Dongdai Lin

According to our database1, Dongdai Lin authored at least 237 papers between 1988 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach.
IEEE Trans. Information Theory, 2019

Two new families of quantum synchronizable codes.
Quantum Information Processing, 2019

Speeding Up the GVW Algorithm via a Substituting Method.
J. Systems Science & Complexity, 2019

On the Linear Complexity of Binary Generalized Cyclotomic Sequences of Period 2pm+1qn+1.
IEICE Transactions, 2019

Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80.
IACR Cryptology ePrint Archive, 2019

A Generic Construction of Revocable Identity-Based Encryption.
IACR Cryptology ePrint Archive, 2019

Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions.
IACR Cryptology ePrint Archive, 2019

Further results on complete permutation monomials over finite fields.
Finite Fields and Their Applications, 2019

A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity.
Des. Codes Cryptogr., 2019

A new construction of zero-difference balanced functions and two applications.
Des. Codes Cryptogr., 2019

A recursive construction of permutation polynomials over Fq2 with odd characteristic related to Rédei functions.
Des. Codes Cryptogr., 2019

On Stability of Multi-Valued Nonlinear Feedback Shift Registers.
Complexity, 2019

Decomposition of nonlinear feedback shift registers based on Boolean networks.
SCIENCE CHINA Information Sciences, 2019

Cube Cryptanalysis of Round-Reduced ACORN.
Proceedings of the Information Security - 22nd International Conference, 2019

Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure.
IEEE Trans. Information Theory, 2018

De Bruijn Sequences, Adjacency Graphs, and Cyclotomy.
IEEE Trans. Information Theory, 2018

Lower and Upper Bounds on the Density of Irreducible NFSRs.
IEEE Trans. Information Theory, 2018

Security evaluation on Simeck against zero-correlation linear cryptanalysis.
IET Information Security, 2018

Unification of identifiers in the Sea-Cloud system.
Frontiers Comput. Sci., 2018

Fast construction of binary ring FCSRs for hardware stream ciphers.
Des. Codes Cryptogr., 2018

A class of three-weight and five-weight linear codes.
Discrete Applied Mathematics, 2018

Fault Attack on ACORN v3.
Comput. J., 2018

Three new infinite families of bent functions.
SCIENCE CHINA Information Sciences, 2018

The lightest 4 × 4 MDS matrices over GL(4, 𝔽2).
SCIENCE CHINA Information Sciences, 2018

A Lightweight Multi-precision Squaring on Embedded Processors for ECC.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Lightweight FourQ Primitive on ARM Cortex-M0.
Proceedings of the 17th IEEE International Conference On Trust, 2018

PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK.
Proceedings of the Advances in Information and Computer Security, 2018

Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP.
Proceedings of the Information Security - 21st International Conference, 2018

Conditional Cube Searching and Applications on Trivium-Variant Ciphers.
Proceedings of the Information Security - 21st International Conference, 2018

Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Hierarchical Group Signatures with Verifier-Local Revocation.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Anonymous Identity-Based Encryption with Identity Recovery.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Direct Construction of Optimal Rotational-XOR Diffusion Primitives.
IACR Trans. Symmetric Cryptol., 2017

The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials.
IEEE Trans. Information Theory, 2017

Solving polynomial systems with noise over F2: Revisited.
Theor. Comput. Sci., 2017

Fault Attack on the Authenticated Cipher ACORN v2.
Security and Communication Networks, 2017

Linearization of multi-valued nonlinear feedback shift registers.
J. Systems Science & Complexity, 2017

Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks.
Inf. Sci., 2017

Cheating prevention visual cryptography scheme using Latin square.
IET Information Security, 2017

Transition Mappings between De Bruijn Sequences.
IEICE Transactions, 2017

Fault Attack on ACORN v3.
IACR Cryptology ePrint Archive, 2017

Complete weight enumerators of two classes of linear codes.
Discrete Mathematics, 2017

The adjacency graphs of some feedback shift registers.
Des. Codes Cryptogr., 2017

On affine sub-families of Grain-like structures.
Des. Codes Cryptogr., 2017

On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers.
SCIENCE CHINA Information Sciences, 2017

A kind of three-weight linear codes.
Cryptography and Communications, 2017

Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications.
Cryptography and Communications, 2017

