Hosein Hadipour

English: Hosein Hadipour
فارسی: حسین هادی پور
中文: 侯森 哈迪普尔

Postdoctoral Researcher at Ruhr University Bochum

I am interested in mathematics, logic, and computer science. I love finding connections between different mathematical problems and applying advances from one area to solve challenges in another. My academic background spans mathematics and electronic engineering (two bachelor's degrees) from K. N. Toosi University, followed by a master's degree in mathematics at the University of Tehran. I completed my Ph.D. in computer science with distinction at Graz University of Technology in 2024, specializing in cryptography. I am now a postdoctoral researcher at Ruhr University Bochum, continuing my research in cryptanalysis of symmetric primitives. I have published papers in top conferences/journals including CRYPTO, EUROCRYPT, FSE/ToSC, and CHES.

Public key: age17x6fu4na8hvxuh7hgs7ec62g7ddhsdlasqrqe6u7pzx0z86fpsxsgfpwdp

Hosein Hadipour

Quick Message Terminal

Send me a direct message through this terminal interface! Messages are delivered directly to my Telegram.

secure@crypt0grapher:~$
root@secure:~#

Security Analysis: How This Message System Works

[✓] Static Website Protection: This website is served by GitHub Pages over HTTPS. The website files themselves are protected in transit, but GitHub Pages only serves static content.

[!] Message Transmission: Your messages are sent directly from your browser to the n8n server over HTTPS (encrypted in transit) but are accessible in unencrypted form within the n8n server itself.

[×] Third-Party Processing: After processing, messages are sent to Telegram through their API. Both n8n and Telegram servers can technically access the message content.

This system shows why end-to-end encryption matters: your browser connects to this website over HTTPS, but when you send a message, intermediaries (n8n server, Telegram) can still read the content. The solution? Encrypt messages in your browser before sending them. Try it yourself with /encrypt <your message> in the terminal above.

// My research focuses on building the mathematical foundations that make secure encryption possible: designing and analyzing block ciphers, hash functions, and cryptographic primitives.

Research Areas

Cryptanalysis

Cryptanalysis of symmetric-key primitives through unified attack frameworks, including differential, linear, boomerang, integral, impossible-differential, zero-correlation, and differential-linear techniques.

Automated Cryptanalysis

Interested in the automation of cryptanalysis, with emphasis on designing tools and algorithms for systematic security evaluation of ciphers, such as SAT/SMT-based approaches and dedicated frameworks.

Applied Mathematics and Interdisciplinary Methods

Exploring connections between mathematics, logic, and computer science, and applying advances from one area to solve challenges in another, particularly in cryptography and security.

Side-Channel Analysis

Exploring physical attack vectors against cryptographic implementations, such as power analysis, electromagnetic analysis, and fault injection techniques.

Logic

Study of formal logic and proof theory, with applications in computer science and cryptography, such as verification, reasoning systems, and complexity theory.

Constraint Programming

Application of constraint programming to cryptographic problems and beyond, such as satisfiability, combinatorial optimization, and automated reasoning.

Information Security

General interest in securing information systems, with focus on principles and practices such as threat modeling, risk management, and security evaluation.

Recent Publications

Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.

Hosein Hadipour, Patrick Derbez, Maria Eichlseder

CRYPTO • 2024

View Publication

Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks.

Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder

EUROCRYPT • 2023

View Publication

Mix-Basis Geometric Approach to Boomerang Distinguishers.

Chengcheng Chang, Hosein Hadipour, Kai Hu 0001, Muzhou Li, Meiqin Wang

IACR Trans. Symmetric Cryptol. • 2025

View Publication