Lei Hu

From MaRDI portal
(Redirected from Person:230396)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A quantum-secure partial parallel MAC QPCBC
Designs, Codes and Cryptography
2024-12-11Paper
Utilizing FWT in linear cryptanalysis of block ciphers with various structures
Designs, Codes and Cryptography
2024-11-04Paper
New results on PcN and APcN polynomials over finite fields
Finite Fields and their Applications
2024-09-03Paper
Improved integral cryptanalysis of block ciphers BORON and Khudra
 
2024-07-19Paper
Revisiting modular inversion hidden number problem and its applications
IEEE Transactions on Information Theory
2024-07-18Paper
Optimizing rectangle attacks: a unified and generic framework for key recovery
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Improving bounds on elliptic curve hidden number problem for ECDH key exchange
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Inferring sequences produced by the quadratic generator
Information Security and Cryptology
2023-08-21Paper
Quantum attacks on PRFs based on public random permutations
Lecture Notes in Computer Science
2023-08-14Paper
Quantum attacks on Lai-Massey structure
Post-Quantum Cryptography
2023-07-07Paper
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
Developments in Language Theory
2023-06-30Paper
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Lecture Notes in Computer Science
2023-05-26Paper
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
Lecture Notes in Computer Science
2023-05-12Paper
New cryptanalysis of LowMC with algebraic techniques
Designs, Codes and Cryptography
2023-04-28Paper
Binary Darboux transformation, solitons, periodic waves and modulation instability for a nonlocal Lakshmanan-Porsezian-Daniel equation
Wave Motion
2023-02-17Paper
Rotational differential-linear cryptanalysis revisited
Journal of Cryptology
2023-01-05Paper
New Results of Breaking the CLS Scheme from ACM-CCS 2014
 
2022-12-09Paper
Parameter identification for portfolio optimization with a slow stochastic factor
Journal of Inverse and Ill-posed Problems
2022-11-28Paper
Several classes of PcN power functions over finite fields
Discrete Applied Mathematics
2022-10-13Paper
A new method to solve the Hamilton-Jacobi-Bellman equation for a stochastic portfolio optimization model with boundary memory
Journal of Industrial and Management Optimization
2022-09-23Paper
On a vortex filament with the axial velocity
Chaos, Solitons and Fractals
2022-09-02Paper
Hybrid solutions for the (2+1)-dimensional variable-coefficient Caudrey-Dodd-Gibbon-Kotera-Sawada equation in fluid mechanics
Chaos, Solitons and Fractals
2022-08-29Paper
Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK
Information Security Practice and Experience
2022-08-11Paper
Integer LWE with non-subgaussian error and related attacks
 
2022-07-13Paper
New results for nonlinear fractional jerk equations with resonant boundary value conditions
AIMS Mathematics
2022-04-27Paper
The existence of solutions and generalized Lyapunov-type inequalities to boundary value problems of differential equations of variable order
AIMS Mathematics
2022-04-25Paper
On definition of solution of initial value problem for fractional differential equation of variable order
AIMS Mathematics
2022-04-25Paper
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
 
2022-04-22Paper
Vector bright soliton interactions of the two-component AB system in a baroclinic fluid
Chaos, Solitons and Fractals
2022-04-21Paper
Revisiting orthogonal lattice attacks on approximate common divisor problems
Theoretical Computer Science
2022-03-23Paper
Attacks on beyond-birthday-bound MACs in the quantum setting
 
2022-03-22Paper
MNN-IK: mixing neural network and numerical IK for human posing
SCIENTIA SINICA Mathematica
2022-03-21Paper
scientific article; zbMATH DE number 7459021 (Why is no real title available?)
 
2022-01-18Paper
scientific article; zbMATH DE number 7458940 (Why is no real title available?)
 
2022-01-18Paper
Positive solutions of higher order nonlinear fractional differential equations with nonlocal initial conditions at resonance
 
2022-01-18Paper
scientific article; zbMATH DE number 7449789 (Why is no real title available?)
 
2021-12-20Paper
Existence of positive solutions to a periodic boundary value problems for nonlinear fractional differential equations at resonance
 
2021-12-18Paper
Study of construction and empirical of the credit risk contagion models among the Internet financial platforms
 
2021-12-17Paper
Further results on optimal ternary cyclic codes
Finite Fields and their Applications
2021-09-03Paper
Security analysis of subterranean 2.0
Designs, Codes and Cryptography
2021-08-02Paper
Some classes of power functions with low \(c\)-differential uniformity over finite fields
Designs, Codes and Cryptography
2021-06-23Paper
Higher-order hybrid waves for the (2 + 1)-dimensional Boiti-Leon-Manna-Pempinelli equation for an irrotational incompressible fluid via the modified Pfaffian technique
ZAMP. Zeitschrift für angewandte Mathematik und Physik
2021-05-19Paper
Several classes of PcN power functions over finite fields
 
2021-04-26Paper
On the quintic time-dependent coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics
Nonlinear Dynamics
2020-08-04Paper
New results on Modular Inversion Hidden Number problem and inversive congruential generator
 
2020-05-20Paper
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction
 
2020-05-12Paper
New classes of optimal ternary cyclic codes with minimum distance four
Finite Fields and their Applications
2020-04-09Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS
 
2020-03-09Paper
Quintic time-dependent-coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics: bilinear forms and dark/anti-dark/gray solitons
Nonlinear Dynamics
2020-02-18Paper
Cryptanalysis of elliptic curve hidden number problem from PKC 2017
Designs, Codes and Cryptography
2020-01-31Paper
Constructions of Involutions Over Finite Fields
IEEE Transactions on Information Theory
2020-01-28Paper
Stochastic resonance in multi-scale bistable array
Physics Letters. A
2020-01-13Paper
Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber
Applied Mathematics and Computation
2019-11-27Paper
Permutation polynomials of the form \(x + \gamma \mathrm{Tr}_q^{q^n}(h(x))\)
Finite Fields and their Applications
2019-11-22Paper
The existeness and uniqueness result of solutions to initial value problems of nonlinear diffusion equations involving with the conformable variable derivative
Revista de la Real Academia de Ciencias Exactas, Físicas y Naturales. Serie A: Matemáticas. RACSAM
2019-07-29Paper
The uniqueness of solution for initial value problems for fractional differential equation involving the Caputo-Fabrizio derivative
The Journal of Nonlinear Sciences and Applications
2019-07-22Paper
The existence of solutions to boundary value problems for differential equations of variable order
 
2019-04-23Paper
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
 
2019-01-23Paper
Partial prime factor exposure attacks on RSA and its Takagi's variant
 
2018-12-07Paper
Improved differential analysis of block cipher PRIDE
 
2018-12-07Paper
Existence of solutions to a coupled system of fractional differential equations with infinite-point boundary value conditions at resonance
Advances in Difference Equations
2018-12-03Paper
Existence and uniqueness of solutions for a higher-order coupled fractional differential equations at resonance
Advances in Difference Equations
2018-11-13Paper
A construction of 1-resilient Boolean functions with good cryptographic properties
Journal of Systems Science and Complexity
2018-11-08Paper
Implicit factorization of RSA moduli revisited (short paper)
 
2018-10-24Paper
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s
 
2018-10-24Paper
Related-key impossible differential analysis of full Khudra
 
2018-10-24Paper
Initial value problem for nonlinear fractional differential equations with variable-order derivative and a parameter
 
2018-10-22Paper
Cryptanalysis and improved construction of a group key agreement for secure group communication
 