A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Refinement of the Four-Dimensional GLV Method on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Bounds and constructions for linear locally repairable codes over binary fields.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Cryptanalysis of Acorn in Nonce-Reuse Setting.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Driven Stability of Nonlinear Feedback Shift Registers With Inputs.
IEEE Trans. Communications, 2016

Generalized (identity-based) hash proof system and its applications.
Security and Communication Networks, 2016

On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra.
J. Systems Science & Complexity, 2016

Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers.
J. Complexity, 2016

Improvements on the Individual Logarithm Step in exTNFS.
IACR Cryptology ePrint Archive, 2016

An Algorithm for Counting the Number of 2n-Periodic Binary Sequences with Fixed k-Error Linear Complexity.
IACR Cryptology ePrint Archive, 2016

Adjacency Graphs, Irreducible Polynomials and Cyclotomy.
IACR Cryptology ePrint Archive, 2016

The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials.
IACR Cryptology ePrint Archive, 2016

Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers.
IACR Cryptology ePrint Archive, 2016

Cascade Ciphers Revisited: Indifferentiability Analysis.
IACR Cryptology ePrint Archive, 2016

Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation.
IACR Cryptology ePrint Archive, 2016

Classifying and generating exact coset representatives of PGL2(Fq) in PGL2(Fq2).
Finite Fields and Their Applications, 2016

An improvement over the GVW algorithm for inhomogeneous polynomial systems.
Finite Fields and Their Applications, 2016

Generic constructions of integrated PKE and PEKS.
Des. Codes Cryptogr., 2016

Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour.
Des. Codes Cryptogr., 2016

Stability of nonlinear feedback shift registers.
SCIENCE CHINA Information Sciences, 2016

Generalized cyclotomic numbers of order two and their applications.
Cryptography and Communications, 2016

Linear complexity of Ding-Helleseth sequences of order 2 over GF(l).
Cryptography and Communications, 2016

Further results on the nonlinearity of maximum-length NFSR feedbacks.
Cryptography and Communications, 2016

On the Division Property of Simon48 and Simon64.
Proceedings of the Advances in Information and Computer Security, 2016

The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity.
Proceedings of the Information Security Practice and Experience, 2016

Two classes of (r, t)-locally repairable codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Robust face image alignment using structural priors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2016

The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Generalized Hamming Weights of Irreducible Cyclic Codes.
IEEE Trans. Information Theory, 2015

Robust Face Clustering Via Tensor Decomposition.
IEEE Trans. Cybernetics, 2015

Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle.
J. Comput. Sci. Technol., 2015

A new linearization method for nonlinear feedback shift registers.
J. Comput. Syst. Sci., 2015

VFA: A Variable-Factor Authentication Framework for Mobile Users.
JCM, 2015

Linear complexity of binary generalized cyclotomic sequences over GF(q).
J. Complexity, 2015

On the LFSRization of a Class of FCSR Automata.
IEICE Transactions, 2015

Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis.
IACR Cryptology ePrint Archive, 2015

Linearization of Multi-valued Nonlinear Feedback Shift Registers.
IACR Cryptology ePrint Archive, 2015

Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers.
IACR Cryptology ePrint Archive, 2015

Construction of Transition Matrices for Binary FCSRs.
IACR Cryptology ePrint Archive, 2015

De Bruijn Sequences from Symmetric Shift Registers.
IACR Cryptology ePrint Archive, 2015

De Bruijn Sequences from Nonlinear Feedback Shift Registers.
IACR Cryptology ePrint Archive, 2015

A Group-theory Method to The Cycle Structures of Feedback Shift Registers.
IACR Cryptology ePrint Archive, 2015

A new encryption scheme for surveillance videos.
Frontiers Comput. Sci., 2015

On constructing complete permutation polynomials over finite fields of even characteristic.
Discrete Applied Mathematics, 2015

Survey on cyberspace security.
SCIENCE CHINA Information Sciences, 2015

RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms.
SCIENCE CHINA Information Sciences, 2015

Bayesian mechanism for rational secret sharing scheme.
SCIENCE CHINA Information Sciences, 2015

Improved domain extender for the ideal cipher.
Cryptography and Communications, 2015

On implementing signature-based Gröbner basis algorithms using linear algebraic routines from M4RI.
ACM Comm. Computer Algebra, 2015

On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Towards Optimal Bounds for Implicit Factorization Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

A New Construction of Tagged Visual Cryptography Scheme.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Estimating Differential-Linear Distinguishers and Applications to CTC2.
Proceedings of the Information Security Practice and Experience, 2015

Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI.
Proceedings of the Information Security Practice and Experience, 2015

Fault Attacks on Stream Cipher Scream.
Proceedings of the Information Security Practice and Experience, 2015

Constructing Boolean functions with (potentially) optimal algebraic immunity based on multiplicative decompositions of finite fields.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On the dual of generalized Boolean bent functions over ℤ4.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Construction of cubic rotation symmetric bent functions in power-of-two variables.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Searching cubes for testing Boolean functions and its application to Trivium.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract).
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015

Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Solving Linear Equations Modulo Unknown Divisors: Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers.
IEEE Trans. Information Theory, 2014

Symmetry Constraint for Foreground Extraction.
IEEE Trans. Cybernetics, 2014

On the Nonlinearity and Correlation Immunity of Two Classes of Boolean Functions.
Int. J. Software and Informatics, 2014

Minimum Linear Complexity Approximation of Sequences with Period qn-1 over Fq.
IEICE Transactions, 2014

Generalized Fourier Transform and the Joint N-Adic Complexity of a Multisequence.
IEICE Transactions, 2014

On the Linear Complexity of Legendre Sequences Over Fq.
IEICE Transactions, 2014

On the Linear Complexity of New Modified Jacobi Sequences.
IEICE Transactions, 2014

RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms.
IACR Cryptology ePrint Archive, 2014

Solving closest vector instances using an approximate shortest independent vectors oracle.
IACR Cryptology ePrint Archive, 2014

New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications.
IACR Cryptology ePrint Archive, 2014

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof.
IACR Cryptology ePrint Archive, 2014

A Class of FSRs and Their Adjacency Graphs.
IACR Cryptology ePrint Archive, 2014

Solving Polynomial Systems with Noise over F_2: Revisited.
IACR Cryptology ePrint Archive, 2014

On the immunity of rotation symmetric Boolean functions against fast algebraic attacks.
Discrete Applied Mathematics, 2014

CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System.
Comput. J., 2014

Defending Blind DDoS Attack on SDN Based on Moving Target Defense.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract).
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Almost perfect algebraic immune functions with good nonlinearity.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Optional multi-biometric cryptosystem based on fuzzy extractor.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
A method for counting the number of polynomial equivalence classes.
J. Mathematical Cryptology, 2013

Distinguishing Attacks on RC4 and A New Improvement of the Cipher.
IACR Cryptology ePrint Archive, 2013

L-P States of RC4 Stream Cipher.
IACR Cryptology ePrint Archive, 2013

CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems.
IACR Cryptology ePrint Archive, 2013

Generalized (Identity-Based) Hash Proof System and Its Applications.
IACR Cryptology ePrint Archive, 2013

Improved bounds for the implicit factorization problem.
Adv. in Math. of Comm., 2013

Some New Weaknesses in the RC4 Stream Cipher.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method.
Proceedings of the Network and System Security - 7th International Conference, 2013

Robust Tensor Clustering with Non-Greedy Maximization.
Proceedings of the IJCAI 2013, 2013

Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Near Collision Attack on the Grain v1 Stream Cipher.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Omega Pairing on Hyperelliptic Curves.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks.
IACR Cryptology ePrint Archive, 2012

On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation.
IACR Cryptology ePrint Archive, 2012

Integrated PKE and PEKS - Stronger Security Notions and New Constructions.
IACR Cryptology ePrint Archive, 2012

Ergodic theory over F2[[T]].
Finite Fields and Their Applications, 2012

On enumeration of polynomial equivalence classes and their application to MPKC.
Finite Fields and Their Applications, 2012

Linear Weaknesses in T-functions.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Anonymous Identity-Based Hash Proof System and Its Applications.
Proceedings of the Provable Security - 6th International Conference, 2012

On Efficient Pairings on Elliptic Curves over Extension Fields.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Stronger Security Model for Public-Key Encryption with Equality Test.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

An Improved Twisted Ate Pairing over KSS Curves with k = 18.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Analysis of Optimum Pairing Products at High Security Levels.
Proceedings of the Progress in Cryptology, 2012

Cube Cryptanalysis of LBlock with Noisy Leakage.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Fast Evaluation of T-Functions via Time-Memory Trade-Offs.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Perfect Algebraic Immune Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Identity-Based Extractable Hash Proofs and Their Applications.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions.
IEEE Trans. Information Theory, 2011

