基本信息

胡磊 男 博导 中国科学院信息工程研究所
email: hulei@iie.ac.cn
address: 北京市海淀区树村路19号
postalCode: 100093
email: hulei@iie.ac.cn
address: 北京市海淀区树村路19号
postalCode: 100093
招生信息
招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码协议理论与技术
工作经历
社会兼职
2015-03-01-今,中国密码学会理事, 理事
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委,
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委,
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委
教授课程
信息安全数学基础密码学基础后量子密码学RFID安全算法与协议密码分析学代数编码
专利与奖励
奖励信息
(1) 2021年度岗位教师考核教学单项优秀, 研究所(学校), 2021(2) 2020年中国标准创新贡献奖标准项目奖, 三等奖, 部委级, 2020(3) 岗位教师考核教学单项优秀, 研究所(学校), 2020(4) 岗位教师考核科研成果单项优秀, 研究所(学校), 2019(5) 岗位教师考核讲义单项优秀, , 研究所(学校), 2018(6) 非线性密码函数和循环码, 二等奖, 省级, 2017(7) 岗位教师考核教学单项优秀, 研究所(学校), 2017(8) XXX密码算法, 一等奖, 部委级, 2009(9) ×××的密码学特性及其构造, 二等奖, 部委级, 2002
专利成果
( 1 ) 分组密码抗线性攻击安全性的评估方法, 2014, 第 1 作者, 专利号: CN104158796A( 2 ) 获取分组密码活跃S盒个数下界的方法, 2013, 第 1 作者, 专利号: CN103427986A
出版信息
发表论文
(1) Rotational Differential-Linear Cryptanalysis Revisited, Journal of Cryptology, 2023, 第 5 作者(2) Automatic Demirci-Selçuk meet-in-the-middle attack on SIMON,, The Computer Journal, 2023, 第 3 作者(3) Improved linear cryptanalysis of block cipher BORON, The Computer Journal, 2023, 第 1 作者(4) A small first-order DPA resistant AES implementation with no fresh randomness, A small first-order DPA resistant AES implementation with no fresh randomness, SCIENCE CHINA-INFORMATION SCIENCES, 2022, 第 5 作者(5) Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery, Asiacrypt 2022, Asiacrypt 2022, 2022, 第 6 作者(6) New Results of Breaking the CLS Scheme from ACM-CCS 2014,, ICICS 2022, 2022, 第 4 作者(7) Inferring Sequences Produced by the Quadratic Generator, Inscrypt 2022, Inscrypt 2022, 2022, 第 3 作者(8) Improved MITM Cryptanalysis on Streebog, IACR Transactions on Symmetric Cryptology, 2022, 第 5 作者(9) Quantum attacks on Lai-Massey structure, PQCrypto 2022, 2022, 第 4 作者(10) Quantum Attacks on PRFs Based on Public Random Permutations, Indocrypt 2022, 2022, 第 4 作者(11) Attack Beyond-Birthday-Bound MACs in Quantum Setting, PQCrypto 2021, 2021, 第 3 作者(12) Security analysis of Subterranean 2.0, DESIGNS CODES AND CRYPTOGRAPHY, 2021, 第 4 作者(13) Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials, Asiacrypt 2021, 2021, 第 1 作者(14) Camellia算法S盒的紧凑硬件实现, 密码学报, 2021, 第 1 作者(15) A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs, Asiacrypt 2021, 2021, 第 5 作者(16) Simon量子算法攻击下的可调加密方案研究, 信息安全学报, 2021, 第 1 作者(17) A small first-order DPA resistant AES implementation with no fresh randomness, 2021, 第 1 作者(18) Further results on optimal ternary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2021, 第 2 作者(19) Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials, ASIACRYPT 2021, 2021, (20) Integer LWE with Non-Subgaussian Error and Related Attacks, International Security Conference (ISC 2021), 2021, 第 4 作者(21) Unbalanced sharing:a threshold implementation of SM4, Unbalanced sharing: a threshold implementation of SM4, SCIENCE CHINA-INFORMATION SCIENCES, 2021, 第 4 作者(22) Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks, CRYPTO 2021, 2021, 第 1 作者(23) Cryptanalysis of elliptic curve hidden number problem from PKC 2017, DESIGNS CODES AND CRYPTOGRAPHY, 2020, 第 2 作者(24) Grain-v1快速相关攻击的改进, Improved Fast Correlation Attack on Grain-v1, 密码学报, 2020, 第 2 作者(25) Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories, ASIACRYPT 2020, 2020, 第 6 作者(26) Scrutinizing the Tower Field Implementation of the F(2^8) Inverter - with Applications to AES, Camellia, and SM4, International Journal of Information and Computer Security, 2020, 第 1 作者(27) Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 第 6 作者(28) Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions, ToSC 2020, IACR Transactions on Symmetric Cryptology (ToSC) (FSE 2020)), 2020, 第 1 作者(29) Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging, The 21st International Conference on Information and Communications Security (ICICS 2019), 2019, 第 4 作者(30) New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 第 3 作者(31) Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 第 5 作者(32) Boomerang Connectivity Table Revisited Application to SKINNY and AES, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 第 3 作者(33) A smaller first-order DPA resistant AES implementation with no fresh randomness, SCIENCE CHINA Information Sciences, 2019, 第 1 作者(34) Constructions of Involutions Over Finite Fields, IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 第 4 作者(35) Convolutional Neural Network Based Side-Channel Attacks with Customized