Lei Hu

From MaRDI portal
Revision as of 09:06, 25 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:230396

Available identifiers

zbMath Open hu.leiMaRDI QIDQ230396

List of research outcomes





PublicationDate of PublicationType
A quantum-secure partial parallel MAC QPCBC2024-12-11Paper
Utilizing FWT in linear cryptanalysis of block ciphers with various structures2024-11-04Paper
New results on PcN and APcN polynomials over finite fields2024-09-03Paper
Improved integral cryptanalysis of block ciphers BORON and Khudra2024-07-19Paper
Revisiting modular inversion hidden number problem and its applications2024-07-18Paper
Optimizing rectangle attacks: a unified and generic framework for key recovery2023-08-25Paper
Improving bounds on elliptic curve hidden number problem for ECDH key exchange2023-08-25Paper
Inferring sequences produced by the quadratic generator2023-08-21Paper
Quantum attacks on PRFs based on public random permutations2023-08-14Paper
Quantum attacks on Lai-Massey structure2023-07-07Paper
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy2023-06-30Paper
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs2023-05-26Paper
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials2023-05-12Paper
New cryptanalysis of LowMC with algebraic techniques2023-04-28Paper
Binary Darboux transformation, solitons, periodic waves and modulation instability for a nonlocal Lakshmanan-Porsezian-Daniel equation2023-02-17Paper
Rotational differential-linear cryptanalysis revisited2023-01-05Paper
New Results of Breaking the CLS Scheme from ACM-CCS 20142022-12-09Paper
Parameter identification for portfolio optimization with a slow stochastic factor2022-11-28Paper
Several classes of PcN power functions over finite fields2022-10-13Paper
A new method to solve the Hamilton-Jacobi-Bellman equation for a stochastic portfolio optimization model with boundary memory2022-09-23Paper
On a vortex filament with the axial velocity2022-09-02Paper
Hybrid solutions for the (2+1)-dimensional variable-coefficient Caudrey-Dodd-Gibbon-Kotera-Sawada equation in fluid mechanics2022-08-29Paper
Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK2022-08-11Paper
Integer LWE with non-subgaussian error and related attacks2022-07-13Paper
New results for nonlinear fractional jerk equations with resonant boundary value conditions2022-04-27Paper
The existence of solutions and generalized Lyapunov-type inequalities to boundary value problems of differential equations of variable order2022-04-25Paper
On definition of solution of initial value problem for fractional differential equation of variable order2022-04-25Paper
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks2022-04-22Paper
Vector bright soliton interactions of the two-component AB system in a baroclinic fluid2022-04-21Paper
Revisiting orthogonal lattice attacks on approximate common divisor problems2022-03-23Paper
Attacks on beyond-birthday-bound MACs in the quantum setting2022-03-22Paper
MNN-IK: Mixing neural network and numerical IK for human posing2022-03-21Paper
https://portal.mardi4nfdi.de/entity/Q50223732022-01-18Paper
https://portal.mardi4nfdi.de/entity/Q50223842022-01-18Paper
https://portal.mardi4nfdi.de/entity/Q50224682022-01-18Paper
https://portal.mardi4nfdi.de/entity/Q33855182021-12-20Paper
https://portal.mardi4nfdi.de/entity/Q33853332021-12-18Paper
https://portal.mardi4nfdi.de/entity/Q50174652021-12-17Paper
Further results on optimal ternary cyclic codes2021-09-03Paper
Security analysis of subterranean 2.02021-08-02Paper
Some classes of power functions with low \(c\)-differential uniformity over finite fields2021-06-23Paper
Higher-order hybrid waves for the (2 + 1)-dimensional Boiti-Leon-Manna-Pempinelli equation for an irrotational incompressible fluid via the modified Pfaffian technique2021-05-19Paper
Several classes of PcN power functions over finite fields2021-04-26Paper
On the quintic time-dependent coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics2020-08-04Paper
New results on Modular Inversion Hidden Number problem and inversive congruential generator2020-05-20Paper
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction2020-05-12Paper
New classes of optimal ternary cyclic codes with minimum distance four2020-04-09Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS2020-03-09Paper
Quintic time-dependent-coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics: bilinear forms and dark/anti-dark/gray solitons2020-02-18Paper
Cryptanalysis of elliptic curve hidden number problem from PKC 20172020-01-31Paper
Constructions of Involutions Over Finite Fields2020-01-28Paper
Stochastic resonance in multi-scale bistable array2020-01-13Paper
Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber2019-11-27Paper
Permutation polynomials of the form \(x + \gamma \mathrm{Tr}_q^{q^n}(h(x))\)2019-11-22Paper
The existeness and uniqueness result of solutions to initial value problems of nonlinear diffusion equations involving with the conformable variable derivative2019-07-29Paper
The uniqueness of solution for initial value problems for fractional differential equation involving the Caputo-Fabrizio derivative2019-07-22Paper
https://portal.mardi4nfdi.de/entity/Q46309522019-04-23Paper
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints2019-01-23Paper
Partial prime factor exposure attacks on RSA and its Takagi's variant2018-12-07Paper
Improved differential analysis of block cipher PRIDE2018-12-07Paper
Existence of solutions to a coupled system of fractional differential equations with infinite-point boundary value conditions at resonance2018-12-03Paper
