An algebraic formulation of the division property: Revisiting degree evaluations, cube attacks, and key-independent sums K Hu, S Sun, M Wang, Q Wang International Conference on the Theory and Application of Cryptology and …, 2020 | 65 | 2020 |
Automatic search for a variant of division property using three subsets K Hu, M Wang Cryptographers’ Track at the RSA Conference, 412-432, 2019 | 34 | 2019 |
Massive superpoly recovery with nested monomial predictions K Hu, S Sun, Y Todo, M Wang, Q Wang Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 31 | 2021 |
STP models of optimal differential and linear trail for S-box based ciphers Y Liu, H Liang, M Li, L Huang, K Hu, C Yang, M Wang Cryptology ePrint Archive, 2019 | 31 | 2019 |
Misuse-free key-recovery and distinguishing attacks on 7-round ascon R Rohit, K Hu, S Sarkar, S Sun Cryptology ePrint Archive, 2021 | 28 | 2021 |
Stretching cube attacks: improved methods to recover massive superpolies J He, K Hu, B Preneel, M Wang International Conference on the Theory and Application of Cryptology and …, 2022 | 16 | 2022 |
Finding bit-based division property for ciphers with complex linear layers K Hu, Q Wang, M Wang IACR Transactions on Symmetric Cryptology, 396-424, 2020 | 16 | 2020 |
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective K Hu, T Peyrin, QQ Tan, T Yap International Conference on the Theory and Application of Cryptology and …, 2023 | 14* | 2023 |
Towards key-dependent integral and impossible differential distinguishers on 5-round AES K Hu, T Cui, C Gao, M Wang International Conference on Selected Areas in Cryptography, 139-162, 2018 | 13 | 2018 |
Related-tweak statistical saturation cryptanalysis and its application on QARMA M Li, K Hu, M Wang Cryptology ePrint Archive, 2019 | 12 | 2019 |
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 9 | 2021 |
Finding all impossible differentials when considering the DDT K Hu, T Peyrin, M Wang International Conference on Selected Areas in Cryptography, 285-305, 2022 | 8 | 2022 |
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC J Cui, K Hu, M Wang, P Wei International Conference on the Theory and Application of Cryptology and …, 2022 | 7 | 2022 |
Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 J Cui, K Hu, Q Wang, M Wang Cryptographers’ Track at the RSA Conference, 223-246, 2022 | 6 | 2022 |
A secure IoT firmware update scheme against SCPA and DoS attacks YH Fan, MQ Wang, YB Li, K Hu, MZ Li Journal of Computer Science and Technology 36, 419-433, 2021 | 5 | 2021 |
AlgSAT---a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective H Li, H Zhang, G Liu, K Hu, J Guo, W Qiu Cryptology ePrint Archive, 2022 | 3 | 2022 |
Finding desirable substitution box with SASQUATCH M Wadhwa, A Baksi, K Hu, A Chattopadhyay, T Isobe, D Saha Cryptology ePrint Archive, 2023 | 2 | 2023 |
MixColumns Coefficient Property and Security of the AES with A Secret S-Box X An, K Hu, M Wang Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020 | 2 | 2020 |
Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium J He, K Hu, H Lei, M Wang Annual International Conference on the Theory and Applications of …, 2024 | 1 | 2024 |
More Balanced Polynomials: Cube Attacks on 810-And 825-Round Trivium with Practical Complexities H Lei, J He, K Hu, M Wang International Conference on Selected Areas in Cryptography, 3-21, 2023 | 1 | 2023 |