Lei Hu

From MaRDI portal
Person:230396

Available identifiers

zbMath Open hu.leiMaRDI QIDQ230396

List of research outcomes

PublicationDate of PublicationType
Optimizing rectangle attacks: a unified and generic framework for key recovery2023-08-25Paper
Improving bounds on elliptic curve hidden number problem for ECDH key exchange2023-08-25Paper
Inferring sequences produced by the quadratic generator2023-08-21Paper
Quantum attacks on PRFs based on public random permutations2023-08-14Paper
Quantum attacks on Lai-Massey structure2023-07-07Paper
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy2023-06-30Paper
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs2023-05-26Paper
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials2023-05-12Paper
New cryptanalysis of LowMC with algebraic techniques2023-04-28Paper
Binary Darboux transformation, solitons, periodic waves and modulation instability for a nonlocal Lakshmanan-Porsezian-Daniel equation2023-02-17Paper
Rotational differential-linear cryptanalysis revisited2023-01-05Paper
Parameter identification for portfolio optimization with a slow stochastic factor2022-11-28Paper
Several classes of PcN power functions over finite fields2022-10-13Paper
A new method to solve the Hamilton-Jacobi-Bellman equation for a stochastic portfolio optimization model with boundary memory2022-09-23Paper
On a vortex filament with the axial velocity2022-09-02Paper
Hybrid solutions for the (2+1)-dimensional variable-coefficient Caudrey-Dodd-Gibbon-Kotera-Sawada equation in fluid mechanics2022-08-29Paper
Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK2022-08-11Paper
Integer LWE with non-subgaussian error and related attacks2022-07-13Paper
New results for nonlinear fractional jerk equations with resonant boundary value conditions2022-04-27Paper
The existence of solutions and generalized Lyapunov-type inequalities to boundary value problems of differential equations of variable order2022-04-25Paper
On definition of solution of initial value problem for fractional differential equation of variable order2022-04-25Paper
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks2022-04-22Paper
Vector bright soliton interactions of the two-component AB system in a baroclinic fluid2022-04-21Paper
Revisiting orthogonal lattice attacks on approximate common divisor problems2022-03-23Paper
Attacks on beyond-birthday-bound MACs in the quantum setting2022-03-22Paper
MNN-IK: Mixing neural network and numerical IK for human posing2022-03-21Paper
https://portal.mardi4nfdi.de/entity/Q50223732022-01-18Paper
https://portal.mardi4nfdi.de/entity/Q50223842022-01-18Paper
https://portal.mardi4nfdi.de/entity/Q50224682022-01-18Paper
https://portal.mardi4nfdi.de/entity/Q33855182021-12-20Paper
https://portal.mardi4nfdi.de/entity/Q33853332021-12-18Paper
https://portal.mardi4nfdi.de/entity/Q50174652021-12-17Paper
Further results on optimal ternary cyclic codes2021-09-03Paper
Security analysis of subterranean 2.02021-08-02Paper
Some classes of power functions with low \(c\)-differential uniformity over finite fields2021-06-23Paper
Higher-order hybrid waves for the (2 + 1)-dimensional Boiti-Leon-Manna-Pempinelli equation for an irrotational incompressible fluid via the modified Pfaffian technique2021-05-19Paper
Several classes of PcN power functions over finite fields2021-04-26Paper
On the quintic time-dependent coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics2020-08-04Paper
New results on Modular Inversion Hidden Number problem and inversive congruential generator2020-05-20Paper
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction2020-05-12Paper
New classes of optimal ternary cyclic codes with minimum distance four2020-04-09Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS2020-03-09Paper
Quintic time-dependent-coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics: bilinear forms and dark/anti-dark/gray solitons2020-02-18Paper
Cryptanalysis of elliptic curve hidden number problem from PKC 20172020-01-31Paper
Constructions of Involutions Over Finite Fields2020-01-28Paper
Stochastic resonance in multi-scale bistable array2020-01-13Paper
Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber2019-11-27Paper
Permutation polynomials of the form \(x + \gamma \mathrm{Tr}_q^{q^n}(h(x))\)2019-11-22Paper
The existeness and uniqueness result of solutions to initial value problems of nonlinear diffusion equations involving with the conformable variable derivative2019-07-29Paper
The uniqueness of solution for initial value problems for fractional differential equation involving the Caputo-Fabrizio derivative2019-07-22Paper
https://portal.mardi4nfdi.de/entity/Q46309522019-04-23Paper
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints2019-01-23Paper
Partial prime factor exposure attacks on RSA and its Takagi's variant2018-12-07Paper
Improved differential analysis of block cipher PRIDE2018-12-07Paper
Existence of solutions to a coupled system of fractional differential equations with infinite-point boundary value conditions at resonance2018-12-03Paper
Existence and uniqueness of solutions for a higher-order coupled fractional differential equations at resonance2018-11-13Paper
A construction of 1-resilient Boolean functions with good cryptographic properties2018-11-08Paper
Implicit factorization of RSA moduli revisited (short paper)2018-10-24Paper
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s2018-10-24Paper
Related-key impossible differential analysis of full Khudra2018-10-24Paper
https://portal.mardi4nfdi.de/entity/Q46903452018-10-22Paper
Cryptanalysis and improved construction of a group key agreement for secure group communication2018-10-18Paper
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption2018-10-18Paper
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis2018-10-18Paper
A Deterministic Algorithm for Computing Divisors in an Interval2018-09-26Paper
Positive solutions to periodic boundary value problems of nonlinear fractional differential equations at resonance2018-08-10Paper
Three new classes of generalized almost perfect nonlinear power functions2018-08-08Paper
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator2018-07-13Paper
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck2018-05-09Paper
Existence results for \((n-1,1)\)-type nonlocal integral boundary value problems for coupled systems of fractional differential equations at resonance2018-04-13Paper
New results on permutation polynomials of the form \((x^{{p}^{m}} - x + \delta)^s + x^{p^m} + x\) over \(\mathbb F_{p^{2m}}\)2018-02-19Paper
Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber2017-11-16Paper
Several Classes of Boolean Functions with Four-Valued Walsh Spectra2017-09-08Paper
New Optimal Quadriphase Sequences With Larger Linear Span2017-08-08Paper
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences2017-08-08Paper
Period-Different $m$-Sequences With at Most Four-Valued Cross Correlation2017-08-08Paper
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks2017-07-12Paper
On the Correlation Distributions of the Optimal Quaternary Sequence Family ${\cal U}$ and the Optimal Binary Sequence Family ${\cal V}$2017-07-12Paper
Existence results for a coupled system of fractional differential equations with \(p\)-Laplacian operator and infinite-point boundary conditions2017-07-10Paper
Further results on permutation trinomials over finite fields with even characteristic2017-05-24Paper
Improved Results on Cryptanalysis of Prime Power RSA2017-05-19Paper
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs2017-05-16Paper
An Improved Analysis on Three Variants of the RSA Cryptosystem2017-05-05Paper
Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications2017-04-28Paper
Cryptanalysis of Dual RSA2017-03-23Paper
On existence results for nonlinear fractional differential equations involving the \(p\)-Laplacian at resonance2016-10-19Paper
Existence result for a nonlinear fractional differential equation with integral boundary conditions at resonance2016-10-14Paper
Recovering a Sum of Two Squares Decomposition Revisited2016-07-25Paper
Some classes of permutation polynomials of the form \((x^{p^m}-x+\delta)^s+x\) over \(\mathbb{F}_{p^{2m}}\)2016-05-19Paper
Towards Optimal Bounds for Implicit Factorization Problem2016-05-19Paper
Boolean functions with four-valued Walsh spectra2016-01-14Paper
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents2016-01-12Paper
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks2015-12-02Paper
Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization2015-11-25Paper
The weight distributions of a class of non-primitive cyclic codes with two nonzeros2015-11-09Paper
Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\)2015-10-27Paper
Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity2015-10-02Paper
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks2015-09-29Paper
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers2015-09-18Paper
https://portal.mardi4nfdi.de/entity/Q52576792015-06-29Paper
The weight distributions of two classes of binary cyclic codes2015-06-10Paper
Existence result for nonlinear fractional differential equation with \(p\)-Laplacian operator at resonance2015-06-02Paper
Families of \(p\)-ary sequences with low correlation and large linear complexity2015-04-27Paper
The weight distribution of a family of \(p\)-ary cyclic codes2015-04-16Paper
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers2015-01-16Paper
Constructing permutations and complete permutations over finite fields via subfield-valued polynomials2014-11-21Paper
Existence of solutions for two-point boundary value problem of fractional differential equations at resonance2014-11-17Paper
New constructions of APN polynomial functions in odd characteristic2014-10-02Paper
Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH2014-09-04Paper
The weight distributions of two classes of \(p\)-ary cyclic codes2014-09-02Paper
Partial Key Exposure Attacks on Takagi’s Variant of RSA2014-07-07Paper
CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS2014-07-04Paper
Further Improvement of Factoring RSA Moduli with Implicit Hint2014-06-24Paper
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher2014-06-20Paper
On a class of binomial bent functions over the finite fields of odd characteristic2014-03-24Paper
A matrix construction of Boolean functions with maximum algebraic immunity2014-03-18Paper
Permutation polynomials with low differential uniformity over finite fields of odd characteristic2014-03-05Paper
https://portal.mardi4nfdi.de/entity/Q53995582014-02-28Paper
Constructing permutation polynomials from piecewise permutations2014-02-11Paper