2018-10-18Paper
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption
 
2018-10-18Paper
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
 
2018-10-18Paper
A deterministic algorithm for computing divisors in an interval
Information Security and Privacy
2018-09-26Paper
Positive solutions to periodic boundary value problems of nonlinear fractional differential equations at resonance
International Journal of Differential Equations
2018-08-10Paper
Three new classes of generalized almost perfect nonlinear power functions
Finite Fields and their Applications
2018-08-08Paper
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator
Designs, Codes and Cryptography
2018-07-13Paper
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
Fast Software Encryption
2018-05-09Paper
Existence results for \((n-1,1)\)-type nonlocal integral boundary value problems for coupled systems of fractional differential equations at resonance
Journal of Applied Mathematics and Computing
2018-04-13Paper
New results on permutation polynomials of the form \((x^{{p}^{m}} - x + \delta)^s + x^{p^m} + x\) over \(\mathbb F_{p^{2m}}\)
Cryptography and Communications
2018-02-19Paper
Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber
Applied Mathematics Letters
2017-11-16Paper
Several Classes of Boolean Functions with Four-Valued Walsh Spectra
International Journal of Foundations of Computer Science
2017-09-08Paper
Period-Different $m$-Sequences With at Most Four-Valued Cross Correlation
IEEE Transactions on Information Theory
2017-08-08Paper
New Optimal Quadriphase Sequences With Larger Linear Span
IEEE Transactions on Information Theory
2017-08-08Paper
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences
IEEE Transactions on Information Theory
2017-08-08Paper
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks
IEEE Transactions on Information Theory
2017-07-12Paper
On the Correlation Distributions of the Optimal Quaternary Sequence Family ${\cal U}$ and the Optimal Binary Sequence Family ${\cal V}$
IEEE Transactions on Information Theory
2017-07-12Paper
Existence results for a coupled system of fractional differential equations with \(p\)-Laplacian operator and infinite-point boundary conditions
Boundary Value Problems
2017-07-10Paper
Further results on permutation trinomials over finite fields with even characteristic
Finite Fields and their Applications
2017-05-24Paper
Improved results on cryptanalysis of prime power RSA
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs
IEEE Transactions on Information Theory
2017-05-16Paper
An improved analysis on three variants of the RSA cryptosystem
Information Security and Cryptology
2017-05-05Paper
Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications
IEEE Transactions on Information Theory
2017-04-28Paper
Cryptanalysis of Dual RSA
Designs, Codes and Cryptography
2017-03-23Paper
Recovering a sum of two squares decomposition revisited
Information Security and Cryptology
2016-07-25Paper
Some classes of permutation polynomials of the form \((x^{p^m}-x+\delta)^s+x\) over \(\mathbb{F}_{p^{2m}}\)
Finite Fields and their Applications
2016-05-19Paper
Towards optimal bounds for implicit factorization problem
Lecture Notes in Computer Science
2016-05-19Paper
Boolean functions with four-valued Walsh spectra
Journal of Systems Science and Complexity
2016-01-14Paper
Cryptanalysis of variants of RSA with multiple small secret exponents
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks
Information Security and Cryptology
2015-12-02Paper
Attacking RSA with a composed decryption exponent using unravelled linearization
Information Security and Cryptology
2015-11-25Paper
The weight distributions of a class of non-primitive cyclic codes with two nonzeros
Science China. Mathematics
2015-11-09Paper
Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\)
Science China. Mathematics
2015-10-27Paper
Two Boolean functions with five-valued Walsh spectra and high nonlinearity
International Journal of Foundations of Computer Science
2015-10-02Paper
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
Designs, Codes and Cryptography
2015-09-29Paper
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
Lecture Notes in Computer Science
2015-09-18Paper
scientific article; zbMATH DE number 6453086 (Why is no real title available?)
 
2015-06-29Paper
The weight distributions of two classes of binary cyclic codes
Finite Fields and their Applications
2015-06-10Paper
Existence result for nonlinear fractional differential equation with \(p\)-Laplacian operator at resonance
Journal of Applied Mathematics and Computing
2015-06-02Paper
Families of \(p\)-ary sequences with low correlation and large linear complexity
Journal of Systems Science and Complexity
2015-04-27Paper
The weight distribution of a family of \(p\)-ary cyclic codes
Designs, Codes and Cryptography
2015-04-16Paper
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
Lecture Notes in Computer Science
2015-01-16Paper
Constructing permutations and complete permutations over finite fields via subfield-valued polynomials
Finite Fields and their Applications
2014-11-21Paper
Existence of solutions for two-point boundary value problem of fractional differential equations at resonance
International Journal of Differential Equations
2014-11-17Paper
New constructions of APN polynomial functions in odd characteristic
Applicable Algebra in Engineering, Communication and Computing
2014-10-02Paper
Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH
Designs, Codes and Cryptography
2014-09-04Paper
The weight distributions of two classes of \(p\)-ary cyclic codes
Finite Fields and their Applications
2014-09-02Paper
Partial key exposure attacks on Takagi's variant of RSA
Applied Cryptography and Network Security
2014-07-07Paper
Constructing new APN functions from known PN functions
International Journal of Foundations of Computer Science
2014-07-04Paper
Further improvement of factoring RSA moduli with implicit hint
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher
Cryptography and Communications
2014-06-20Paper
On a class of binomial bent functions over the finite fields of odd characteristic
Applicable Algebra in Engineering, Communication and Computing
2014-03-24Paper
A matrix construction of Boolean functions with maximum algebraic immunity
Journal of Systems Science and Complexity
2014-03-18Paper
Permutation polynomials with low differential uniformity over finite fields of odd characteristic
Science China. Mathematics
2014-03-05Paper
The shift equivalence of maximal period sequences over a Galois ring
 
