基本信息

胡磊 男 博导 中国科学院信息工程研究所
电子邮件: hulei@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100093
电子邮件: hulei@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100093
招生信息
招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码协议理论与技术
工作经历
社会兼职
2015-03-01-今,中国密码学会理事, 理事
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委,
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委,
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委
教授课程
信息安全数学基础后量子密码学密码学基础RFID安全算法与协议密码分析学代数编码
专利与奖励
奖励信息
(1) 2022年度岗位教师考核教学单项优秀, 研究所(学校), 2022(2) 2021年度岗位教师考核教学单项优秀, 研究所(学校), 2021(3) 岗位教师考核教学单项优秀, 研究所(学校), 2020(4) 2020年中国标准创新贡献奖标准项目奖, 三等奖, 部委级, 2020(5) 岗位教师考核科研成果单项优秀, 研究所(学校), 2019(6) 岗位教师考核讲义单项优秀, , 研究所(学校), 2018(7) 岗位教师考核教学单项优秀, 研究所(学校), 2017(8) 非线性密码函数和循环码, 二等奖, 省级, 2017(9) XXX密码算法, 一等奖, 部委级, 2009(10) ×××的密码学特性及其构造, 二等奖, 部委级, 2002
专利成果
( 1 ) 分组密码抗线性攻击安全性的评估方法, 2014, 第 1 作者, 专利号: CN104158796A( 2 ) 获取分组密码活跃S盒个数下界的方法, 2013, 第 1 作者, 专利号: CN103427986A
出版信息
发表论文
(1) Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Sel¸cuk Meet-in-the-Middle Cryptanalysis of SKINNY, 欧密 2023, 2023, 第 4 作者(2) Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 第 4 作者(3) Rotational Differential-Linear Cryptanalysis Revisited, Journal of Cryptology, 2023, 第 5 作者(4) New cryptanalysis of LowMC with algebraic techniques, DESIGNS CODES AND CRYPTOGRAPHY, 2023, 第 4 作者(5) A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT, COMPUTER JOURNAL, 2023, 第 4 作者(6) Automatic Demirci-Selçuk meet-in-the-middle attack on SIMON,, The Computer Journal, 2023, 第 4 作者(7) Revisiting Modular Inversion Hidden Number Problem and Its Applications, IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 第 3 作者(8) Improved linear cryptanalysis of block cipher BORON, The Computer Journal, 2023, 第 3 作者(9) Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra, The 19th International Conference on Information Security and Cryptology (Inscrypt 2023), 2023, 第 3 作者(10) A small first-order DPA resistant AES implementation with no fresh randomness, A small first-order DPA resistant AES implementation with no fresh randomness, SCIENCE CHINA-INFORMATION SCIENCES, 2022, 第 5 作者(11) Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery, Asiacrypt 2022, 亚密 2022, 2022, 第 6 作者(12) New Results of Breaking the CLS Scheme from ACM-CCS 2014, ICICS 2022, 2022, 第 4 作者(13) Inferring Sequences Produced by the Quadratic Generator, Inscrypt 2022, 2022, 第 3 作者(14) Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange, Asiacrypt 2022, 2022, 第 4 作者(15) Improved MITM Cryptanalysis on Streebog, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 第 5 作者(16) Quantum Attacks on PRFs Based on Public Random Permutations, Indocrypt 2022, 2022, 第 4 作者(17) Quantum attacks on Lai-Massey structure, PQCrypto 2022, 2022, 第 4 作者(18) improved zero knowledge proofs for commitments from learning parity with noise, TRUSTCOMM, 2022, 第 4 作者(19) Attack Beyond-Birthday-Bound MACs in Quantum Setting, PQCrypto 2021, 2021, 第 3 作者(20) Security analysis of Subterranean 2.0, DESIGNS CODES AND CRYPTOGRAPHY, 2021, 第 4 作者(21) Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials, Asiacrypt 2021, 2021, 第 1 作者(22) Camellia算法S盒的紧凑硬件实现, 密码学报, 2021, 第 1 作者(23) A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs, Asiacrypt 2021, 2021, 第 5 作者(24) A small first-order DPA resistant AES implementation with no fresh randomness, 2021, 第 1 作者(25) Simon量子算法攻击下的可调加密方案研究, 信息安全学报, 2021, 第 1 作者(26) Further results on optimal ternary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2021, 第 2 作者(27) Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials, ASIACRYPT 2021, 2021, (28) Integer LWE with Non-Subgaussian Error and Related Attacks, International Security Conference (ISC 2021), 2021, 第 4 作者(29) Unbalanced sharing:a threshold implementation of SM4, Unbalanced sharing: a threshold implementation of SM4, SCIENCE CHINA-INFORMATION SCIENCES, 2021, 第 4 作者(30) Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks, CRYPTO 2021, 2021, 第 1 作者(31) Cryptanalysis