Constructing new differentially 4-uniform permutations from the inverse function2014-02-05Paper
Several classes of complete permutation polynomials2014-02-05Paper
Periods of polynomials over a Galois ring2013-11-22Paper
NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE2013-10-23Paper
Differential Fault Attack on the PRINCE Block Cipher2013-10-10Paper
A Class of Binomial Permutation Polynomials2013-09-28Paper
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem2013-04-08Paper
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function2013-01-07Paper
https://portal.mardi4nfdi.de/entity/Q29183222012-10-05Paper
Two classes of permutation polynomials over finite fields2012-08-01Paper
On the reducibility of some composite polynomials over finite fields2012-07-31Paper
Cube Cryptanalysis of Hitag2 Stream Cipher2012-07-20Paper
Aperiodic correlation of Kasami sequences in the small set2012-06-20Paper
Boolean functions with two distinct Walsh coefficients2012-06-20Paper
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security2012-05-28Paper
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions2012-02-11Paper
A construction of hyperbent functions with polynomial trace form2012-01-24Paper
New methods for generating permutation polynomials over finite fields2011-12-07Paper
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols2011-07-29Paper
https://portal.mardi4nfdi.de/entity/Q30174922011-07-19Paper
A New Family of Quadriphase Sequences with Low Correlation2011-06-08Paper
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme2011-05-19Paper
Construction of 1-resilient Boolean functions with optimum algebraic immunity2011-04-06Paper
A class of binary cyclic codes with five weights2011-02-25Paper
The weight distribution of a class of \(p\)-ary cyclic codes2011-02-14Paper
On the generalized large set of Kasami sequences2010-12-21Paper
Further crosscorrelation properties of sequences with the decimation factor \({d=\frac{p^n+1}{p+1}-\frac{p^n-1}{2}}\)2010-11-22Paper
The large set ofp-ary Kasami sequences2010-09-14Paper
New family of binary sequences of period \(4(2^n - 1\)) with low correlation2010-08-05Paper
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme2010-06-17Paper
Two new permutation polynomials with the form \({\left(x^{2^k}+x+\delta\right)^{s}+x}\) over \({\mathbb{F}_{2^n}}\)2010-04-20Paper
A class of rotation symmetric Boolean functions with optimum algebraic immunity2010-02-12Paper
Multi-Recipient Public Key Encryption Scheme Based on Weil Pairing2010-02-12Paper
Further properties of several classes of Boolean functions with optimum algebraic immunity2009-10-14Paper
https://portal.mardi4nfdi.de/entity/Q53205572009-07-22Paper
Some results on skew Hadamard difference sets2009-03-31Paper
Analysis of the SMS4 Block Cipher2009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110042009-03-06Paper
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting2009-02-10Paper
Kipnis-Shamir Attack on HFE Revisited2009-02-10Paper
A Class of Nonbinary Codes and Sequence Families2009-02-10Paper
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields2008-12-21Paper
Generalized Kasami Sequences: The Large Set2008-12-21Paper
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences2008-11-27Paper
Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions2008-11-27Paper
Authentication codes and bipartite graphs2008-07-11Paper
New Description of SMS4 by an Embedding overGF(28)2008-04-11Paper
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols2008-04-11Paper
A formula on linear complexity of highest coordinate sequences from maximal periodic sequences over Galois rings2008-03-18Paper
A New Family of Gold-Like Sequences2008-03-07Paper
Constructions of \(p\)-ary quadratic bent functions2008-02-27Paper
Using an efficient hash chain and delaying function to improve an e-lottery scheme2007-09-03Paper
Coding and Cryptography2007-05-02Paper
Applied Cryptography and Network Security2007-05-02Paper
Kronecker product of two-dimensional arrays2006-10-24Paper
Expansion and linear complexity of the coordinate sequences over Galois rings2006-07-12Paper
Cryptanalysis of a new signal security system for multimedia data transmission2005-10-28Paper
Maximal Periodic Two-Dimensional Arrays Over Galois Rings2005-08-25Paper
https://portal.mardi4nfdi.de/entity/Q48238432004-10-28Paper
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.2004-03-14Paper
https://portal.mardi4nfdi.de/entity/Q44840432003-10-09Paper
https://portal.mardi4nfdi.de/entity/Q31481132002-12-09Paper
https://portal.mardi4nfdi.de/entity/Q42626802002-09-05Paper
https://portal.mardi4nfdi.de/entity/Q45491452002-08-27Paper
https://portal.mardi4nfdi.de/entity/Q27781772002-03-13Paper
Chrestenson spectral characterization of correlation-immunity of multiple-valued logic functions over \(Z/(m)\)2002-02-18Paper
https://portal.mardi4nfdi.de/entity/Q27219122001-07-11Paper
https://portal.mardi4nfdi.de/entity/Q45093322001-01-14Paper
Module structure of doubly periodic arrays over finite fields2000-12-06Paper
The finite groups of order \(p^2q\) with \(p\)-blocks of defect \(0\)1999-09-08Paper
https://portal.mardi4nfdi.de/entity/Q38404591998-11-01Paper
Properties of Gröbner bases and applications to doubly periodic arrays1998-10-06Paper
Product of spaces of doubly periodic arrays1998-01-07Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Lei Hu