2014-02-28Paper
Constructing permutation polynomials from piecewise permutations
Finite Fields and their Applications
2014-02-11Paper
Constructing new differentially 4-uniform permutations from the inverse function
Finite Fields and their Applications
2014-02-05Paper
Several classes of complete permutation polynomials
Finite Fields and their Applications
2014-02-05Paper
Periods of polynomials over a Galois ring
Science China. Mathematics
2013-11-22Paper
New optimal frequency hopping sequence sets from balanced nested difference packings of partition-type
International Journal of Foundations of Computer Science
2013-10-23Paper
A Class of Binomial Permutation Polynomials
 
2013-09-28Paper
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem
Information and Communications Security
2013-04-08Paper
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function
Information Security and Cryptology
2013-01-07Paper
Two classes of permutation polynomials over finite fields
Finite Fields and their Applications
2012-08-01Paper
On the reducibility of some composite polynomials over finite fields
Designs, Codes and Cryptography
2012-07-31Paper
Linear complexity of binary sequences derived from Euler quotients with prime-power modulus
Information Processing Letters
2012-07-25Paper
Cube cryptanalysis of Hitag2 stream cipher
Cryptology and Network Security
2012-07-20Paper
Aperiodic correlation of Kasami sequences in the small set
Applicable Algebra in Engineering, Communication and Computing
2012-06-20Paper
Boolean functions with two distinct Walsh coefficients
Applicable Algebra in Engineering, Communication and Computing
2012-06-20Paper
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
Computers & Mathematics with Applications
2012-05-28Paper
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions
Finite Fields and their Applications
2012-02-11Paper
A construction of hyperbent functions with polynomial trace form
Science China. Mathematics
2012-01-24Paper
New methods for generating permutation polynomials over finite fields
Finite Fields and their Applications
2011-12-07Paper
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
Information Security and Cryptology
2011-07-29Paper
scientific article; zbMATH DE number 5927451 (Why is no real title available?)
 
2011-07-19Paper
A new family of quadriphase sequences with low correlation
Lecture Notes in Computer Science
2011-06-08Paper
Kipnis-Shamir attack on unbalanced oil-vinegar scheme
Information Security Practice and Experience
2011-05-19Paper
Construction of 1-resilient Boolean functions with optimum algebraic immunity
International Journal of Computer Mathematics
2011-04-06Paper
A class of binary cyclic codes with five weights
Science China. Mathematics
2011-02-25Paper
The weight distribution of a class of \(p\)-ary cyclic codes
Finite Fields and their Applications
2011-02-14Paper
On the generalized large set of Kasami sequences
Applicable Algebra in Engineering, Communication and Computing
2010-12-21Paper
Further crosscorrelation properties of sequences with the decimation factor \({d=\frac{p^n+1}{p+1}-\frac{p^n-1}{2}}\)
Applicable Algebra in Engineering, Communication and Computing
2010-11-22Paper
The large set of \(p\)-ary Kasami sequences
International Journal of Computer Mathematics
2010-09-14Paper
New family of binary sequences of period \(4(2^n - 1\)) with low correlation
Applicable Algebra in Engineering, Communication and Computing
2010-08-05Paper
Cryptanalysis of two quartic encryption schemes and one improved MFE scheme
Post-Quantum Cryptography
2010-06-17Paper
Two new permutation polynomials with the form \({\left(x^{2^k}+x+\delta\right)^{s}+x}\) over \({\mathbb{F}_{2^n}}\)
Applicable Algebra in Engineering, Communication and Computing
2010-04-20Paper
A class of rotation symmetric Boolean functions with optimum algebraic immunity
Wuhan University Journal of Natural Sciences
2010-02-12Paper
Multi-recipient public key encryption scheme based on Weil pairing
Journal of Software
2010-02-12Paper
Further properties of several classes of Boolean functions with optimum algebraic immunity
Designs, Codes and Cryptography
2009-10-14Paper
A new family of quadriphase sequences with optimal correlation properties
 
2009-07-22Paper
Some results on skew Hadamard difference sets
Designs, Codes and Cryptography
2009-03-31Paper
Analysis of the SMS4 Block Cipher
Information Security and Privacy
2009-03-06Paper
Compression of Tate pairings on elliptic curves
 
2009-03-06Paper
Kipnis-Shamir Attack on HFE Revisited
Information Security and Cryptology
2009-02-10Paper
A Class of Nonbinary Codes and Sequence Families
Sequences and Their Applications - SETA 2008
2009-02-10Paper
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting
Information Security and Cryptology
2009-02-10Paper
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields
IEEE Transactions on Information Theory
2008-12-21Paper
Generalized Kasami Sequences: The Large Set
IEEE Transactions on Information Theory
2008-12-21Paper
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences
Sequences and Their Applications – SETA 2006
2008-11-27Paper
Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions
Sequences and Their Applications – SETA 2006
2008-11-27Paper
Authentication codes and bipartite graphs
European Journal of Combinatorics
2008-07-11Paper
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
New Description of SMS4 by an Embedding overGF(28)
Lecture Notes in Computer Science
2008-04-11Paper
A formula on linear complexity of highest coordinate sequences from maximal periodic sequences over Galois rings
Progress in Natural Science
2008-03-18Paper
A New Family of Gold-Like Sequences
Lecture Notes in Computer Science
2008-03-07Paper
Constructions of \(p\)-ary quadratic bent functions
Acta Applicandae Mathematicae
2008-02-27Paper
Using an efficient hash chain and delaying function to improve an e-lottery scheme
International Journal of Computer Mathematics
2007-09-03Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Kronecker product of two-dimensional arrays
Acta Mathematicae Applicatae Sinica. English Series
2006-10-24Paper
Expansion and linear complexity of the coordinate sequences over Galois rings
Journal of Complexity
2006-07-12Paper
Cryptanalysis of a new signal security system for multimedia data transmission
EURASIP Journal on Applied Signal Processing
2005-10-28Paper
Maximal Periodic Two-Dimensional Arrays Over Galois Rings
Communications in Algebra
2005-08-25Paper
scientific article; zbMATH DE number 2112354 (Why is no real title available?)
 
2004-10-28Paper
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.
Discrete Mathematics
2004-03-14Paper
scientific article; zbMATH DE number 1921344 (Why is no real title available?)
 
2003-10-09Paper
scientific article; zbMATH DE number 1810257 (Why is no real title available?)
 
2002-12-09Paper
scientific article; zbMATH DE number 1340845 (Why is no real title available?)
 
2002-09-05Paper
scientific article; zbMATH DE number 1789834 (Why is no real title available?)
 
2002-08-27Paper
Constructing optimal arbitration-authentication codes of arbitrary order
Journal of Systems Science and Mathematical Sciences
2002-03-13Paper
Chrestenson spectral characterization of correlation-immunity of multiple-valued logic functions over \(Z/(m)\)
Chinese Science Bulletin
2002-02-18Paper
The degeneracy problem of two-dimensional linear recurring arrays
Systems Science and Mathematical Sciences
2001-07-11Paper
scientific article; zbMATH DE number 1517064 (Why is no real title available?)
 
2001-01-14Paper
Module structure of doubly periodic arrays over finite fields
Science in China. Series A
2000-12-06Paper
The finite groups of order \(p^2q\) with \(p\)-blocks of defect \(0\)
Journal of Algebra
1999-09-08Paper
scientific article; zbMATH DE number 1187248 (Why is no real title available?)
 
1998-11-01Paper
Properties of Gröbner bases and applications to doubly periodic arrays
Journal of Symbolic Computation
1998-10-06Paper
Product of spaces of doubly periodic arrays
Science in China. Series E
1998-01-07Paper


Research outcomes over time


This page was built for person: Lei Hu