Folgen
Kai Hu
Kai Hu
Bestätigte E-Mail-Adresse bei sdu.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
An algebraic formulation of the division property: Revisiting degree evaluations, cube attacks, and key-independent sums
K Hu, S Sun, M Wang, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2020
612020
Automatic search for a variant of division property using three subsets
K Hu, M Wang
Cryptographers’ Track at the RSA Conference, 412-432, 2019
342019
STP models of optimal differential and linear trail for S-box based ciphers
Y Liu, H Liang, M Li, L Huang, K Hu, C Yang, M Wang
Cryptology ePrint Archive, 2019
312019
Massive superpoly recovery with nested monomial predictions
K Hu, S Sun, Y Todo, M Wang, Q Wang
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
302021
Misuse-free key-recovery and distinguishing attacks on 7-round ascon
R Rohit, K Hu, S Sarkar, S Sun
Cryptology ePrint Archive, 2021
252021
Finding bit-based division property for ciphers with complex linear layers
K Hu, Q Wang, M Wang
IACR Transactions on Symmetric Cryptology, 396-424, 2020
152020
Stretching cube attacks: improved methods to recover massive superpolies
J He, K Hu, B Preneel, M Wang
International Conference on the Theory and Application of Cryptology and …, 2022
142022
Related-tweak statistical saturation cryptanalysis and its application on QARMA
M Li, K Hu, M Wang
Cryptology ePrint Archive, 2019
122019
Towards key-dependent integral and impossible differential distinguishers on 5-round AES
K Hu, T Cui, C Gao, M Wang
International Conference on Selected Areas in Cryptography, 139-162, 2018
122018
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective
K Hu, T Peyrin, QQ Tan, T Yap
International Conference on the Theory and Application of Cryptology and …, 2023
11*2023
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC
J Cui, K Hu, M Wang, P Wei
International Conference on the Theory and Application of Cryptology and …, 2022
72022
Finding all impossible differentials when considering the DDT
K Hu, T Peyrin, M Wang
Cryptology ePrint Archive, 2022
72022
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes
Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
72021
Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
J Cui, K Hu, Q Wang, M Wang
Cryptographers’ Track at the RSA Conference, 223-246, 2022
62022
A secure IoT firmware update scheme against SCPA and DoS attacks
YH Fan, MQ Wang, YB Li, K Hu, MZ Li
Journal of Computer Science and Technology 36, 419-433, 2021
42021
AlgSAT---a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective
H Li, H Zhang, G Liu, K Hu, J Guo, W Qiu
Cryptology ePrint Archive, 2022
32022
Finding desirable substitution box with SASQUATCH
M Wadhwa, A Baksi, K Hu, A Chattopadhyay, T Isobe, D Saha
Cryptology ePrint Archive, 2023
22023
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
X An, K Hu, M Wang
Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020
22020
More Balanced Polynomials: Cube Attacks on 810-And 825-Round Trivium with Practical Complexities
H Lei, J He, K Hu, M Wang
International Conference on Selected Areas in Cryptography, 3-21, 2023
12023
Massive Superpoly Recovery with a Meet-in-the-middle Framework--Improved Cube Attacks on Trivium and Kreyvium
J He, K Hu, H Lei, M Wang
Cryptology ePrint Archive, 2024
2024
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20