Follow
Kai Hu
Title
Cited by
Cited by
Year
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
K Hu, S Sun, M Wang, Q Wang
International Conference on the Theory and Application of Cryptology and …, 2020
682020
Misuse-free key-recovery and distinguishing attacks on 7-round ascon
R Rohit, K Hu, S Sarkar, S Sun
Cryptology ePrint Archive, 2021
372021
Automatic search for a variant of division property using three subsets
K Hu, M Wang
Cryptographers’ Track at the RSA Conference, 412-432, 2019
362019
STP models of optimal differential and linear trail for S-box based ciphers
Y Liu, H Liang, M Li, L Huang, K Hu, C Yang, M Wang
Cryptology ePrint Archive, 2019
362019
Massive superpoly recovery with nested monomial predictions
K Hu, S Sun, Y Todo, M Wang, Q Wang
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
332021
Finding bit-based division property for ciphers with complex linear layers
K Hu, Q Wang, M Wang
IACR Transactions on Symmetric Cryptology, 396-424, 2020
202020
Revisiting higher-order differential-linear attacks from an algebraic perspective
K Hu, T Peyrin, QQ Tan, T Yap
International Conference on the Theory and Application of Cryptology and …, 2023
172023
Stretching cube attacks: improved methods to recover massive superpolies
J He, K Hu, B Preneel, M Wang
International Conference on the Theory and Application of Cryptology and …, 2022
162022
Towards key-dependent integral and impossible differential distinguishers on 5-round AES
K Hu, T Cui, C Gao, M Wang
International Conference on Selected Areas in Cryptography, 139-162, 2018
142018
Related-tweak statistical saturation cryptanalysis and its application on QARMA
M Li, K Hu, M Wang
Cryptology ePrint Archive, 2019
132019
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes
Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
102021
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC
J Cui, K Hu, M Wang, P Wei
International Conference on the Theory and Application of Cryptology and …, 2022
82022
Finding all impossible differentials when considering the DDT
K Hu, T Peyrin, M Wang
International Conference on Selected Areas in Cryptography, 285-305, 2022
82022
Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
J Cui, K Hu, Q Wang, M Wang
Cryptographers’ Track at the RSA Conference, 223-246, 2022
62022
A secure IoT firmware update scheme against SCPA and DoS attacks
YH Fan, MQ Wang, YB Li, K Hu, MZ Li
Journal of Computer Science and Technology 36, 419-433, 2021
62021
AlgSAT—A SAT Method for Verification of Differential Trails from an Algebraic Perspective
H Li, H Zhang, K Hu, G Liu, W Qiu
Australasian Conference on Information Security and Privacy, 450-471, 2024
3*2024
Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium
J He, K Hu, H Lei, M Wang
Annual International Conference on the Theory and Applications of …, 2024
32024
Finding desirable substitution box with SASQUATCH
M Wadhwa, A Baksi, K Hu, A Chattopadhyay, T Isobe, D Saha
Cryptology ePrint Archive, 2023
32023
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
X An, K Hu, M Wang
Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020
32020
Integral attack on the full FUTURE block cipher
Z Xu, J Cui, K Hu, M Wang
Tsinghua Science and Technology, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20