


default search action
Jun Xu 0022
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key State Laboratory of Information Security, Beijing, China
- affiliation: Chinese Academy of Sciences, Data Assurance and Communication Security Research Center, Beijing, China
Other persons with the same name
- Jun Xu — disambiguation page
- Jun Xu 0001
— Renmin University of China, School of Information, Beijing Key Laboratory of Big Data Management and Analysis Methods, China (and 4 more)
- Jun Erik Xu (aka: Jun Xu 0002) — Hughes Network Systems, Germantown, MD, USA (and 1 more)
- Jun Xu 0003 — Google Inc., Mountain View, CA, USA (and 2 more)
- Jun Xu 0004 — Marvell Semiconductor (and 1 more)
- Jun Xu 0005
— Nanjing University of Information Science & Technology, China (and 1 more)
- Jun Xu 0006 — Southern Cross University, Gold Coast, NSW, Australia
- Jun Xu 0007 — University of Texas Health Science Center, Houston, TX, USA (and 1 more)
- Jun Xu 0008
— Tsinghua University, Department of Automation, Beijing, China
- Jun Xu 0009 — New Jersey Institute of Technology, Newark, NJ, USA
- Jun Xu 0010 — Tsinghua University, Department of Computing Science & Technology, Beijing, China
- Jun Xu 0011 — Fudan University, The State Key Lab of ASIC & System, China
- Jun Xu 0012 — Fudan University, Department of Computer Science, China
- Jun Xu 0013 — Nanjing University, Institute of VLSI Design, China
- Jun (Jim) Xu
(aka: Jun Xu 0014) — Georgia Institute of Technology, Atlanta, GA, USA (and 1 more)
- Jun Xu 0015
— Western Digital Corp, Singapore (and 1 more)
- Jun Xu 0016
— Jinan University, Institute of Industrial Economics, Guangzhou, China
- Jun Xu 0017
— Sun Yat-Sen University, Research Center for Drug Discovery, Guangzhou, China
- Jun Xu 0018
— Xi'an Jiaotong University, School of Mechanical Engineering, China (and 1 more)
- Jun Xu 0019
— Nankai University, College of Computer Science, TKLNDST, Tianjin, China (and 1 more)
- Jun Xu 0020
— Institute of Geographical Science and Natural Resources Research, Beijing, China (and 1 more)
- Jun Xu 0021
— Wuhan University, Electronic Information School, China (and 1 more)
- Jun Xu 0023
— Shenzhen University, College of Computer Science and Software Engineering, China (and 2 more)
- Jun Xu 0024
— University of Utah, Salt Lake City, UT, USA (and 2 more)
- Jun Xu 0025
— University of Central Florida, Department of Computer Science, Orlando, FL, USA
- Jun Xu 0026 — Shanghai University of Electric Power, College of Automation Engineering (and 1 more)
- Jun Xu 0027 — Harbin Institute of Technology, Research Center for Social Computing and Information Retrieval, China
- Jun Xu 0028
— Yunnan University, School of Information Science and Engineering, Kunming, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i10]Jun Xu, Zhiwei Li, Lei Hu:
Breaking Bicoptor from S&P 2023 Based on Practical Secret Recovery Attack. IACR Cryptol. ePrint Arch. 2024: 542 (2024) - 2023
- [j9]Jun Xu
, Santanu Sarkar
, Lei Hu
, Huaxiong Wang
, Yanbin Pan
:
Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE Trans. Inf. Theory 69(8): 5337-5356 (2023) - [i9]Zhiwei Li, Jun Xu, Lei Hu:
Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2023: 1709 (2023) - 2022
- [j8]Jun Xu, Santanu Sarkar
, Lei Hu:
Revisiting orthogonal lattice attacks on approximate common divisor problems. Theor. Comput. Sci. 911: 55-69 (2022) - [c19]Jun Xu
, Santanu Sarkar
, Huaxiong Wang
, Lei Hu
:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. ASIACRYPT (3) 2022: 771-799 - [c18]Jing Gao, Jun Xu, Lei Hu:
Inferring Sequences Produced by the Quadratic Generator. Inscrypt 2022: 483-494 - [c17]Jing Gao, Jun Xu, Tianyu Wang, Lei Hu:
New Results of Breaking the CLS Scheme from ACM-CCS 2014. ICICS 2022: 37-54 - [i8]Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu:
Lattice Signature can be as Simple as Lattice Encryption. IACR Cryptol. ePrint Arch. 2022: 97 (2022) - [i7]Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. IACR Cryptol. ePrint Arch. 2022: 1239 (2022) - 2021
- [c16]Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng
:
On the Ideal Shortest Vector Problem over Random Rational Primes. EUROCRYPT (1) 2021: 559-583 - [c15]Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu, Yang Tao, Yongbin Zhou:
Integer LWE with Non-subgaussian Error and Related Attacks. ISC 2021: 3-25 - [i6]Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng:
On the Ideal Shortest Vector Problem over Random Rational Primes. IACR Cryptol. ePrint Arch. 2021: 245 (2021) - 2020
- [j7]Jun Xu, Lei Hu, Santanu Sarkar
:
Cryptanalysis of elliptic curve hidden number problem from PKC 2017. Des. Codes Cryptogr. 88(2): 341-361 (2020) - [i5]Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng:
On the ideal shortest vector problem over random rational primes. CoRR abs/2004.10278 (2020)
2010 – 2019
- 2019
- [j6]Xiaona Zhang, Li-Ping Wang, Jun Xu:
Certifying multi-power RSA. IET Inf. Secur. 13(4): 330-335 (2019) - [c14]Jun Xu, Santanu Sarkar
, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. CRYPTO (1) 2019: 297-321 - [c13]Jun Xu, Santanu Sarkar
, Lei Hu:
Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. INDOCRYPT 2019: 398-411 - [i4]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. IACR Cryptol. ePrint Arch. 2019: 604 (2019) - 2018
- [j5]Jun Xu, Santanu Sarkar
, Lei Hu, Zhangjie Huang, Liqiang Peng:
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. Des. Codes Cryptogr. 86(9): 1997-2033 (2018) - [i3]Jun Xu, Santanu Sarkar, Lei Hu:
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications. IACR Cryptol. ePrint Arch. 2018: 1208 (2018) - 2017
- [j4]Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang:
Cryptanalysis of Dual RSA. Des. Codes Cryptogr. 83(1): 1-21 (2017) - 2016
- [c12]Jun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng, Zhangjie Huang:
Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication. ISC 2016: 48-58 - [c11]Jun Xu, Lei Hu, Santanu Sarkar
, Xiaona Zhang, Zhangjie Huang, Liqiang Peng:
Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption. ISC 2016: 440-453 - [i2]Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng:
Cryptanalysis of Multi-Prime Φ-Hiding Assumption. IACR Cryptol. ePrint Arch. 2016: 155 (2016) - 2015
- [c10]Xiaona Zhang, Li-Ping Wang, Jun Xu, Lei Hu, Liqiang Peng, Zhangjie Huang, Zeyi Liu:
Recovering a Sum of Two Squares Decomposition Revisited. Inscrypt 2015: 178-192 - [c9]Liqiang Peng, Lei Hu, Yao Lu, Santanu Sarkar
, Jun Xu, Zhangjie Huang:
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. INDOCRYPT 2015: 105-123 - [c8]Liqiang Peng, Lei Hu, Zhangjie Huang, Jun Xu:
Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant. ISPEC 2015: 96-108 - [c7]Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang, Jun Xu:
Implicit Factorization of RSA Moduli Revisited (Short Paper). IWSEC 2015: 67-76 - 2014
- [j3]Jun Xu, Lei Hu, Siwei Sun
, Yonghong Xie:
Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET Commun. 8(12): 2142-2146 (2014) - [j2]Jun Xu, Lei Hu, Siwei Sun
:
Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET Commun. 8(14): 2433-2437 (2014) - [c6]Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie:
Partial Key Exposure Attacks on Takagi's Variant of RSA. ACNS 2014: 134-150 - [c5]Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie:
Further Improvement of Factoring RSA Moduli with Implicit Hint. AFRICACRYPT 2014: 165-177 - [c4]Zhangjie Huang, Lei Hu, Jun Xu:
Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization. Inscrypt 2014: 207-219 - [c3]Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng:
Modular Inversion Hidden Number Problem Revisited. ISPEC 2014: 537-551 - [i1]Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng:
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator. IACR Cryptol. ePrint Arch. 2014: 843 (2014) - 2013
- [j1]Liqiang Peng, Lei Hu, Jun Xu, Yonghong Xie, Jinyin Zuo:
Analysis of two knapsack public key cryptosystems. IET Commun. 7(15): 1638-1643 (2013) - 2012
- [c2]Jun Xu, Lei Hu, Siwei Sun
, Ping Wang:
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. CANS 2012: 32-42 - [c1]Jun Xu, Lei Hu, Siwei Sun
:
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem. ICICS 2012: 45-57
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-06 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint