Hosein Hadipour

English: Hosein Hadipour
فارسی: حسین هادی پور
中文: 侯森 哈迪普尔

Postdoctoral Researcher at Ruhr University Bochum

I am interested in mathematics, logic, and computer science. I love finding connections between different mathematical problems and applying advances from one area to solve challenges in another. My academic background spans mathematics and electronic engineering (two bachelor's degrees) from K. N. Toosi University, followed by a master's degree in mathematics at the University of Tehran. I completed my Ph.D. in computer science with distinction at Graz University of Technology in 2024, specializing in cryptography. I am now a postdoctoral researcher at Ruhr University Bochum, continuing my research in cryptanalysis of symmetric primitives. I have published papers in top conferences/journals including CRYPTO, EUROCRYPT, FSE/ToSC, and CHES.

Public key: age17x6fu4na8hvxuh7hgs7ec62g7ddhsdlasqrqe6u7pzx0z86fpsxsgfpwdp

Hosein Hadipour

Quick Message Terminal

Send me a direct message through this terminal interface! Messages are delivered directly to my Telegram.

secure@crypt0grapher:~$
root@secure:~#
Static website served over HTTPS by GitHub Pages Messages sent directly from browser to n8n service Not end to end encrypted (intermediaries can access)

Security Analysis: How This Message System Works

[✓] Static Website Protection: This website is served by GitHub Pages over HTTPS. The website files themselves are protected in transit, but GitHub Pages only serves static content.

[!] Message Transmission: Your messages are sent directly from your browser to n8n automation service over HTTPS (encrypted in transit) but are accessible in unencrypted form within the n8n service itself.

[×] Third-Party Processing: After processing, messages are sent to Telegram through their API. Both n8n and Telegram servers can technically access the message content.

This system shows why cryptography matters: even with HTTPS protection, your messages are readable by intermediaries (n8n, Telegram). The solution? Encrypt messages before sending them. Try it yourself with /encrypt <your message> in the terminal above.

// My research focuses on building the mathematical foundations that make secure encryption possible: designing and analyzing block ciphers, hash functions, and cryptographic primitives.

Research Areas

Cryptanalysis

Cryptanalysis of symmetric-key primitives through unified attack frameworks, including differential, linear, boomerang, integral, impossible-differential, zero-correlation, and differential-linear techniques.

Automated Cryptanalysis

Interested in the automation of cryptanalysis, with emphasis on designing tools and algorithms for systematic security evaluation of ciphers, such as SAT/SMT-based approaches and dedicated frameworks.

Applied Mathematics and Interdisciplinary Methods

Exploring connections between mathematics, logic, and computer science, and applying advances from one area to solve challenges in another, particularly in cryptography and security.

Side-Channel Analysis

Exploring physical attack vectors against cryptographic implementations, such as power analysis, electromagnetic analysis, and fault injection techniques.

Logic

Study of formal logic and proof theory, with applications in computer science and cryptography, such as verification, reasoning systems, and complexity theory.

Constraint Programming

Application of constraint programming to cryptographic problems and beyond, such as satisfiability, combinatorial optimization, and automated reasoning.

Information Security

General interest in securing information systems, with focus on principles and practices such as threat modeling, risk management, and security evaluation.

Recent Publications

Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.

Hosein Hadipour, Patrick Derbez, Maria Eichlseder

CRYPTO • 2024

View Publication

Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks.

Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder

EUROCRYPT • 2023

View Publication

Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs.

Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, Maria Eichlseder

IACR Trans. Symmetric Cryptol. • 2024

View Publication