Lei Hu

ORCID: 0000-0002-9920-5342
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • Cryptographic Implementations and Security
  • graph theory and CDMA systems
  • Chaos-based Image/Signal Encryption
  • Cryptography and Data Security
  • Cryptography and Residue Arithmetic
  • Cellular Automata and Applications
  • Polynomial and algebraic computation
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Malware Detection Techniques
  • Finite Group Theory Research
  • Advanced Authentication Protocols Security
  • Quantum Computing Algorithms and Architecture
  • User Authentication and Security Systems
  • Complexity and Algorithms in Graphs
  • semigroups and automata theory
  • Privacy-Preserving Technologies in Data
  • Wireless Communication Networks Research
  • Advanced Wireless Communication Techniques
  • Quantum Information and Cryptography
  • Quantum-Dot Cellular Automata
  • Cooperative Communication and Network Coding
  • Computability, Logic, AI Algorithms
  • RFID technology advancements
  • DNA and Biological Computing

Chinese Academy of Sciences
2016-2025

Institute of Information Engineering
2016-2025

Institute of Atmospheric Physics
2024

University of Chinese Academy of Sciences
2010-2024

State Key Laboratory of Information Security
2005-2024

Washington University in St. Louis
2023

Constellation Technology (United States)
2023

Zunyi Medical University
2022

Krirk University
2022

Georgia Institute of Technology
2022

10.1016/j.ffa.2009.12.001 article EN publisher-specific-oa Finite Fields and Their Applications 2009-12-12

10.1016/j.ffa.2013.09.007 article EN publisher-specific-oa Finite Fields and Their Applications 2013-10-09

In this paper, three constructions of balanced Boolean functions with optimum algebraic immunity are proposed.The cryptographical properties such as degree and nonlinearity the constructed also analyzed.

10.1109/tit.2011.2109935 article EN IEEE Transactions on Information Theory 2011-09-01

Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, show that a simple application CP approach proposed by Gerault et al. leads solution open problem determining exact lower bound number active S-boxes 6-round AES-128 related-key model. Subsequently, same can be applied searching integral distinguishers, impossible differentials, zero-correlation linear...

10.46586/tosc.v2017.i1.281-306 article EN cc-by IACR Transactions on Symmetric Cryptology 2017-03-08

10.1016/j.ffa.2016.11.011 article EN publisher-specific-oa Finite Fields and Their Applications 2016-12-15

10.1016/j.ffa.2012.02.003 article EN publisher-specific-oa Finite Fields and Their Applications 2012-03-06

10.1016/j.ffa.2013.08.003 article EN publisher-specific-oa Finite Fields and Their Applications 2013-09-13

Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that order for one peer to another, it needs know other peer's identity. Hence, there exists an inherent tradeoff between and anonymity. To best our knowledge, is currently no P2P protocol provides complete mutual anonymity as well authentication management. We propose a zero-knowledge scheme called pseudo (PT), where each peer, instead using its real identity, generates unforgeable verifiable...

10.1109/tpds.2008.15 article EN IEEE Transactions on Parallel and Distributed Systems 2008-08-04

In this correspondence, new binary sequence families F <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">k</sup> of period 2 xmlns:xlink="http://www.w3.org/1999/xlink">n</sup> -1 are constructed for even n and any k with gcd(k,n)=2 if n/2 is odd or gcd(k,n)=1 even. The distribution their correlation values completely determined. These have maximum xmlns:xlink="http://www.w3.org/1999/xlink">n/2+1</sup> family size...

10.1109/tit.2007.899528 article EN IEEE Transactions on Information Theory 2007-06-28

In this paper, the cycle structure and adjacency graphs of a class linear feedback shift registers (LFSRs) are determined. By recursively applying D-morphism to maximum-length LFSRs representing cycles by generating functions, new family nonlinear (NFSRs) proposed based on properties these LFSRs. The number NFSRs in is also considered.

10.1109/tit.2014.2310748 article EN IEEE Transactions on Information Theory 2014-03-11

Boolean formula minimization is a notoriously hard problem. Circuit minimization, typically studied in the context of much broader subject known as synthesis and optimization circuits, introduces another layer complexity since ultimately those technology-independent representations (e.g., formulas truth tables) has to be transformed into netlist cells target technology library. To manage complexities, industrial community separates process two steps: mapping. In each step, this approach only...

10.62056/akmpdkp10 article EN cc-by IACR Communications in Cryptology 2025-01-13

10.23919/cje.2023.00.373 article EN Chinese Journal of Electronics 2025-03-01
Coming Soon ...