Existence and uniqueness of solutions for a higher-order coupled fractional differential equations at resonance2018-11-13Paper
A construction of 1-resilient Boolean functions with good cryptographic properties2018-11-08Paper
Implicit factorization of RSA moduli revisited (short paper)2018-10-24Paper
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s2018-10-24Paper
Related-key impossible differential analysis of full Khudra2018-10-24Paper
https://portal.mardi4nfdi.de/entity/Q46903452018-10-22Paper
Cryptanalysis and improved construction of a group key agreement for secure group communication2018-10-18Paper
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption2018-10-18Paper
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis2018-10-18Paper
A Deterministic Algorithm for Computing Divisors in an Interval2018-09-26Paper
Positive solutions to periodic boundary value problems of nonlinear fractional differential equations at resonance2018-08-10Paper
Three new classes of generalized almost perfect nonlinear power functions2018-08-08Paper
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator2018-07-13Paper
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck2018-05-09Paper
Existence results for \((n-1,1)\)-type nonlocal integral boundary value problems for coupled systems of fractional differential equations at resonance2018-04-13Paper
New results on permutation polynomials of the form \((x^{{p}^{m}} - x + \delta)^s + x^{p^m} + x\) over \(\mathbb F_{p^{2m}}\)2018-02-19Paper
Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber2017-11-16Paper
Several Classes of Boolean Functions with Four-Valued Walsh Spectra2017-09-08Paper
New Optimal Quadriphase Sequences With Larger Linear Span2017-08-08Paper
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences2017-08-08Paper
Period-Different $m$-Sequences With at Most Four-Valued Cross Correlation2017-08-08Paper
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks2017-07-12Paper
On the Correlation Distributions of the Optimal Quaternary Sequence Family ${\cal U}$ and the Optimal Binary Sequence Family ${\cal V}$2017-07-12Paper
Existence results for a coupled system of fractional differential equations with \(p\)-Laplacian operator and infinite-point boundary conditions2017-07-10Paper
Further results on permutation trinomials over finite fields with even characteristic2017-05-24Paper
Improved Results on Cryptanalysis of Prime Power RSA2017-05-19Paper
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs2017-05-16Paper
An Improved Analysis on Three Variants of the RSA Cryptosystem2017-05-05Paper
Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications2017-04-28Paper
Cryptanalysis of Dual RSA2017-03-23Paper
On existence results for nonlinear fractional differential equations involving the \(p\)-Laplacian at resonance2016-10-19Paper
Existence result for a nonlinear fractional differential equation with integral boundary conditions at resonance2016-10-14Paper
Recovering a Sum of Two Squares Decomposition Revisited2016-07-25Paper
Some classes of permutation polynomials of the form \((x^{p^m}-x+\delta)^s+x\) over \(\mathbb{F}_{p^{2m}}\)2016-05-19Paper
Towards Optimal Bounds for Implicit Factorization Problem2016-05-19Paper
Boolean functions with four-valued Walsh spectra2016-01-14Paper
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents2016-01-12Paper
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks2015-12-02Paper
Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization2015-11-25Paper
The weight distributions of a class of non-primitive cyclic codes with two nonzeros2015-11-09Paper
Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\)2015-10-27Paper
Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity2015-10-02Paper
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks2015-09-29Paper
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers2015-09-18Paper
https://portal.mardi4nfdi.de/entity/Q52576792015-06-29Paper
The weight distributions of two classes of binary cyclic codes2015-06-10Paper
Existence result for nonlinear fractional differential equation with \(p\)-Laplacian operator at resonance2015-06-02Paper
Families of \(p\)-ary sequences with low correlation and large linear complexity2015-04-27Paper
The weight distribution of a family of \(p\)-ary cyclic codes2015-04-16Paper
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers2015-01-16Paper
Constructing permutations and complete permutations over finite fields via subfield-valued polynomials2014-11-21Paper
Existence of solutions for two-point boundary value problem of fractional differential equations at resonance2014-11-17Paper
New constructions of APN polynomial functions in odd characteristic2014-10-02Paper
Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH2014-09-04Paper
The weight distributions of two classes of \(p\)-ary cyclic codes2014-09-02Paper
Partial Key Exposure Attacks on Takagi’s Variant of RSA2014-07-07Paper
CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS2014-07-04Paper
Further Improvement of Factoring RSA Moduli with Implicit Hint2014-06-24Paper
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher2014-06-20Paper
On a class of binomial bent functions over the finite fields of odd characteristic2014-03-24Paper
A matrix construction of Boolean functions with maximum algebraic immunity2014-03-18Paper
Permutation polynomials with low differential uniformity over finite fields of odd characteristic2014-03-05Paper