Filters, ICICS 2019, 2019, 第 5 作者(36) Lightweight Iterative MDS Matrices: How Small Can We Go?, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 第 5 作者(37) RSA变型方案小解密指数攻击的改进分析, Improved Analysis of Variant of RSA Scheme with Small Decryption Exponent, 密码学报, 2019, 第 3 作者(38) Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 第 3 作者(39) On the Complexity of Impossible Differential Cryptanalysis, SECURITY AND COMMUNICATION NETWORKS, 2018, 通讯作者(40) A Deterministic Algorithm for Computing Divisors in an Interval, INFORMATION SECURITY AND PRIVACY, 2018, 第 5 作者(41) Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints, Asiacrypt 2018, 2018, 第 6 作者(42) New results on permutation polynomials of the form(x^{p^m}−x+δ)^s+ x^{p^m}+x over F_{p^{2m}}, Cryptography and Communications, 2018, 第 1 作者(43) A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties, A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties, JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 通讯作者(44) Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator, DESIGNS CODES AND CRYPTOGRAPHY, 2018, 第 3 作者(45) Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy, ISC 2018-The 21st Information Security Conference-ISC2018, 2018, 第 1 作者(46) Analysis of AES, SKINNY, and Others with Constraint Programming, IACR Transactions on Symmetric Cryptology, 2017, 第 7 作者(47) Cryptanalysis of Dual RSA, DESIGNS CODES AND CRYPTOGRAPHY, 2017, 第 2 作者(48) Further results on permutation trinomials over finite fields with even characteristic, FINITE FIELDS AND THEIR APPLICATIONS, 2017, 第 2 作者(49) Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator., Design, Codes Cryptography, 2017, 第 1 作者(50) Several Classes of Boolean Functions with Four-Valued Walsh Spectra, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 第 2 作者(51) 有限域上置换多项式的几种构造, Several Constructions of Permutation Polynomials over Finite Fields, 密码学报, 2017, 第 2 作者(52) Improved linear (hull) cryptanalysis of round-reduced versions of simon, SCIENCE CHINA-INFORMATION SCIENCES, 2017, 通讯作者(53) Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}}, Finite Fields and Their Applications, 2016, 第 1 作者(54) The weight distributions of two classes of binary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2015, 第 3 作者(55) Security of LBlock-s against Related-Key Differential Attack, 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, 第 2 作者(56) Improved MILP Modeling for Automatic Security Evaluation and Application to FOX, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, 第 2 作者(57) Differential fault attack on Zorro block cipher, SECURITY AND COMMUNICATION NETWORKS, 2015, 第 2 作者(58) Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 通讯作者(59) The weight distributions of a class of non-primitive cyclic codes with two nonzeros, SCIENCE CHINA-MATHEMATICS, 2015, 第 3 作者(60) Constructing permutations and complete permutations over finite fields via subfield-valued polynomials, FINITE FIELDS AND THEIR APPLICATIONS, 2015, 第 2 作者(61) The weight distribution of a family of p-ary cyclic codes, DESIGNS CODES AND CRYPTOGRAPHY, 2015, 第 4 作者(62) Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications, IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 第 2 作者(63) 19轮RECTANGLE-80的相关密钥差分分析, Related-Key Differential Attack on 19-Round Reduced RECTANGLE-80, 密码学报, 2015, 第 2 作者(64) Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks, DESIGNS CODES AND CRYPTOGRAPHY, 2015, 第 5 作者(65) Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH, DESIGNS CODES AND CRYPTOGRAPHY, 2014, 第 2 作者(66) New constructions of APN polynomial functions in odd characteristic, APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2014, 第 2 作者(67) Cryptanalysis of countermeasures against multiple transmission attacks on ntru, IET COMMUNICATIONS, 2014, 第 2 作者(68) Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者(69) Several classes of complete permutation polynomials, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 3 作者(70) A generic homomorphic MAC construction for authentication in network coding, SECURITY AND COMMUNICATION NETWORKS, 2014, 第 2 作者(71) The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs, IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 第 5 作者(72) Constructing new differentially 4-uniform permutations from the inverse function, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 2 作者(73) The weight distributions of two classes of p-ary cyclic codes, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 3 作者(74) Cryptanalysis