of elliptic curve hidden number problem from PKC 2017, DESIGNS CODES AND CRYPTOGRAPHY, 2020, 第 2 作者(32) Grain-v1快速相关攻击的改进, Improved Fast Correlation Attack on Grain-v1, 密码学报, 2020, 第 2 作者(33) Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories, 亚密 2020, 2020, 第 6 作者(34) Scrutinizing the Tower Field Implementation of the F(2^8) Inverter - with Applications to AES, Camellia, and SM4, International Journal of Information and Computer Security, 2020, 第 1 作者(35) Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 第 6 作者(36) Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions, ToSC 2020, IACR Transactions on Symmetric Cryptology (ToSC) (FSE 2020)), 2020, 第 1 作者(37) Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging, The 21st International Conference on Information and Communications Security (ICICS 2019), 2019, 第 4 作者(38) New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 第 3 作者(39) Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS, 美密 2019, 2019, 第 5 作者(40) Boomerang Connectivity Table Revisited Application to SKINNY and AES, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 第 3 作者(41) A smaller first-order DPA resistant AES implementation with no fresh randomness, SCIENCE CHINA Information Sciences, 2019, 第 1 作者(42) Constructions of Involutions Over Finite Fields, IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 第 4 作者(43) Convolutional Neural Network Based Side-Channel Attacks with Customized Filters, ICICS 2019, 2019, 第 5 作者(44) Lightweight Iterative MDS Matrices: How Small Can We Go?, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 第 5 作者(45) RSA变型方案小解密指数攻击的改进分析, Improved Analysis of Variant of RSA Scheme with Small Decryption Exponent, 密码学报, 2019, 第 3 作者(46) Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 第 3 作者(47) On the Complexity of Impossible Differential Cryptanalysis, SECURITY AND COMMUNICATION NETWORKS, 2018, 通讯作者(48) A Deterministic Algorithm for Computing Divisors in an Interval, INFORMATION SECURITY AND PRIVACY, 2018, 第 5 作者(49) New results on permutation polynomials of the form(x^{p^m}−x+δ)^s+ x^{p^m}+x over F_{p^{2m}}, Cryptography and Communications, 2018, 第 1 作者(50) Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints, 亚密 2018, 2018, 第 6 作者(51) A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties, A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties, JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 通讯作者(52) Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy, ISC 2018-The 21st Information Security Conference-ISC2018, 2018, 第 1 作者(53) Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator, DESIGNS CODES AND CRYPTOGRAPHY, 2018, 第 3 作者(54) Analysis of AES, SKINNY, and Others with Constraint Programming, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017, 第 7 作者(55) Cryptanalysis of Dual RSA, DESIGNS CODES AND CRYPTOGRAPHY, 2017, 第 2 作者(56) Further results on permutation trinomials over finite fields with even characteristic, FINITE FIELDS AND THEIR APPLICATIONS, 2017, 第 2 作者(57) Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator., Design, Codes Cryptography, 2017, 第 1 作者(58) Several Classes of Boolean Functions with Four-Valued Walsh Spectra, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 第 2 作者(59) 有限域上置换多项式的几种构造, Several Constructions of Permutation Polynomials over Finite Fields, 密码学报, 2017, 第 2 作者(60) Improved linear (hull) cryptanalysis of round-reduced versions of simon, SCIENCE CHINA-INFORMATION SCIENCES, 2017, 通讯作者(61) Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}}, Finite Fields and Their Applications, 2016, 第 1 作者(62) MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck, FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 第 5 作者(63) The weight distributions of two classes of binary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2015, 第 3 作者(64) Security of LBlock-s against Related-Key Differential Attack, 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, 第 2 作者(65) Improved MILP Modeling for Automatic