Kai Hu

Orcid: 0000-0003-3552-7200

Affiliations:
  • Shandong University, Qingdao, Shandong, China


According to our database1, Kai Hu authored at least 30 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cryptanalysis of Full-Round BipBip.
IACR Trans. Symmetric Cryptol., 2024

Symmetric Twin Column Parity Mixers and Their Applications.
IACR Trans. Symmetric Cryptol., 2024

Perfect Monomial Prediction for Modular Addition.
IACR Trans. Symmetric Cryptol., 2024

Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings with a Break-Fix Strategy.
IACR Trans. Symmetric Cryptol., 2024

Integral Attack on the Full FUTURE Block Cipher.
IACR Cryptol. ePrint Arch., 2024

Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations.
IACR Cryptol. ePrint Arch., 2024

uKNIT: Breaking Round-alignment for Cipher Design - Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher.
IACR Cryptol. ePrint Arch., 2024

Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium.
IACR Cryptol. ePrint Arch., 2024

Meet-in-the-Middle Attack on 4+4 Rounds of SCARF under Single-Tweak Setting.
IACR Cryptol. ePrint Arch., 2024

2023
More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities.
IACR Cryptol. ePrint Arch., 2023

Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha.
IACR Cryptol. ePrint Arch., 2022

Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies.
IACR Cryptol. ePrint Arch., 2022

On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version).
IACR Cryptol. ePrint Arch., 2022

Finding All Impossible Differentials When Considering the DDT.
IACR Cryptol. ePrint Arch., 2022

On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.
IACR Trans. Symmetric Cryptol., 2021

A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks.
J. Comput. Sci. Technol., 2021

Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.
IACR Cryptol. ePrint Arch., 2021

Massive Superpoly Recovery with Nested Monomial Predictions.
IACR Cryptol. ePrint Arch., 2021

Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128.
IACR Cryptol. ePrint Arch., 2021

STP models of optimal differential and linear trail for S-box based ciphers.
Sci. China Inf. Sci., 2021

2020
Finding Bit-Based Division Property for Ciphers with Complex Linear Layers.
IACR Trans. Symmetric Cryptol., 2020

Finding Bit-Based Division Property for Ciphers with Complex Linear Layer.
IACR Cryptol. ePrint Arch., 2020

An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
IACR Cryptol. ePrint Arch., 2020

MixColumns Coefficient Property and Security of the AES with A Secret S-Box.
IACR Cryptol. ePrint Arch., 2020

2019
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.
IACR Trans. Symmetric Cryptol., 2019

Automatic Search for a Variant of Division Property Using Three Subsets.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version).
IACR Cryptol. ePrint Arch., 2018

Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES.
IACR Cryptol. ePrint Arch., 2018


  Loading...