关注
Kai Hu
Kai Hu
在 sdu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
An algebraic formulation of the division property: Revisiting degree evaluations, cube attacks, and key-independent sums
K Hu, S Sun, M Wang, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2020
652020
Automatic search for a variant of division property using three subsets
K Hu, M Wang
Cryptographers’ Track at the RSA Conference, 412-432, 2019
342019
Massive superpoly recovery with nested monomial predictions
K Hu, S Sun, Y Todo, M Wang, Q Wang
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
312021
STP models of optimal differential and linear trail for S-box based ciphers
Y Liu, H Liang, M Li, L Huang, K Hu, C Yang, M Wang
Cryptology ePrint Archive, 2019
312019
Misuse-free key-recovery and distinguishing attacks on 7-round ascon
R Rohit, K Hu, S Sarkar, S Sun
Cryptology ePrint Archive, 2021
282021
Stretching cube attacks: improved methods to recover massive superpolies
J He, K Hu, B Preneel, M Wang
International Conference on the Theory and Application of Cryptology and …, 2022
162022
Finding bit-based division property for ciphers with complex linear layers
K Hu, Q Wang, M Wang
IACR Transactions on Symmetric Cryptology, 396-424, 2020
162020
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective
K Hu, T Peyrin, QQ Tan, T Yap
International Conference on the Theory and Application of Cryptology and …, 2023
14*2023
Towards key-dependent integral and impossible differential distinguishers on 5-round AES
K Hu, T Cui, C Gao, M Wang
International Conference on Selected Areas in Cryptography, 139-162, 2018
132018
Related-tweak statistical saturation cryptanalysis and its application on QARMA
M Li, K Hu, M Wang
Cryptology ePrint Archive, 2019
122019
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes
Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
92021
Finding all impossible differentials when considering the DDT
K Hu, T Peyrin, M Wang
International Conference on Selected Areas in Cryptography, 285-305, 2022
82022
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC
J Cui, K Hu, M Wang, P Wei
International Conference on the Theory and Application of Cryptology and …, 2022
72022
Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
J Cui, K Hu, Q Wang, M Wang
Cryptographers’ Track at the RSA Conference, 223-246, 2022
62022
A secure IoT firmware update scheme against SCPA and DoS attacks
YH Fan, MQ Wang, YB Li, K Hu, MZ Li
Journal of Computer Science and Technology 36, 419-433, 2021
52021
AlgSAT---a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective
H Li, H Zhang, G Liu, K Hu, J Guo, W Qiu
Cryptology ePrint Archive, 2022
32022
Finding desirable substitution box with SASQUATCH
M Wadhwa, A Baksi, K Hu, A Chattopadhyay, T Isobe, D Saha
Cryptology ePrint Archive, 2023
22023
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
X An, K Hu, M Wang
Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020
22020
Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium
J He, K Hu, H Lei, M Wang
Annual International Conference on the Theory and Applications of …, 2024
12024
More Balanced Polynomials: Cube Attacks on 810-And 825-Round Trivium with Practical Complexities
H Lei, J He, K Hu, M Wang
International Conference on Selected Areas in Cryptography, 3-21, 2023
12023
系统目前无法执行此操作,请稍后再试。
文章 1–20