Security Evaluation and Application to FOX, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, 第 2 作者(66) Differential fault attack on Zorro block cipher, SECURITY AND COMMUNICATION NETWORKS, 2015, 第 2 作者(67) Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 通讯作者(68) The weight distributions of a class of non-primitive cyclic codes with two nonzeros, SCIENCE CHINA-MATHEMATICS, 2015, 第 3 作者(69) Constructing permutations and complete permutations over finite fields via subfield-valued polynomials, FINITE FIELDS AND THEIR APPLICATIONS, 2015, 第 2 作者(70) The weight distribution of a family of p-ary cyclic codes, DESIGNS CODES AND CRYPTOGRAPHY, 2015, 第 4 作者(71) Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis, INFORMATION SECURITY, ISC 2015, 2015, 通讯作者(72) Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications, IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 第 2 作者(73) Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks, DESIGNS CODES AND CRYPTOGRAPHY, 2015, 第 5 作者(74) 19轮RECTANGLE-80的相关密钥差分分析, Related-Key Differential Attack on 19-Round Reduced RECTANGLE-80, 密码学报, 2015, 第 2 作者(75) Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH, DESIGNS CODES AND CRYPTOGRAPHY, 2014, 第 2 作者(76) New constructions of APN polynomial functions in odd characteristic, APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2014, 第 2 作者(77) Cryptanalysis of countermeasures against multiple transmission attacks on ntru, IET COMMUNICATIONS, 2014, 第 2 作者(78) Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者(79) Several classes of complete permutation polynomials, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 3 作者(80) A generic homomorphic MAC construction for authentication in network coding, SECURITY AND COMMUNICATION NETWORKS, 2014, 第 2 作者(81) The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs, IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 第 5 作者(82) Constructing new differentially 4-uniform permutations from the inverse function, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 2 作者(83) Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 第 2 作者(84) The weight distributions of two classes of p-ary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 3 作者(85) Constructing permutation polynomials from piecewise permutations, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 2 作者(86) Cryptanalysis of two cryptosystems based on multiple intractability assumptions, IET COMMUNICATIONS, 2014, 第 2 作者(87) Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher, CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 第 2 作者(88) 模背包向量问题的实际复杂度与基于格密码体制的实际安全性, 密码学报, 2014, 第 2 作者(89) Analysis of two public key cryptosystems based on randomized knapsack sequences∗, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者(90) CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 第 2 作者(91) Periods of polynomials over a Galois ring, SCIENCE CHINA-MATHEMATICS, 2013, 通讯作者(92) NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 第 4 作者(93) Analysis of two knapsack public key cryptosystems, IET COMMUNICATIONS, 2013, 第 2 作者(94) On a class of binomial bent functions over the finite fields of odd characteristic, APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 第 3 作者(95) Permutation polynomials with low differential uniformity over finite fields of odd characteristic, SCIENCE CHINA-MATHEMATICS, 2013, 第 5 作者(96) Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security, COMPUTERS AND MATHEMATICS WITH APPLICATIONS, 2012, 第 2 作者(97) A matrix construction of Boolean functions with maximum algebraic immunity, JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2012, 第 2 作者(98) A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions, FINITE FIELDS AND THEIR APPLICATIONS, 2012, 第 3 作者(99) A construction of hyperbent functions with polynomial trace form, SCIENCE CHINA-MATHEMATICS, 2011, 第 2 作者(100) Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure, Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure, 电子学报:英文版, 