https://portal.mardi4nfdi.de/entity/Q53995582014-02-28Paper
Constructing permutation polynomials from piecewise permutations2014-02-11Paper
Constructing new differentially 4-uniform permutations from the inverse function2014-02-05Paper
Several classes of complete permutation polynomials2014-02-05Paper
Periods of polynomials over a Galois ring2013-11-22Paper
NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE2013-10-23Paper
Differential Fault Attack on the PRINCE Block Cipher2013-10-10Paper
A Class of Binomial Permutation Polynomials2013-09-28Paper
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem2013-04-08Paper
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function2013-01-07Paper
https://portal.mardi4nfdi.de/entity/Q29183222012-10-05Paper
Two classes of permutation polynomials over finite fields2012-08-01Paper
On the reducibility of some composite polynomials over finite fields2012-07-31Paper
Cube Cryptanalysis of Hitag2 Stream Cipher2012-07-20Paper
Aperiodic correlation of Kasami sequences in the small set2012-06-20Paper
Boolean functions with two distinct Walsh coefficients2012-06-20Paper
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security2012-05-28Paper
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions2012-02-11Paper
A construction of hyperbent functions with polynomial trace form2012-01-24Paper
New methods for generating permutation polynomials over finite fields2011-12-07Paper
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols2011-07-29Paper
https://portal.mardi4nfdi.de/entity/Q30174922011-07-19Paper
A New Family of Quadriphase Sequences with Low Correlation2011-06-08Paper
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme2011-05-19Paper
Construction of 1-resilient Boolean functions with optimum algebraic immunity2011-04-06Paper
A class of binary cyclic codes with five weights2011-02-25Paper
The weight distribution of a class of \(p\)-ary cyclic codes2011-02-14Paper
On the generalized large set of Kasami sequences2010-12-21Paper
Further crosscorrelation properties of sequences with the decimation factor \({d=\frac{p^n+1}{p+1}-\frac{p^n-1}{2}}\)2010-11-22Paper
The large set ofp-ary Kasami sequences2010-09-14Paper
New family of binary sequences of period \(4(2^n - 1\)) with low correlation2010-08-05Paper
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme2010-06-17Paper
Two new permutation polynomials with the form \({\left(x^{2^k}+x+\delta\right)^{s}+x}\) over \({\mathbb{F}_{2^n}}\)2010-04-20Paper
A class of rotation symmetric Boolean functions with optimum algebraic immunity2010-02-12Paper
Multi-Recipient Public Key Encryption Scheme Based on Weil Pairing2010-02-12Paper
Further properties of several classes of Boolean functions with optimum algebraic immunity2009-10-14Paper
https://portal.mardi4nfdi.de/entity/Q53205572009-07-22Paper
Some results on skew Hadamard difference sets2009-03-31Paper
Analysis of the SMS4 Block Cipher2009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110042009-03-06Paper
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting2009-02-10Paper
Kipnis-Shamir Attack on HFE Revisited2009-02-10Paper
A Class of Nonbinary Codes and Sequence Families2009-02-10Paper
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields2008-12-21Paper
Generalized Kasami Sequences: The Large Set2008-12-21Paper
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences2008-11-27Paper
Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions2008-11-27Paper
Authentication codes and bipartite graphs2008-07-11Paper
New Description of SMS4 by an Embedding overGF(28)2008-04-11Paper
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols2008-04-11Paper
A formula on linear complexity of highest coordinate sequences from maximal periodic sequences over Galois rings2008-03-18Paper
A New Family of Gold-Like Sequences2008-03-07Paper
Constructions of \(p\)-ary quadratic bent functions2008-02-27Paper
Using an efficient hash chain and delaying function to improve an e-lottery scheme2007-09-03Paper
Coding and Cryptography2007-05-02Paper
Applied Cryptography and Network Security2007-05-02Paper
Kronecker product of two-dimensional arrays2006-10-24Paper
Expansion and linear complexity of the coordinate sequences over Galois rings2006-07-12Paper
Cryptanalysis of a new signal security system for multimedia data transmission2005-10-28Paper
Maximal Periodic Two-Dimensional Arrays Over Galois Rings2005-08-25Paper
https://portal.mardi4nfdi.de/entity/Q48238432004-10-28Paper
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.2004-03-14Paper
https://portal.mardi4nfdi.de/entity/Q44840432003-10-09Paper
https://portal.mardi4nfdi.de/entity/Q31481132002-12-09Paper
https://portal.mardi4nfdi.de/entity/Q42626802002-09-05Paper
https://portal.mardi4nfdi.de/entity/Q45491452002-08-27Paper
https://portal.mardi4nfdi.de/entity/Q27781772002-03-13Paper
Chrestenson spectral characterization of correlation-immunity of multiple-valued logic functions over \(Z/(m)\)2002-02-18Paper
https://portal.mardi4nfdi.de/entity/Q27219122001-07-11Paper
https://portal.mardi4nfdi.de/entity/Q45093322001-01-14Paper
Module structure of doubly periodic arrays over finite fields2000-12-06Paper
The finite groups of order \(p^2q\) with \(p\)-blocks of defect \(0\)1999-09-08Paper
https://portal.mardi4nfdi.de/entity/Q38404591998-11-01Paper
Properties of Gröbner bases and applications to doubly periodic arrays1998-10-06Paper
Product of spaces of doubly periodic arrays1998-01-07Paper

Research outcomes over time

This page was built for person: Lei Hu