACR Trans. Symmetric Cryptology[J]. 2024, 第 3 作者null(null): [5] Zhiwei Li, Jun Xu, Yanli Zou, 胡磊. Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse Scenario. ESORICS 2024. 2024, 第 4 作者null(null): [6] 史丹萍, 孙思维, Ling Song, Lei Hu, Qianqian Yang. Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY. 欧密 2023. 2023, 第 4 作者null(null): [7] Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu. Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2023, 第 4 作者https://doaj.org/article/b2ff2d1a4a674169b2712e44e5b3686e.[8] Yunwen Liu, Siwei Sun, Zhongfeng Niu, Chao Li, 胡磊. Rotational Differential-Linear Cryptanalysis Revisited. Journal of Cryptology[J]. 2023, 第 5 作者[9] Dong Fang, Guifang Huang, Mengfan Wang, Lei Hu. Decreasing Proof Size of BLS Scheme. The Computer Journal[J]. 2023, 第 4 作者https://academic.oup.com/comjnl/advance-article-abstract/doi/10.1093/comjnl/bxad040/7135776?redirectedFrom=fulltext.[10] Wenxiao Qiao, Hailun Yan, Siwei Sun, Lei Hu, Jiwu Jing. New cryptanalysis of LowMC with algebraic techniques. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2023, 第 4 作者91(5): 2057-2075, http://dx.doi.org/10.1007/s10623-022-01178-1.[11] Guo, Hao, Zhang, Zhiyu, Yang, Qianqian, Hu, Lei, Luo, Yiyuan. A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT. COMPUTER JOURNAL[J]. 2023, 第 4 作者66(5): 1069-1082, http://dx.doi.org/10.1093/comjnl/bxab213.[12] Yin Lv, Danping Shi, Yi Guo, 胡磊, Zihui Guo, Caibing Wang. Automatic Demirci-Selcuk meet-in-the-middle attack on SIMON,. The Computer Journal[J]. 2023, 第 4 作者null(null): [13] 许军, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2023, 第 3 作者[14] 王梦凡, 黄桂芳, 高红敏, 胡磊. 基于格的高效零知识证明. 信息安全学报[J]. 2023, 第 4 作者[15] Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, 王彩冰. Improved linear cryptanalysis of block cipher BORON. The Computer Journal[J]. 2023, 第 3 作者[16] Yi Guo, Danping Shi, 胡磊, Yin Lv. Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra. The 19th International Conference on Information Security and Cryptology (Inscrypt 2023). 2023, 第 3 作者[17] Wei, Man, Sun, Siwei, Wei, Zihao, Gong, Zheng, Hu, Lei. A small first-order DPA resistant AES implementation with no fresh randomness. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2022, 第 5 作者65(6): 257-259, http://dx.doi.org/10.1007/s11432-019-1469-7.[18] Ling Song, Nana Zhang, Qiaqian Yang, Danping Shi, Jiahao Zhao, 胡磊, Jian Weng. Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery, Asiacrypt 2022. 亚密 2022. 2022, 第 6 作者[19] Jing Gao, Jun Xu, Tianyu Wang, Lei Hu. New Results of Breaking the CLS Scheme from ACM-CCS 2014. ICICS 2022. 2022, 第 4 作者[20] Jing Gao, Jun Xu, Lei Hu. Inferring Sequences Produced by the Quadratic Generator. Inscrypt 2022. 2022, 第 3 作者[21] 王天宇, 许军, 刘月君, 胡磊, 周永彬. 基于格Fiat-Shamir签名随机数泄漏攻击的若干改进. 密码学报[J]. 2022, 第 4 作者9(6): 1039-1052, http://lib.cqvip.com/Qikan/Article/Detail?id=7108746309.[22] Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang. Improved MITM Cryptanalysis on Streebog. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2022, 第 5 作者https://doaj.org/article/b1a4961b86194bce9483f5c697c949ff.[23] Tingting Guo, Peng Wang, Dingfeng Ye, 胡磊. Quantum Attacks on PRFs Based on Public Random Permutations. Indocrypt 2022. 2022, 第 4 作者[24] Shuping Mao, Tingting Guo, Peng Wang, 胡磊. Quantum attacks on Lai-Massey structure. PQCrypto 2022. 2022, 第 4 作者[25] 王梦凡, 黄桂芳, 高红敏, 胡磊. improved zero knowledge proofs for commitments from learning parity with noise. TRUSTCOM. 2022, 第 4 作者https://conferences.computer.org/trustcompub/pdfs/TrustCom2022-4vviSeT2jitGOhptwbD5kH/942500a415/942500a415.pdf.[26] Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye. Attack Beyond-Birthday-Bound MACs in Quantum Setting. PQCrypto 2021. 2021, 第 3 作者[27] Ling Song, Yi Tu, Danping Shi, Lei Hu. Security analysis of Subterranean 2.0. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2021, 第 4 作者89(8): 1875-1905, http://dx.doi.org/10.1007/s10623-021-00892-6.[28] Lei Hu. Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. Asiacrypt 2021. 2021, 第 1 作者[29] 胡磊. Camellia算法S盒的紧凑硬件实现. 密码学报. 2021, 第 1 作者[30] Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding. A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. Asiacrypt 2021. 2021, 第 5 作者[31] 胡磊. A small first-order DPA resistant AES implementation with no fresh randomness. 2021, 第 1 作者[32] 胡磊. Simon量子算法攻击下的可调加密方案研究. 信息安全学报. 2021, 第 1 作者[33] Zha, Zhengbang, Hu, Lei, Liu, Yan, Cao, Xiwang. Further results on optimal ternary cyclic codes. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2021, 第 2 作者75: http://dx.doi.org/10.1016/j.ffa.2021.101898.[34] 孙思维. Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. ASIACRYPT 2021. 2021, [35] Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu. Integer LWE with Non-Subgaussian Error and Related Attacks. International Security Conference (ISC 2021). 2021, 第 4 作者[36] Wei, Man, Sun, Siwei, Wei, Zihao, Hu, Lei. Unbalanced sharing: a threshold implementation of SM4. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2021, 第 4 作者64(5): 214-216, https://www.webofscience.com/wos/woscc/full-record/WOS:000632905000001.[37] Xiaoyang Dong, JialiangHua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu. Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. CRYPTO 2021[J]. 2021, 第 6 作者[38] Jun Xu, Lei Hu, Santanu Sarkar. Cryptanalysis of elliptic curve hidden number problem from PKC 2017. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2020, 第 2 作者88(2): 341-361, https://www.webofscience.com/wos/woscc/full-record/WOS:000490197600001.[39] 张英杰, 胡磊, 史丹萍, 王鹏, 孙思维, 魏荣. Grain-v1快速相关攻击的改进. 密码学报[J]. 2020, 第 2 作者7(6): 812-825, http://lib.cqvip.com/Qikan/Article/Detail?id=7103776919.[40] Xiaoyang Dong, Sun Siwei, Danping Shi, fei gao, Xiaoyun Wang, Lei Hu. Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. 亚密 2020[J]. 2020, 第 6 作者https://link.springer.com/chapter/10.1007/978-3-030-64834-3_25.[41] Lei Hu. Scrutinizing the Tower Field Implementation of the F(2^8) Inverter - with Applications to AES, Camellia, and SM4. International Journal of Information and Computer Security. 2020, 第 1 作者[42] Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang. Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2020, 第 6 作者https://tosc.iacr.org/index.php/ToSC/article/view/8698.[43] Lei Hu. Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions, ToSC 2020. IACR Transactions on Symmetric Cryptology (ToSC) (FSE 2020)). 2020, 第 1 作者[44] Qiu Chen, Danping Shi, Siwei Sun, Lei Hu. Automatic Demirci-Selcuk Meet-in-the-Middle Attack on SKINNY with Key-bridging. The 21st International Conference on Information and Communications Security (ICICS 2019). 2019, 第 4 作者null(null): https://link.springer.com/chapter/10.1007/978-3-030-41579-2_14.[45] Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1. 2019, 第 3 作者11692: 297-321, [46] Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu. Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. 美密 2019[J]. 2019, 第 5 作者11693: 180-209, https://link.springer.com/chapter/10.1007/978-3-030-26951-7_7.[47] Ling Song, Xianrui Qin, Lei Hu. Boomerang Connectivity Table Revisited Application to SKINNY and AES. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2019, 第 3 作者https://doaj.org/article/725c5fa6b6c848e3b3b7225151ac689c.[48] Lei Hu. A smaller first-order DPA resistant AES implementation with no fresh randomness. SCIENCE CHINA Information Sciences. 2019, 第 1 作者[49] Zheng, Dabin, Yuan, Mu, Li, Nian, Hu, Lei, Zeng, Xiangyong. Constructions of Involutions Over Finite Fields. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2019, 第 4 作者65(12): 7876-7883, https://www.webofscience.com/wos/woscc/full-record/WOS:000512370800015.[50] Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu. Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. ICICS 2019[J]. 2019, 第 5 作者11999: 799-813, https://link.springer.com/chapter/10.1007/978-3-030-41579-2_46.[51] Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu. Lightweight Iterative MDS Matrices: How Small Can We Go?. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2019, 第 5 作者2019(4): 147-170, http://dx.doi.org/10.13154/tosc.v2019.i4.147-170.[52] 孙哲蕾, 彭力强, 胡磊, 王强. RSA变型方案小解密指数攻击的改进分析. 密码学报[J]. 2019, 第 3 作者6(4): 486-495, http://lib.cqvip.com/Qikan/Article/Detail?id=7002861735.[53] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019[J]. 2019, 第 3 作者11898: 398-411, [54] Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun. On the Complexity of Impossible Differential Cryptanalysis. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, 第 2 作者 通讯作者 https://www.hindawi.com/journals/scn/2018/7393401/.[55] Peng, Liqiang, Lu, Yao, Kunihiro, Noboru, Zhang, Rui, Hu, Lei, Susilo, W, Yang, G. A Deterministic Algorithm for Computing Divisors in an Interval. INFORMATION SECURITY AND PRIVACY. 2018, 第 5 作者10946: 3-12, [56] Lei Hu. New results on permutation polynomials of the form(x^{p^m}−x+δ)^s+ x^{p^m}+x over F_{p^{2m}}. Cryptography and Communications. 2018, 第 1 作者[57] Danping Shi, Siwei Sun, Patrick Derbez, sasaki yu, bing sun, Lei Hu. Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints. 亚密 2018[J]. 2018, 第 6 作者11273: 3-34, https://link.springer.com/chapter/10.1007/978-3-030-03329-3_1.[58] Shan, Jinyong, Hu, Lei, Zeng, Xiangyong, Li, Chunlei. A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2018, 第 2 作者 通讯作者 31(4): 1042-1064, http://lib.cqvip.com/Qikan/Article/Detail?id=675001509.[59] Lei Hu. Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy. ISC 2018-The 21st Information Security Conference-ISC2018. 2018, 第 1 作者[60] Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2018, 第 3 作者86(9): 1997-2033, http://dx.doi.org/10.1007/s10623-017-0435-4.[61] Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu. Analysis of AES, SKINNY, and Others with Constraint Programming. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2017, 第 7 作者281-306, https://doaj.org/article/d8028eb26a5544bd999bee7740ca3a44.[62] Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang. Cryptanalysis of Dual RSA. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 第 2 作者83(1): 1-21, https://www.webofscience.com/wos/woscc/full-record/WOS:000394969100001.[63] Zha, Zhengbang, Hu, Lei, Fan, Shuqin. Further results on permutation trinomials over finite fields with even characteristic. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2017, 第 2 作者45: 43-52, https://www.webofscience.com/wos/woscc/full-record/WOS:000399063100003.[64] Lei Hu. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.. Design, Codes Cryptography. 2017, 第 1 作者[65] Sun, Zhiqiang, Hu, Lei. Several Classes of Boolean Functions with Four-Valued Walsh Spectra. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE[J]. 2017, 第 2 作者28(4): 357-377, https://www.webofscience.com/wos/woscc/full-record/WOS:000407230400004.[66] 查正邦, 胡磊. 有限域上置换多项式的几种构造. 密码学报[J]. 2017, 第 2 作者4(3): 291-298, http://dx.doi.org/10.13868/j.cnki.jcr.000182.[67] Shi, Danping, Hu, Lei, Sun, Siwei, Song, Ling, Qiao, Kexin, Ma, Xiaoshuang. Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 第 2 作者 通讯作者 60(3): http://www.corc.org.cn/handle/1471x/2376207.[68] Lei Hu. Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}}. Finite Fields and Their Applications. 2016, 第 1 作者[69] Fu Kai, Wang Meiqin, Guo Yinghua, Sun Siwei, Hu Lei, Peyrin T. MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. FAST SOFTWARE ENCRYPTION (FSE 2016). 2016, 第 5 作者9783: 268-288, [70] Wang, Xiaoqiang, Zheng, Dabin, Hu, Lei, Zeng, Xiangyong. The weight distributions of two classes of binary cyclic codes. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2015, 第 3 作者34: 192-207, https://www.webofscience.com/wos/woscc/full-record/WOS:000353250100013.[71] Qiao, Kexin, Hu, Lei, Sun, Siwei, Ma, Xiaoshuang, Kan, Haibin. Improved MILP Modeling for Automatic Security Evaluation and Application to FOX. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2015, 第 2 作者E98A(1): 72-80, [72] Shan, Jinyong, Hu, Lei, Sun, Siwei, Karthigaikumar, P, Arulmurugan, C, Manojkumar, T. Security of LBlock-s against Related-Key Differential Attack. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS). 2015, 第 2 作者1278-1283, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380619600251.[73] Danping Shi, Lei Hu, Ling Song, Siwei Sun. Differential fault attack on Zorro block cipher. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 第 2 作者8(16): 2826-2835, https://www.webofscience.com/wos/woscc/full-record/WOS:000363086500019.[74] Liqiang Peng, Lei Hu, Lu Yao, Santanu Sarkar, Jun Xu, Zhangjie Huang. Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015. 2015, 第 2 作者 通讯作者 9462: 105-123, [75] Zheng DaBin, Zhou FengLi, Hu Lei, Zeng XiangYong. The weight distributions of a class of non-primitive cyclic codes with two nonzeros. SCIENCE CHINA-MATHEMATICS[J]. 2015, 第 3 作者58(6): 1285-1296, https://www.webofscience.com/wos/woscc/full-record/WOS:000354217200011.[76] Zha, Zhengbang, Hu, Lei, Cao, Xiwang. Constructing permutations and complete permutations over finite fields via subfield-valued polynomials. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2015, 第 2 作者31: 162-177, https://www.webofscience.com/wos/woscc/full-record/WOS:000345808200010.[77] Zheng, Dabin, Wang, Xiaoqiang, Zeng, Xiangyong, Hu, Lei. The weight distribution of a family of p-ary cyclic codes. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2015, 第 4 作者75(2): 263-275, https://www.webofscience.com/wos/woscc/full-record/WOS:000351745900008.[78] Zha, Zhengbang, Hu, Lei. Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2015, 第 2 作者61(3): 1491-1495, https://www.webofscience.com/wos/woscc/full-record/WOS:000350160400025.[79] Li, Jiao, Carlet, Claude, Zeng, Xiangyong, Li, Chunlei, Hu, Lei, Shan, Jinyong. Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2015, 第 5 作者76(2): 279-305, https://www.webofscience.com/wos/woscc/full-record/WOS:000356360000009.[80] 单进勇, 胡磊, 宋凌, 孙思维, 马小双. 19轮RECTANGLE-80的相关密钥差分分析. 密码学报[J]. 2015, 第 2 作者54-65, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849534849484855.[81] Sun Siwei, Hu Lei, Wang Meiqin, Yang Qianqian, Qiao Kexin, Ma Xiaoshuang, Song Ling, Shan Jinyong, Lopez J, Mitchell CJ. Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. INFORMATION SECURITY, ISC 2015. 2015, 第 2 作者 通讯作者 9290: 141-157, [82] Zha, Zhengbang, Hu, Lei, Sun, Siwei, Sun, Yao. New constructions of APN polynomial functions in odd characteristic. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING[J]. 2014, 第 2 作者25(4): 249-263, https://www.webofscience.com/wos/woscc/full-record/WOS:000339870700002.[83] Cao, Weiwei, Hu, Lei. Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2014, 第 2 作者73(3): 719-730, https://www.webofscience.com/wos/woscc/full-record/WOS:000340681700001.[84] Jun Xu, Lei Hu, Siwei Sun, yonghong xie. Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET COMMUNICATIONS[J]. 2014, 第 2 作者8(12): 2142-2146, http://www.corc.org.cn/handle/1471x/2157588.[85] Zheng Dabin, Yu Long, Hu Lei. Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 第 3 作者23(4): 767-772, http://lib.cqvip.com/Qikan/Article/Detail?id=663209928.[86] Tu, Ziran, Zeng, Xiangyong, Hu, Lei. Several classes of complete permutation polynomials. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2014, 第 3 作者25: 182-193, https://www.webofscience.com/wos/woscc/full-record/WOS:000328006800015.