Lei Hu


Ontology type: schema:Person     


Person Info

NAME

Lei

SURNAME

Hu

Publications in SciGraph latest 50 shown

  • 2018-09 Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2018-08-15 Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy in DEVELOPMENTS IN LANGUAGE THEORY
  • 2018-08 A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties in JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY
  • 2018-06-13 A Deterministic Algorithm for Computing Divisors in an Interval in INFORMATION SECURITY AND PRIVACY
  • 2018-05 New results on permutation polynomials of the form (xpm − x + δ)s + xpm + x over 𝔽 p2m in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2018 Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2018
  • 2017-04 Cryptanalysis of Dual RSA in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2017-03 Improved linear (hull) cryptanalysis of round-reduced versions of SIMON in SCIENCE CHINA INFORMATION SCIENCES
  • 2017 An Improved Analysis on Three Variants of the RSA Cryptosystem in INFORMATION SECURITY AND CRYPTOLOGY
  • 2017 Improved Results on Cryptanalysis of Prime Power RSA in INFORMATION SECURITY AND CRYPTOLOGY – ICISC 2016
  • 2017 Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques in INFORMATION SYSTEMS SECURITY AND PRIVACY
  • 2016 MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck in FAST SOFTWARE ENCRYPTION
  • 2016 Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR in NETWORK AND SYSTEM SECURITY
  • 2016 Related-Key Impossible Differential Analysis of Full Khudra in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2016 Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication in INFORMATION SECURITY
  • 2016 Recovering a Sum of Two Squares Decomposition Revisited in INFORMATION SECURITY AND CRYPTOLOGY
  • 2016 Towards Optimal Bounds for Implicit Factorization Problem in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2016 Cryptanalysis of Multi-Prime $$\varPhi $$ -Hiding Assumption in INFORMATION SECURITY
  • 2015-11-28 Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents in CSR UND SOCIAL ENTERPRISE
  • 2015-08 Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-07 Further results on differentially 4-uniform permutations over in SCIENCE CHINA MATHEMATICS
  • 2015-06 The weight distributions of a class of non-primitive cyclic codes with two nonzeros in SCIENCE CHINA MATHEMATICS
  • 2015-06 Boolean functions with four-valued Walsh spectra in JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY
  • 2015-05 The weight distribution of a family of p-ary cyclic codes in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015 Implicit Factorization of RSA Moduli Revisited (Short Paper) in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2015 Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis in INFORMATION SECURITY
  • 2015 Improved Differential Analysis of Block Cipher PRIDE in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2015 Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s Variant in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2015 Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization in INFORMATION SECURITY AND CRYPTOLOGY
  • 2015 Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers in LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY
  • 2015 Error-Tolerant Algebraic Side-Channel Attacks Using BEE in INFORMATION AND COMMUNICATIONS SECURITY
  • 2015 Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2014-12 Families of p-ary sequences with low correlation and large linear complexity in JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY
  • 2014-12 Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2014-09 Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2014-08 New constructions of APN polynomial functions in odd characteristic in APPLICABLE ALGEBRA IN ENGINEERING, COMMUNICATION AND COMPUTING
  • 2014 Tighter Security Bound of MIBS Block Cipher against Differential Attack in NETWORK AND SYSTEM SECURITY
  • 2014 Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks in INFORMATION SECURITY AND CRYPTOLOGY
  • 2014 Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2014 Partial Key Exposure Attacks on Takagi’s Variant of RSA in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2014 Modular Inversion Hidden Number Problem Revisited in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2014 Further Improvement of Factoring RSA Moduli with Implicit Hint in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2014
  • 2013-12 On a class of binomial bent functions over the finite fields of odd characteristic in APPLICABLE ALGEBRA IN ENGINEERING, COMMUNICATION AND COMPUTING
  • 2013-09 Periods of polynomials over a Galois ring in SCIENCE CHINA MATHEMATICS
  • 2013-07 Permutation polynomials with low differential uniformity over finite fields of odd characteristic in SCIENCE CHINA MATHEMATICS
  • 2013 Differential Fault Attack on the PRINCE Block Cipher in LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY
  • 2013 Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2013 Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting in NETWORK AND SYSTEM SECURITY
  • 2012-09 On the reducibility of some composite polynomials over finite fields in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2012-08 A matrix construction of Boolean functions with maximum algebraic immunity in JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.458480.5", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "https://www.grid.ac/institutes/grid.410726.6", 
            "type": "Organization"
          }
        ], 
        "familyName": "Hu", 
        "givenName": "Lei", 
        "id": "sg:person.011566074635.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011566074635.42"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:49", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1589.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.011566074635.42'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.011566074635.42'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.011566074635.42'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.011566074635.42'


     




    Preview window. Press ESC to close (or click here)


    ...