What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kai Hu
Google Scholar
26
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Addendum to How Small Can S-boxes Be?
Yu Sun
Lixuan Wu
Chenhao Jia
Tingting Cui
Kai Hu
Meiqin Wang
2025
journals/tosc
How Small Can S-boxes Be?
Chenhao Jia
Tingting Cui
Qing Ling
Yan He
Kai Hu
Yu Sun
Meiqin Wang
2025
conf/ctrsa
Quasidifferential Saves Infeasible Differential - Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT.
Chengcheng Chang
Meiqin Wang
Wei Wang
Kai Hu
2025
conf/ctrsa
Improved Key Recovery Attacks of Ascon.
Shuo Peng
Kai Hu
Jiahui He
Meiqin Wang
2025
conf/crypto
Unlocking Mix-Basis Potential: Geometric Approach for Combined Attacks.
Kai Hu
Chi Zhang
Chengcheng Chang
Jiashu Zhang
Meiqin Wang
Thomas Peyrin
2025
journals/tosc
Mix-Basis Geometric Approach to Boomerang Distinguishers.
Chengcheng Chang
Hosein Hadipour
Kai Hu
Muzhou Li
Meiqin Wang
2024
journals/tosc
Perfect Monomial Prediction for Modular Addition.
Kai Hu
Trevor Yap
2024
journals/tosc
Cryptanalysis of Full-Round BipBip.
Jinliang Wang
Christina Boura
Patrick Derbez
Kai Hu
Muzhou Li
Meiqin Wang
2024
journals/tosc
Symmetric Twin Column Parity Mixers and Their Applications.
Hao Lei
Raghvendra Rohit
Guoxiao Liu
Jiahui He
Mohamed Rachidi
Keting Jia
Kai Hu
Meiqin Wang
2024
journals/tosc
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings with a Break-Fix Strategy.
Kai Hu
2024
conf/crypto
Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations.
Zhongfeng Niu
Kai Hu
Siwei Sun
Zhiyu Zhang
Meiqin Wang
2024
conf/eurocrypt
Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium.
Jiahui He
Kai Hu
Hao Lei
Meiqin Wang
2023
conf/asiacrypt
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective.
Kai Hu
Thomas Peyrin
Quan Quan Tan
Trevor Yap
2023
conf/sacrypt
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities.
Hao Lei
Jiahui He
Kai Hu
Meiqin Wang
2022
conf/ctrsa
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128.
Jiamin Cui
Kai Hu
Qingju Wang
Meiqin Wang
2022
conf/asiacrypt
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC.
Jiamin Cui
Kai Hu
Meiqin Wang
Puwen Wei
2022
conf/asiacrypt
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies.
Jiahui He
Kai Hu
Bart Preneel
Meiqin Wang
2022
conf/sacrypt
Finding All Impossible Differentials When Considering the DDT.
Kai Hu
Thomas Peyrin
Meiqin Wang
2021
journals/tosc
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.
Raghvendra Rohit
Kai Hu
Sumanta Sarkar
Siwei Sun
2021
conf/asiacrypt
Massive Superpoly Recovery with Nested Monomial Predictions.
Kai Hu
Siwei Sun
Yosuke Todo
Meiqin Wang
Qingju Wang
2020
journals/tosc
Finding Bit-Based Division Property for Ciphers with Complex Linear Layers.
Kai Hu
Qingju Wang
Meiqin Wang
2020
conf/asiacrypt
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
Kai Hu
Siwei Sun
Meiqin Wang
Qingju Wang
2020
conf/africacrypt
MixColumns Coefficient Property and Security of the AES with A Secret S-Box.
Xin An
Kai Hu
Meiqin Wang
2019
journals/tosc
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.
Muzhou Li
Kai Hu
Meiqin Wang
2019
conf/ctrsa
Automatic Search for a Variant of Division Property Using Three Subsets.
Kai Hu
Meiqin Wang
2018
conf/sacrypt
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES.
Kai Hu
Tingting Cui
Chao Gao
Meiqin Wang
Coauthors
Bart Preneel
(1)
Chao Gao
(1)
Chengcheng Chang
(3)
Chenhao Jia
(2)
Chi Zhang
(1)
Christina Boura
(1)
Guoxiao Liu
(1)
Hao Lei
(3)
Hosein Hadipour
(1)
Jiahui He
(5)
Jiamin Cui
(2)
Jiashu Zhang
(1)
Jinliang Wang
(1)
Kai Hu
(26)
Keting Jia
(1)
Lixuan Wu
(1)
Meiqin Wang
(22)
Mohamed Rachidi
(1)
Muzhou Li
(3)
Patrick Derbez
(1)
Puwen Wei
(1)
Qing Ling
(1)
Qingju Wang
(4)
Quan Quan Tan
(1)
Raghvendra Rohit
(2)
Shuo Peng
(1)
Siwei Sun
(4)
Sumanta Sarkar
(1)
Thomas Peyrin
(3)
Tingting Cui
(3)
Trevor Yap
(2)
Wei Wang
(1)
Xin An
(1)
Yan He
(1)
Yosuke Todo
(1)
Yu Sun
(2)
Zhiyu Zhang
(1)
Zhongfeng Niu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to