[87] Wang, Weijia, Hu, Lei. A generic homomorphic MAC construction for authentication in network coding. SECURITY AND COMMUNICATION NETWORKS[J]. 2014, 第 2 作者7(2): 429-433, http://dx.doi.org/10.1002/sec.847.[88] Li, Chaoyun, Zeng, Xiangyong, Helleseth, Tor, Li, Chunlei, Hu, Lei. The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2014, 第 5 作者60(5): 3052-3061, http://dx.doi.org/10.1109/TIT.2014.2310748.[89] Zha, Zhengbang, Hu, Lei, Sun, Siwei. Constructing new differentially 4-uniform permutations from the inverse function. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2014, 第 2 作者25: 64-78, https://www.webofscience.com/wos/woscc/full-record/WOS:000328006800007.[90] Sun Siwei, Hu Lei, Wang Peng, Qiao Kexin, Ma Xiaoshuang, Song Ling, Sarkar P, Iwata T. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I. 2014, 第 2 作者8873: 158-178, [91] Zheng, Dabin, Wang, Xiaoqiang, Hu, Lei, Zeng, Xiangyong. The weight distributions of two classes of p-ary cyclic codes. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2014, 第 3 作者29: 202-224, https://www.webofscience.com/wos/woscc/full-record/WOS:000338596400013.[92] Cao, Xiwang, Hu, Lei, Zha, Zhengbang. Constructing permutation polynomials from piecewise permutations. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2014, 第 2 作者26: 162-174, https://www.webofscience.com/wos/woscc/full-record/WOS:000330334000012.[93] Jun Xu, Lei Hu, Siwei Sun. Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET COMMUNICATIONS[J]. 2014, 第 2 作者8(14): 2433-2437, http://www.corc.org.cn/handle/1471x/2155421.[94] Shan, Jinyong, Hu, Lei, Zeng, Xiangyong. Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2014, 第 2 作者6(3): 233-254, https://www.webofscience.com/wos/woscc/full-record/WOS:000343877700003.[95] 彭力强, 胡磊, 黄章杰, 许军. 模背包向量问题的实际复杂度与基于格密码体制的实际安全性. 密码学报[J]. 2014, 第 2 作者225-234, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849524851484850.[96] Peng Liqiang, Zuo Jinyin, Hu Lei, Xu Jun. Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 第 3 作者23(1): 175-178, http://www.corc.org.cn/handle/1471x/2087156.[97] Zha, Zhengbang, Hu, Lei. CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE[J]. 2013, 第 2 作者24(8): 1209-1219, https://www.webofscience.com/wos/woscc/full-record/WOS:000335513900002.[98] Zhang XiaoLei, Hu Lei. Periods of polynomials over a Galois ring. SCIENCE CHINA-MATHEMATICS[J]. 2013, 第 2 作者 通讯作者 56(9): 1761-1772, https://www.webofscience.com/wos/woscc/full-record/WOS:000323437100003.[99] Cai, Han, Zeng, Xiangyong, Tang, Xiaohu, Hu, Lei. NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE[J]. 2013, 第 4 作者24(4): 533-545, https://www.webofscience.com/wos/woscc/full-record/WOS:000322770800008.[100] Peng, Liqiang, Hu, Lei, Xu, Jun, Xie, Yonghong, Zuo, Jinyin. Analysis of two knapsack public key cryptosystems. IET COMMUNICATIONS[J]. 2013, 第 2 作者7(15): 1638-1643, https://www.webofscience.com/wos/woscc/full-record/WOS:000325980500008.[101] Zheng, Dabin, Yu, Long, Hu, Lei. On a class of binomial bent functions over the finite fields of odd characteristic. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING[J]. 2013, 第 3 作者24(6): 461-475, https://www.webofscience.com/wos/woscc/full-record/WOS:000327220800003.[102] Jia WenJie, Zeng XiangYong, Li ChunLei, Helleseth, Tor, Hu Lei. Permutation polynomials with low differential uniformity over finite fields of odd characteristic. SCIENCE CHINA-MATHEMATICS[J]. 2013, 第 5 作者56(7): 1429-1440, https://www.webofscience.com/wos/woscc/full-record/WOS:000321587300010.[103] Lifeng Guo, Lei Hu. Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security. COMPUTERS AND MATHEMATICS WITH APPLICATIONS. 2012, 第 2 作者63(1): 151-157, http://dx.doi.org/10.1016/j.camwa.2011.11.002.[104] Xie, Yonghong, Hu, Lei. A matrix construction of Boolean functions with maximum algebraic immunity. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2012, 第 2 作者25(4): 792-801, http://lib.cqvip.com/Qikan/Article/Detail?id=43280795.[105] Zeng, Xiangyong, Shan, Jinyong, Hu, Lei. A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2012, 第 3 作者18(1): 70-92, https://www.webofscience.com/wos/woscc/full-record/WOS:000299405800007.[106] Cao XiWang, Hu Lei. A construction of hyperbent functions with polynomial trace form. SCIENCE CHINA-MATHEMATICS[J]. 2011, 第 2 作者54(10): 2229-2234, https://www.webofscience.com/wos/woscc/full-record/WOS:000295483900016.[107] CAO Weiwei HU Lei. Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure. 电子学报:英文版[J]. 2011, 20(3): 511-515, http://lib.cqvip.com/Qikan/Article/Detail?id=38822550.[108] Su, Wei, Zeng, Xiangyong, Hu, Lei. Construction of 1-resilient Boolean functions with optimum algebraic immunity. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS[J]. 2011, 第 3 作者88(2): 222-238, https://www.webofscience.com/wos/woscc/full-record/WOS:000286514900001.[109] 胡磊. 诚实发送者承诺与诚实接收者承诺电子与信息学报,. 电子与信息学报. 2011, 第 1 作者[110] Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n}. Appl. Algebra Eng. Commun. Comput.. 2010, [111] Lei Hu. An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model. 中国科学院研究生院学报. 2010, 第 1 作者[112] 黄桂芳, 胡磊, 林东岱. 从Σ-协议到公共参考串模型下可否认零知识的高效编译器. 中国科学院研究生院学报[J]. 2010, 第 2 作者27(6): 831-837, http://lib.cqvip.com/Qikan/Article/Detail?id=36104151.[113] Cao, Weiwei, Nie, Xinyun, Hu, Lei, Tang, Xiling, Ding, Jintai, Sendrier, N. Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS. 2010, 第 3 作者6061: 41-+, [114] Tang, Xiaohu, Helleseth, Tor, Hu, Lei, Jiang, Wenfeng. Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2009, 第 3 作者55(4): 1833-1840, http://www.corc.org.cn/handle/1471x/2402585.[115] Cao Weiwei, Hu Lei, Youm HY, Yung M. Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure. INFORMATION SECURITY APPLICATIONS. 2009, 第 2 作者5932: 254-267, [116] Jiang, Wenfeng, Hu, Lei, Tang, Xiaohu, Zeng, Xiangyong. New Optimal Quadriphase Sequences With Larger Linear Span. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2009, 第 2 作者55(1): 458-470, http://www.corc.org.cn/handle/1471x/2394658.[117] Lei Hu. GMW sequences over Galois rings and their linear complexities. FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA. 2009, 第 1 作者[118] Helleseth, Tor, Hu, Lei, Kholosha, Alexander, Zeng, Xiangyong, Li, Nian, Jiang, Wenfeng. Period-Different m-Sequences With at Most Four-Valued Cross Correlation. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2009, 第 2 作者55(7): 3305-3311, https://www.webofscience.com/wos/woscc/full-record/WOS:000267222000026.[119] Carlet, Claude, Zeng, Xiangyong, Li, Chunlei, Hu, Lei. Further properties of several classes of Boolean functions with optimum algebraic immunity. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2009, 第 4 作者52(3): 303-338, https://www.webofscience.com/wos/woscc/full-record/WOS:000266007400005.[120] Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. 2008, [121] 李德荣, 王绍斌, 胡磊. 一种改进的WLAN与3GPP系统互连框架. 微电子学与计算机[J]. 2008, 第 3 作者25(9): 98-101, http://lib.cqvip.com/Qikan/Article/Detail?id=28238809.[122] 李胜华, 曾祥勇, 胡磊, 刘合国. 基于两族函数的低相关二元序列集构造. 电子学报[J]. 2007, 第 3 作者35(11): 2215-2219, http://lib.cqvip.com/Qikan/Article/Detail?id=26156679.[123] 李学俊, 胡磊. 指数对的k阶自适应窗口表示算法. 电子学报[J]. 2006, 第 2 作者34(8): 1513-1516, https://d.wanfangdata.com.cn/periodical/dianzixb200608031.[124] 曾祥勇, 江文峰, 胡磊, 刘合国. 一类零相关区序列集构造方法的改进. 电子学报[J]. 2005, 第 3 作者33(8): 1476-1479, http://lib.cqvip.com/Qikan/Article/Detail?id=20030450.[125] Zeng, Xiangyong, Hu, Lei, Jiang, Wenfeng, Yue, Qin, Cao, Xiwang. Weight Distribution of A p-ary Cyclic Code. 第 2 作者http://arxiv.org/abs/0901.2391.[126] Zha, Zhengbang, Hu, Lei, Sun, Siwei, Shan, Jinyong. Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$. 第 2 作者http://arxiv.org/abs/1502.03874.