2011, (101) Construction of 1-resilient Boolean functions with optimum algebraic immunity, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 第 3 作者(102) 诚实发送者承诺与诚实接收者承诺电子与信息学报,, 电子与信息学报, 2011, 第 1 作者(103) Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n}, Appl. Algebra Eng. Commun. Comput., 2010, (104) An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model, 中国科学院研究生院学报, 2010, 第 1 作者(105) 从Σ-协议到公共参考串模型下可否认零知识的高效编译器, An efficient compiler from Σ-protocol to deniable zero knowledge in CRS model, 中国科学院研究生院学报, 2010, 第 2 作者(106) Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme, POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 第 3 作者(107) Two new families of optimal binary sequences obtained from quaternary sequences, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 3 作者(108) Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure, INFORMATION SECURITY APPLICATIONS, 2009, 第 2 作者(109) New optimal quadriphase sequences with larger linear span, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 2 作者(110) GMW sequences over Galois rings and their linear complexities, FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA, 2009, 第 1 作者(111) Period-Different m-Sequences With at Most Four-Valued Cross Correlation, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 2 作者(112) Further properties of several classes of Boolean functions with optimum algebraic immunity, DESIGNS CODES AND CRYPTOGRAPHY, 2009, 第 4 作者(113) Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, (114) 一种改进的WLAN与3GPP系统互连框架, An Improved WLAN and 3GPP System Interworking Network Architecture, 微电子学与计算机, 2008, 第 3 作者(115) 基于两族函数的低相关二元序列集构造, Construction for Families of Binary Sequences with Low Correlation Based on Two Families of Functions, 电子学报, 2007, 第 3 作者(116) 指数对的k阶自适应窗口表示算法, Adaptive k-Ary Window Expansion Algorithm for Pairs of Exponentiations, 电子学报, 2006, 第 2 作者(117) 一类零相关区序列集构造方法的改进, An Improved Method for Constructing ZCZ Sequence Sets, 电子学报, 2005, 第 3 作者(118) Weight Distribution of A p-ary Cyclic Code, 第 2 作者(119) Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$, 第 2 作者
发表著作
( 1 ) 信息安全中的数学方法与技术, 清华大学出版社, 2009-10,
科研活动
科研项目
( 1 ) 国家自然科学基金, 负责人, 国家任务, 2015-01--2018-12( 2 ) 有限域上代数方程算法问题研究, 负责人, 国家任务, 2013-01--2017-08( 3 ) 保密课题, 负责人, 其他国际合作项目, 2017-05--2017-12( 4 ) 保密项目, 参与, 其他国际合作项目, 2017-01--2017-12( 5 ) 量子安全的轻量级密码与安全协议, 负责人, 国家任务, 2018-01--2022-12( 6 ) 保密课题, 负责人, 其他国际合作项目, 2017-07--2019-12( 7 ) 基于自动化搜索与深度学习的密码分析与设计, 负责人, 国家任务, 2019-11--2024-10
参与会议
(1)Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY 2023-04-22(2)New Properties of Double Boomerang Connectivity Table 2023-03-20(3)Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange 2022-12-05(4)Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery 2022-12-05(5)Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials 2021-12-01(6)Integer LWE with Non-Subgaussian Error and Related Attacks 2021-11-01(7) Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks 2021-08-19(8)Attack Beyond-Birthday-Bound MACs in Quantum Setting 2021-07-20(9)Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories 2020-12-01(10)Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions 2020-11-02(11)Lightweight Iterative MDS Matrices: How Small Can We Go 2020-03-16(12)Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging 2019-12-15(13)Convolutional Neural Network based Side-Channel Attacks with Customized Filters 2019-12-15(14)Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction, Indocrypt'2019Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction 2019-12-10(15)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS 2019-08-19(16)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator 2019-08-19(17)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits 2019-03-18(18)Boomerang Connectivity Table Revisited 2019-03-18(19)Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints 2018-12-04(20)A Deterministic Algorithm for Computing Divisors in an Interval 