An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums K Hu, S Sun, M Wang, Q Wang International Conference on the Theory and Application of Cryptology and …, 2020 | 68 | 2020 |
Misuse-free key-recovery and distinguishing attacks on 7-round ascon R Rohit, K Hu, S Sarkar, S Sun Cryptology ePrint Archive, 2021 | 37 | 2021 |
Automatic search for a variant of division property using three subsets K Hu, M Wang Cryptographers’ Track at the RSA Conference, 412-432, 2019 | 36 | 2019 |
STP models of optimal differential and linear trail for S-box based ciphers Y Liu, H Liang, M Li, L Huang, K Hu, C Yang, M Wang Cryptology ePrint Archive, 2019 | 36 | 2019 |
Massive superpoly recovery with nested monomial predictions K Hu, S Sun, Y Todo, M Wang, Q Wang Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 32 | 2021 |
Finding bit-based division property for ciphers with complex linear layers K Hu, Q Wang, M Wang IACR Transactions on Symmetric Cryptology, 396-424, 2020 | 20 | 2020 |
Revisiting higher-order differential-linear attacks from an algebraic perspective K Hu, T Peyrin, QQ Tan, T Yap International Conference on the Theory and Application of Cryptology and …, 2023 | 17 | 2023 |
Stretching cube attacks: improved methods to recover massive superpolies J He, K Hu, B Preneel, M Wang International Conference on the Theory and Application of Cryptology and …, 2022 | 16 | 2022 |
Towards key-dependent integral and impossible differential distinguishers on 5-round AES K Hu, T Cui, C Gao, M Wang International Conference on Selected Areas in Cryptography, 139-162, 2018 | 14 | 2018 |
Related-tweak statistical saturation cryptanalysis and its application on QARMA M Li, K Hu, M Wang Cryptology ePrint Archive, 2019 | 13 | 2019 |
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 10 | 2021 |
Finding all impossible differentials when considering the DDT K Hu, T Peyrin, M Wang International Conference on Selected Areas in Cryptography, 285-305, 2022 | 9 | 2022 |
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC J Cui, K Hu, M Wang, P Wei International Conference on the Theory and Application of Cryptology and …, 2022 | 8 | 2022 |
Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 J Cui, K Hu, Q Wang, M Wang Cryptographers’ Track at the RSA Conference, 223-246, 2022 | 6 | 2022 |
A secure IoT firmware update scheme against SCPA and DoS attacks YH Fan, MQ Wang, YB Li, K Hu, MZ Li Journal of Computer Science and Technology 36, 419-433, 2021 | 6 | 2021 |
AlgSAT—A SAT Method for Verification of Differential Trails from an Algebraic Perspective H Li, H Zhang, K Hu, G Liu, W Qiu Australasian Conference on Information Security and Privacy, 450-471, 2024 | 3* | 2024 |
Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium J He, K Hu, H Lei, M Wang Annual International Conference on the Theory and Applications of …, 2024 | 3 | 2024 |
Finding desirable substitution box with SASQUATCH M Wadhwa, A Baksi, K Hu, A Chattopadhyay, T Isobe, D Saha Cryptology ePrint Archive, 2023 | 3 | 2023 |
MixColumns Coefficient Property and Security of the AES with A Secret S-Box X An, K Hu, M Wang Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020 | 3 | 2020 |
Integral attack on the full FUTURE block cipher Z Xu, J Cui, K Hu, M Wang Tsinghua Science and Technology, 2024 | 1 | 2024 |