On the nonexistence of Bent Functions.
Int. J. Found. Comput. Sci., 2011

ECDLP on GPU.
IACR Cryptology ePrint Archive, 2011

Ergodic Theory Over F2[[T]].
IACR Cryptology ePrint Archive, 2011

On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC.
IACR Cryptology ePrint Archive, 2011

Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

A universal distributed model for password cracking.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

The Initialization Stage Analysis of ZUC v1.5.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Attacking Bivium and Trivium with the Characteristic Set Method.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A two-round honest-verifier zero-knowledge protocol.
SCIENCE CHINA Information Sciences, 2010

A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables.
Proceedings of the Information Security, 2010

Accelerating Inverse of GF(2n) with Precomputation.
Proceedings of the Information Security, 2010

Refinement of Miller's Algorithm Over Edwards Curves.
Proceedings of the Topics in Cryptology, 2010

2009
Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge.
Proceedings of the Information Security Practice and Experience, 2009

Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model.
Proceedings of the Computer Science, 2009

2008
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine.
I. J. Network Security, 2008

Analysis of bilinear pairing-based accumulator for identity escrowing.
IET Information Security, 2008

Novel Omega-protocols for NP.
Science in China Series F: Information Sciences, 2008

2007
Another Look at PMAC.
I. J. Network Security, 2007

Related-Mode Attacks on CTR Encryption Mode.
I. J. Network Security, 2007

Distributed Cryptographic Computing on Grid.
I. J. Network Security, 2007

An Interesting Member ID-based Group Signature.
IACR Cryptology ePrint Archive, 2007

Constructing parallel long-message signcryption scheme from trapdoor permutation.
Science in China Series F: Information Sciences, 2007

Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability.
Proceedings of the Advances in Cryptology, 2007

Unlinkable Randomizable Signature and Its Application in Group Signature.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Security on Generalized Feistel Scheme with SP Round Function.
I. J. Network Security, 2006

Security Analysis of Some Batch Verifying Signatures from Pairings.
I. J. Network Security, 2006

Cryptanalysis of two password authenticated key exchange protocols based on RSA.
IEEE Communications Letters, 2006

A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability.
IACR Cryptology ePrint Archive, 2006

Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption.
IACR Cryptology ePrint Archive, 2006

Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model.
IACR Cryptology ePrint Archive, 2006

Integrating Grid with Cryptographic Computing.
Proceedings of the Information Security Practice and Experience, 2006

Security Analysis of a Server-Aided RSA Key Generation Protocol.
Proceedings of the Information Security Practice and Experience, 2006

OPMAC: One-Key Poly1305 MAC.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

An Improved Poly1305 MAC.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Analyzing Unlinkability of Some Group Signatures.
IACR Cryptology ePrint Archive, 2005

A randomized RSA-based partially blind signature scheme for electronic cash.
Computers & Security, 2005

A Distributed Cryptographic Computing System.
Proceedings of the 2005 International Conference on Semantics, 2005

A Packet Marking Scheme for IP Traceback.
Proceedings of the Networking, 2005

Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

On Anonymity of Group Signatures.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A Variant of Poly1305 MAC and Its Security Proof.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

ID-Based Ring Authenticated Encryption.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Efficient ID-Based Deniable Authentication Protocol from Pairings.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Security on Generalized Feistel Scheme with SP Round Function.
IACR Cryptology ePrint Archive, 2004

The Internet accessible mathematical computation framework.
Science in China Series F: Information Sciences, 2004

Survey of Security in Grid Services.
Proceedings of the Fourth International Conference on Electronic Business, 2004

DisCAS: A Distributed-Parallel Computer Algebra System.
Proceedings of the Computational Science, 2004

Improved Privacy-Protecting Proxy Signature Scheme.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Security Analysis of User Efficient Blind Signatures.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2001
IAMC architecture and prototyping: a progress report.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001

1999
Object-oriented analysis of ELIMINO.
J. Comput. Sci. Technol., 1999

1993
Structure and properties of linear recurring m-arrays.
IEEE Trans. Information Theory, 1993

The Equivalence Classes of LR Arrays.
Discrete Applied Mathematics, 1993

Some Results on Theorem Proving in Geometry over Finite Fields.
Proceedings of the 1993 International Symposium on Symbolic and Algebraic Computation, 1993

1988
Linear Recurring m-Arrays.
Proceedings of the Advances in Cryptology, 1988


  Loading...