2018-07-11(21)Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy 2018-05-02(22)Improved Results on Cryptanalysis of Prime Power RSA 2016-11-30(23)An Improved Analysis on Three Variants of the RSA Cryptosystem 2016-11-04(24)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR 2016-09-28(25)Related-key Impossible Differential Analysis of Full \emph{Khudra} 2016-09-12(26)Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption 2016-09-07(27)Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication 2016-09-07(28)MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck 2016-03-20(29)Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents 2015-11-28(30)Recovering a Sum of Two Squares Decomposition Revisited 2015-11-01(31)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s 2015-09-07(32)Implicit Factorization of RSA Moduli Revisited 2015-09-07(33)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis 2015-08-27(34)Improved Differential Analysis of Block Cipher PRIDE Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan and Xiaoshuang Ma 2015-05-18(35)Partial Prime Factor Exposure Attacks on RSA and Its Takag Variant Liqiang Peng, Lei Hu, Jun Xu and Zhangjie Huang 2015-05-18(36)Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers [12] Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song 2014-12-09(37)Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization Zhangjie Huang, Lei Hu and Jun Xu 2014-10-21(38)Tighter Security Bound of MIBS Block Cipher Against Differential Attack Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan 2014-10-10(39)Error-Tolerant Algebraic Side-Channel Attacks Uing BEE Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi and Ronglin Hao 2014-08-29(40)Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers Ling Song, Lei Hu, Bingke Ma and Danping Shi 2014-07-18(41)Partial Key Exposure Attacks on Takagi Variant of RSA Zhangjie Huang and Lei Hu and Jun Xu and Liqiang Peng and Yonghong Xie 2014-06-10(42) Further Improvement of Factoring RSA Moduli with Implicit Hint Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie 2014-05-27(43)Modular Inversion Hidden Number Problem Revisited Jun Xu, Lei Hu, Zhangjie Huang and Liqiang Peng 2014-05-05(44)Automatic Security Evaluation of Block Ciphers with S-bP Structures against Differential Attack [21] Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang 2013-11-27(45)Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher Ling Song and Lei Hu 2013-05-12(46)Differential Fault Attack on the PRINCE Block Cipher Ling Song and Lei Hu 2013-05-05(47)Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem Jun Xu, Lei Hu, Siwei Sun, Ping Wang 2012-12-12(48)Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem Jun Xu, Lei Hu, Siwei Sun 2012-10-30(49)Cube Cryptanalysis of Hitag2 Stream Cipher Siwei Sun, Lei Hu, Yonghong Xie and Xiangyong Zeng 2011-12-16(50)A New Family of Quadriphase Sequences with Low Correlation Jie Li, Xiangyong Zeng, Lei Hu 2011-05-30(51)Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin 2011-05-29(52)How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols Weijia Wang, Lei Hu, Yong Li 2010-10-20(53)Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme 第三届国际后量子密码学会议 Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding 2010-05-25(54)A Class of Boolean Functions With Four-Valued Walsh Spectra Yonghong Xie, Lei Hu, Wenfeng Jiang, XiangyongZeng 2009-10-08(55)Cryptanalysis of A Multivariate Public Key Encryption Scheme With Internal Perturbation Structure Weiwei Cao, Lei Hu 2009-08-25(56)Constructing Linear Transformations of MPKCs By Generalized Central Symmetric Matrices Xin Jiang, Lei Hu, Jintai Ding 2009-08-22(57)Algebraic Attack of SMS4 and the Comparison with AES, Wen Ji, Lei Hu, Haiwen Ou 2009-08-18(58)Period-Different m-Sequences With At Most Four-Valued Cross Correlation Lei Hu, Xiangyong Zeng, Nian Li, Wenfeng Jiang 2008-11-19(59)ROAD: an RFID Offline Authentication, privacy preserving protocol with Dos resilience Fen Liu, Lei Hu 2008-10-15