近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Bowen Liu, Pawel Szalachowski, Siwei Sun: Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. CoRR abs/2003.06127 (2020)
Bowen Liu, Siwei Sun, Pawel Szalachowski: SMACS: Smart Contract Access Control Service. CoRR abs/2003.07495 (2020)
Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang: Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020)
Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu: Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits. IACR Trans. Symmetric Cryptol. 2019(1): 84-117 (2019)
Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu: Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Trans. Symmetric Cryptol. 2019(4): 147-170 (2019)
Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu: Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS. CRYPTO (2) 2019: 180-209
Chunpeng Ge, Siwei Sun, Pawel Szalachowski: Permission less Block chains and Secure Logging. IEEE ICBC 2019: 56-60
Qiu Chen, Danping Shi, Siwei Sun, Lei Hu: Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. ICICS 2019: 233-247
Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu: Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. ICICS 2019: 799-813
Jiahao Cai, Zihao Wei, Yingjie Zhang, Siwei Sun, Lei Hu: Zero-sum Distinguishers for Round-reduced GIMLI Permutation. ICISSP 2019: 38-43
Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun: StrongChain: Transparent and Collaborative Proof-of-Work Consensus. USENIX Security Symposium 2019: 819-836
Chunpeng Ge, Siwei Sun, Pawel Szalachowski: Permissionless Blockchains and Secure Logging. CoRR abs/1903.03954 (2019)
Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun: StrongChain: Transparent and Collaborative Proof-of-Work Consensus. CoRR abs/1905.09655 (2019)
Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu: Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit. IACR Cryptol. ePrint Arch. 2019: 107 (2019)
Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu: Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. IACR Cryptol. ePrint Arch. 2019: 172 (2019)
Zihao Wei, Siwei Sun, Lei Hu, Man Wei, Joan Boyar, René Peralta: Scrutinizing the Tower Field Implementation of the 픽28 Inverter - with Applications to AES, Camellia, and SM4. IACR Cryptol. ePrint Arch. 2019: 738 (2019)
Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu: Lightweight Iterative MDS Matrices: How Small Can We Go? IACR Cryptol. ePrint Arch. 2019: 1310 (2019) 2018
Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun: On the Complexity of Impossible Differential Cryptanalysis. Security and Communication Networks 2018: 7393401:1-7393401:11 (2018)
Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018)
Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. ASIACRYPT (2) 2018: 3-34
Yingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu:Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy. ISC 2018: 101-115
Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. IACR Cryptol. ePrint Arch. 2018: 813 (2018)2017
Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. Sci. China Inf. Sci. 60(3): 39101:1-39101:3 (2017)
Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Trans. Symmetric Cryptol. 2017(1): 281-306 (2017)
Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 162 (2017)2016
Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. FSE 2016: 268-288
Kexin Qiao, Lei Hu, Siwei Sun:Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques. ICISSP (Revised Selected Papers) 2016: 64-85
Kexin Qiao, Lei Hu, Siwei Sun:Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. ICISSP 2016: 74-84
Danping Shi, Lei Hu, Siwei Sun, Ling Song:Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. ICISSP 2016: 364-371
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Related-Key Impossible Differential Analysis of Full Khudra. IWSEC 2016: 135-146
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. NSS 2016: 398-411
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher. IACR Cryptol. ePrint Arch. 2016: 84 (2016)
Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu:Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or. IACR Cryptol. ePrint Arch. 2016: 338 (2016)
Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck. IACR Cryptol. ePrint Arch. 2016: 407 (2016)
2015
Kexin Qiao, Lei Hu, Siwei Sun, Xiaoshuang Ma, Haibin Kan:Improved MILP Modeling for Automatic Security Evaluation and Application to FOX. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 72-80 (2015)
Danping Shi, Lei Hu, Ling Song, Siwei Sun:Differential fault attack on Zorro block cipher. Security and Communication Networks 8(16): 2826-2835 (2015)
Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:Improved Differential Analysis of Block Cipher PRIDE. ISPEC 2015: 209-219
Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan:Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis. ISC 2015: 141-157
Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song:Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s. IWSEC 2015: 97-111
Zhengbang Zha, Lei Hu, Siwei Sun, Jinyong Shan:Further results on differentially 4-uniform permutations over F22m. CoRR abs/1502.03874 (2015)
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. IACR Cryptol. ePrint Arch. 2015: 122 (2015)
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:Related-key Impossible Differential Analysis of Full Khudra. IACR Cryptol. ePrint Arch. 2015: 840 (2015)
Kexin Qiao, Lei Hu, Siwei Sun:Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. IACR Cryptol. ePrint Arch. 2015: 902 (2015)
Danping Shi, Lei Hu, Siwei Sun, Ling Song:Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN. IACR Cryptol. ePrint Arch. 2015: 964 (2015)
2014
Zhengbang Zha, Lei Hu, Siwei Sun, Yao Sun:New constructions of APN polynomial functions in odd characteristic. Appl. Algebra Eng. Commun. Comput. 25(4): 249-263 (2014)
Zhengbang Zha, Lei Hu, Siwei Sun:Constructing new differentially 4-uniform permutations from the inverse function. Finite Fields Their Appl. 25: 64-78 (2014)
Jun Xu, Lei Hu, Siwei Sun, Yonghong Xie:Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET Communications 8(12): 2142-2146 (2014)
Jun Xu, Lei Hu, Siwei Sun:Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET Communications 8(14): 2433-2437 (2014)
Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song:Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. ASIACRYPT (1) 2014: 158-178
Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:Error-Tolerant Algebraic Side-Channel Attacks Using BEE. ICICS 2014: 1-15
Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan:Tighter Security Bound of MIBS Block Cipher against Differential Attack. NSS 2014: 518-525
Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao:Error-Tolerant Algebraic Side-Channel Attacks Using BEE. IACR Cryptol. ePrint Arch. 2014: 683 (2014)
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song:Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications. IACR Cryptol. ePrint Arch. 2014: 747 (2014)
Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma:Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON. IACR Cryptol. ePrint Arch. 2014: 973 (2014)
Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma:Improved Differential Analysis of Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 978 (2014)
Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma:Related-Key Differential Attack on Round Reduced RECTANGLE-80. IACR Cryptol. ePrint Arch. 2014: 986 (2014)
2013
Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks. Inscrypt 2013: 39-51
Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 547 (2013)
Siwei Sun, Lei Hu, Peng Wang:Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others. IACR Cryptol. ePrint Arch. 2013: 676 (2013)
2012
Jun Xu, Lei Hu, Siwei Sun, Ping Wang:Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. CANS 2012: 32-42
Jun Xu, Lei Hu, Siwei Sun:Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem. ICICS 2012: 45-57 2011
Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng:Cube Cryptanalysis of Hitag2 Stream Cipher. CANS 2011: 15-25 2010
Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun:On the Kipnis-Shamir Method Solving the MinRank Problem. IWSEC (Short Papers) 2010: 1-13