of two cryptosystems based on multiple intractability assumptions, IET COMMUNICATIONS, 2014, 第 2 作者(75) Constructing permutation polynomials from piecewise permutations, FINITE FIELDS AND THEIR APPLICATIONS, 2014, 第 2 作者(76) Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher, CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 第 2 作者(77) 模背包向量问题的实际复杂度与基于格密码体制的实际安全性, 密码学报, 2014, 第 2 作者(78) Analysis of two public key cryptosystems based on randomized knapsack sequences∗, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者(79) CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 第 2 作者(80) Periods of polynomials over a Galois ring, SCIENCE CHINA-MATHEMATICS, 2013, 通讯作者(81) NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 第 4 作者(82) Analysis of two knapsack public key cryptosystems, IET COMMUNICATIONS, 2013, 第 2 作者(83) On a class of binomial bent functions over the finite fields of odd characteristic, APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 第 3 作者(84) Permutation polynomials with low differential uniformity over finite fields of odd characteristic, SCIENCE CHINA-MATHEMATICS, 2013, 第 5 作者(85) Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security, Computers and Mathematics with Applications, 2012, 第 2 作者(86) A matrix construction of Boolean functions with maximum algebraic immunity, JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2012, 第 2 作者(87) A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions, FINITE FIELDS AND THEIR APPLICATIONS, 2012, 第 3 作者(88) A construction of hyperbent functions with polynomial trace form, SCIENCE CHINA-MATHEMATICS, 2011, 第 2 作者(89) Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure, Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure, 电子学报:英文版, 2011, (90) Construction of 1-resilient Boolean functions with optimum algebraic immunity, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 第 3 作者(91) 诚实发送者承诺与诚实接收者承诺电子与信息学报,, 电子与信息学报, 2011, 第 1 作者(92) Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n}, Appl. Algebra Eng. Commun. Comput., 2010, (93) An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model, 中国科学院研究生院学报, 2010, 第 1 作者(94) 从Σ-协议到公共参考串模型下可否认零知识的高效编译器, An efficient compiler from Σ-protocol to deniable zero knowledge in CRS model, 中国科学院研究生院学报, 2010, 第 2 作者(95) Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme, POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 第 3 作者(96) Two new families of optimal binary sequences obtained from quaternary sequences, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 3 作者(97) Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure, INFORMATION SECURITY APPLICATIONS, 2009, 第 2 作者(98) New optimal quadriphase sequences with larger linear span, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 2 作者(99) GMW sequences over Galois rings and their linear complexities, FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA, 2009, 第 1 作者(100) Period-Different m-Sequences With at Most Four-Valued Cross Correlation, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 第 2 作者(101) Further properties of several classes of Boolean functions with optimum algebraic immunity, DESIGNS CODES AND CRYPTOGRAPHY, 2009, 第 4 作者(102) Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, (103) Weight Distribution of A p-ary Cyclic Code, 第 2 作者(104) Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$, 第 2 作者
发表著作
( 1 ) 信息安全中的数学方法与技术, 清华大学出版社, 2009-10,
科研活动
科研项目
( 1 ) 国家自然科学基金, 负责人, 国家任务, 2015-01--2018-12( 2 ) 有限域上代数方程算法问题研究, 负责人, 国家任务, 2013-01--2017-08( 3 ) 保密课题, 负责人, 其他任务, 2017-05--2017-12( 4 ) 保密项目, 参与, 其他任务, 2017-01--2017-12( 5 ) 量子安全的轻量级密码与安全协议, 负责人, 国家任务, 2018-01--2022-12( 6 ) 保密课题, 负责人, 其他任务, 2017-07--2019-12( 7 ) 基于自动化搜索与深度学习的密码分析与设计, 负责人, 国家任务, 2019-11--2024-10
参与会议
(1)Automatic Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials 2021-12-01(2)Integer LWE with Non-Subgaussian Error and Related Attacks 2021-11-01(3) Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks 2021-08-19(4)Attack Beyond-Birthday-Bound MACs in Quantum Setting 2021-07-20(5)Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories 2020-12-01(6)Differential Attacks on Craft Exploiting the Involutory S-boxes and Tweak Additions 2020-11-02(7)Lightweight Iterative MDS Matrices: How Small Can We Go 2020-03-16(8)Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging 2019-12-15(9)Convolutional Neural Network based Side-Channel Attacks with Customized Filters 2019-12-15(10)Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction, Indocrypt'2019Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction 2019-12-10(11)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS 2019-08-19(12)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator 2019-08-19(13)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits 2019-03-18(14)Boomerang Connectivity Table Revisited 2019-03-18(15)Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints 2018-12-04(16)A Deterministic Algorithm for Computing Divisors in an Interval 2018-07-11(17)Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy 2018-05-02(18)Improved Results on Cryptanalysis of Prime Power RSA 2016-11-30(19)An Improved Analysis on Three Variants of the RSA Cryptosystem 2016-11-04(20)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR 2016-09-28(21)Related-key Impossible Differential Analysis of Full \emph{Khudra} 2016-09-12(22)Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption 2016-09-07(23)Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication 2016-09-07(24)MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck 2016-03-20(25)Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents 2015-11-28(26)Recovering a Sum of Two Squares Decomposition Revisited 2015-11-01(27)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s 2015-09-07(28)Implicit Factorization of RSA Moduli Revisited 2015-09-07(29)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis 2015-08-27(30)Improved Differential Analysis of Block Cipher PRIDE Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan and Xiaoshuang Ma 2015-05-18(31)Partial Prime Factor Exposure Attacks on RSA and Its Takag Variant Liqiang Peng, Lei Hu, Jun Xu and Zhangjie Huang 2015-05-18(32)Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers [12] Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song 2014-12-09(33)Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization Zhangjie Huang, Lei Hu and Jun Xu 2014-10-21(34)Tighter Security Bound of MIBS Block Cipher Against Differential Attack Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan 2014-10-10(35)Error-Tolerant Algebraic Side-Channel Attacks Uing BEE Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi and Ronglin Hao 2014-08-29(36)Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers Ling Song, Lei Hu, Bingke Ma and Danping Shi 2014-07-18(37)Partial Key Exposure Attacks on Takagi Variant of RSA Zhangjie Huang and Lei Hu and Jun Xu and Liqiang Peng and Yonghong Xie 2014-06-10(38) Further Improvement of Factoring RSA Moduli with Implicit Hint Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie 2014-05-27(39)Modular Inversion Hidden Number Problem Revisited Jun Xu, Lei Hu, Zhangjie Huang and Liqiang Peng 2014-05-05(40)Automatic Security Evaluation of Block Ciphers with S-bP Structures against Differential Attack [21] Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang 2013-11-27(41)Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher Ling Song and Lei Hu 2013-05-12(42)Differential Fault Attack on the PRINCE Block Cipher Ling Song and Lei Hu 2013-05-05(43)Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem Jun Xu, Lei Hu, Siwei Sun, Ping Wang 2012-12-12(44)Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem Jun Xu, Lei Hu, Siwei Sun 2012-10-30(45)Cube Cryptanalysis of Hitag2 Stream Cipher Siwei Sun, Lei Hu, Yonghong Xie and Xiangyong Zeng 2011-12-16(46)A New Family of Quadriphase Sequences with Low Correlation Jie Li, Xiangyong Zeng, Lei Hu 2011-05-30(47)Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin 2011-05-29(48)How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols Weijia Wang, Lei Hu, Yong Li 2010-10-20(49)Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme 第三届国际后量子密码学会议 Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding 2010-05-25(50)A Class of Boolean Functions With Four-Valued Walsh Spectra Yonghong Xie, Lei Hu, Wenfeng Jiang, XiangyongZeng 2009-10-08(51)Cryptanalysis of A Multivariate Public Key Encryption Scheme With Internal Perturbation Structure Weiwei Cao, Lei Hu 2009-08-25(52)Constructing Linear Transformations of MPKCs By Generalized Central Symmetric Matrices Xin Jiang, Lei Hu, Jintai Ding 2009-08-22(53)Algebraic Attack of SMS4 and the Comparison with AES, Wen Ji, Lei Hu, Haiwen Ou 2009-08-18(54)Period-Different m-Sequences With At Most Four-Valued Cross Correlation Lei Hu, Xiangyong Zeng, Nian Li, Wenfeng Jiang 2008-11-19(55)ROAD: an RFID Offline Authentication, privacy preserving protocol with Dos resilience Fen Liu, Lei Hu 2008-10-15