Dongdai Lin

According to our database1, Dongdai Lin authored at least 250 papers between 1988 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Refined analysis to the extended tower number field sieve.
Theor. Comput. Sci., 2020

A New Upper Bound on the Order of Affine Sub-families of NFSRs.
J. Syst. Sci. Complex., 2020

Longest subsequences shared by two de Bruijn sequences.
Des. Codes Cryptogr., 2020

Server-aided Revocable IBE with Identity Reuse.
Comput. J., 2020

2019
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach.
IEEE Trans. Inf. Theory, 2019

Two new families of quantum synchronizable codes.
Quantum Inf. Process., 2019

Speeding Up the GVW Algorithm via a Substituting Method.
J. Syst. Sci. Complex., 2019

A Note on Rotation Symmetric S-boxes.
J. Syst. Sci. Complex., 2019

On the Linear Complexity of Binary Generalized Cyclotomic Sequences of Period 2<i>p</i><sup><i>m</i>+1</sup><i>q</i><sup><i>n</i>+1</sup>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Cube Cryptanalysis of Round-Reduced ACORN.
IACR Cryptol. ePrint Arch., 2019

Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80.
IACR Cryptol. ePrint Arch., 2019

Generic Constructions of RIBE via Subset Difference Method.
IACR Cryptol. ePrint Arch., 2019

A Generic Construction of Revocable Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2019

Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions.
IACR Cryptol. ePrint Arch., 2019

Further results on complete permutation monomials over finite fields.
Finite Fields Their Appl., 2019

A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity.
Des. Codes Cryptogr., 2019

A new construction of zero-difference balanced functions and two applications.
Des. Codes Cryptogr., 2019

A recursive construction of permutation polynomials over F<sub>q<sup>2</sup></sub> with odd characteristic related to Rédei functions.
Des. Codes Cryptogr., 2019

Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019

On Stability of Multi-Valued Nonlinear Feedback Shift Registers.
Complexity, 2019

On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers.
Comput. J., 2019

Decomposition of nonlinear feedback shift registers based on Boolean networks.
Sci. China Inf. Sci., 2019

A Multi-Group Signature Scheme from Lattices.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Generic Constructions of Revocable Identity-Based Encryption.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure.
IEEE Trans. Inf. Theory, 2018

De Bruijn Sequences, Adjacency Graphs, and Cyclotomy.
IEEE Trans. Inf. Theory, 2018

Lower and Upper Bounds on the Density of Irreducible NFSRs.
IEEE Trans. Inf. Theory, 2018

Security evaluation on Simeck against zero-correlation linear cryptanalysis.
IET Information Security, 2018

Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.
IACR Cryptol. ePrint Arch., 2018

Unification of identifiers in the Sea-Cloud system.
Frontiers Comput. Sci., 2018

Fast construction of binary ring FCSRs for hardware stream ciphers.
Des. Codes Cryptogr., 2018

A class of three-weight and five-weight linear codes.
Discret. Appl. Math., 2018

Three new infinite families of bent functions.
Sci. China Inf. Sci., 2018

The lightest 4 × 4 MDS matrices over GL(4, 𝔽<sub>2</sub>).
Sci. China Inf. Sci., 2018

A Lightweight Multi-precision Squaring on Embedded Processors for ECC.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Lightweight FourQ Primitive on ARM Cortex-M0.
Proceedings of the 17th IEEE International Conference On Trust, 2018

PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK.
Proceedings of the Advances in Information and Computer Security, 2018

Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP.
Proceedings of the Information Security - 21st International Conference, 2018

Conditional Cube Searching and Applications on Trivium-Variant Ciphers.
Proceedings of the Information Security - 21st International Conference, 2018

Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Hierarchical Group Signatures with Verifier-Local Revocation.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Anonymous Identity-Based Encryption with Identity Recovery.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Direct Construction of Optimal Rotational-XOR Diffusion Primitives.
IACR Trans. Symmetric Cryptol., 2017

The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials.
IEEE Trans. Inf. Theory, 2017

Solving polynomial systems with noise over F<sub>2</sub>: Revisited.
Theor. Comput. Sci., 2017

Fault Attack on the Authenticated Cipher ACORN v2.
Security and Communication Networks, 2017

Linearization of multi-valued nonlinear feedback shift registers.
J. Syst. Sci. Complex., 2017

Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks.
Inf. Sci., 2017

Cheating prevention visual cryptography scheme using Latin square.
IET Information Security, 2017

Transition Mappings between De Bruijn Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Fault Attack on ACORN v3.
IACR Cryptol. ePrint Arch., 2017

Complete weight enumerators of two classes of linear codes.
Discret. Math., 2017

The adjacency graphs of some feedback shift registers.
Des. Codes Cryptogr., 2017

On affine sub-families of Grain-like structures.
Des. Codes Cryptogr., 2017

A Recursive Construction of Permutation Polynomials over F<sub>q<sup>2</sup></sub> with Odd Characteristic from Rédei Functions.
CoRR, 2017

On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers.
Sci. China Inf. Sci., 2017

A kind of three-weight linear codes.
Cryptogr. Commun., 2017

Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications.
Cryptogr. Commun., 2017

A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Refinement of the Four-Dimensional GLV Method on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Bounds and constructions for linear locally repairable codes over binary fields.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Cryptanalysis of Acorn in Nonce-Reuse Setting.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Driven Stability of Nonlinear Feedback Shift Registers With Inputs.
IEEE Trans. Communications, 2016

Generalized (identity-based) hash proof system and its applications.
Security and Communication Networks, 2016

On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra.
J. Syst. Sci. Complex., 2016

Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers.
J. Complex., 2016

Improvements on the Individual Logarithm Step in exTNFS.
IACR Cryptol. ePrint Arch., 2016

On the Division Property of SIMON48 and SIMON64.
IACR Cryptol. ePrint Arch., 2016

Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2016

An Algorithm for Counting the Number of 2<sup>n</sup>-Periodic Binary Sequences with Fixed k-Error Linear Complexity.
IACR Cryptol. ePrint Arch., 2016

Adjacency Graphs, Irreducible Polynomials and Cyclotomy.
IACR Cryptol. ePrint Arch., 2016

The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials.
IACR Cryptol. ePrint Arch., 2016

Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers.
IACR Cryptol. ePrint Arch., 2016

Cascade Ciphers Revisited: Indifferentiability Analysis.
IACR Cryptol. ePrint Arch., 2016

Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation.
IACR Cryptol. ePrint Arch., 2016

Classifying and generating exact coset representatives of PGL<sub>2</sub>(F<sub>q</sub>) in PGL<sub>2</sub>(F<sub>q<sup>2</sup></sub>).
Finite Fields Their Appl., 2016

An improvement over the GVW algorithm for inhomogeneous polynomial systems.
Finite Fields Their Appl., 2016

Generic constructions of integrated PKE and PEKS.
Des. Codes Cryptogr., 2016

Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour.
Des. Codes Cryptogr., 2016

Stability of nonlinear feedback shift registers.
Sci. China Inf. Sci., 2016

Generalized cyclotomic numbers of order two and their applications.
Cryptogr. Commun., 2016

Linear complexity of Ding-Helleseth sequences of order 2 over GF(l).
Cryptogr. Commun., 2016

Further results on the nonlinearity of maximum-length NFSR feedbacks.
Cryptogr. Commun., 2016

The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity.
Proceedings of the Information Security Practice and Experience, 2016

Two classes of (r, t)-locally repairable codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Robust face image alignment using structural priors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2016

Stability of multi-valued nonlinear feedback shift registers.
Proceedings of the IEEE International Conference on Information and Automation, 2016

The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Generalized Hamming Weights of Irreducible Cyclic Codes.
IEEE Trans. Inf. Theory, 2015

Robust Face Clustering Via Tensor Decomposition.
IEEE Trans. Cybern., 2015

Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle.
J. Comput. Sci. Technol., 2015

A new linearization method for nonlinear feedback shift registers.
J. Comput. Syst. Sci., 2015

VFA: A Variable-Factor Authentication Framework for Mobile Users.
J. Commun., 2015

Linear complexity of binary generalized cyclotomic sequences over GF(q).
J. Complex., 2015

On the LFSRization of a Class of FCSR Automata.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers.
IACR Cryptol. ePrint Arch., 2015

Construction of Transition Matrices for Binary FCSRs.
IACR Cryptol. ePrint Arch., 2015

De Bruijn Sequences from Symmetric Shift Registers.
IACR Cryptol. ePrint Arch., 2015

De Bruijn Sequences from Nonlinear Feedback Shift Registers.
IACR Cryptol. ePrint Arch., 2015

A Group-theory Method to The Cycle Structures of Feedback Shift Registers.
IACR Cryptol. ePrint Arch., 2015

A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers.
IACR Cryptol. ePrint Arch., 2015

Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers.
IACR Cryptol. ePrint Arch., 2015

A new encryption scheme for surveillance videos.
Frontiers Comput. Sci., 2015

On constructing complete permutation polynomials over finite fields of even characteristic.
Discret. Appl. Math., 2015

A Class of Linear Codes With Three Weights.
CoRR, 2015

Survey on cyberspace security.
Sci. China Inf. Sci., 2015

RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms.
Sci. China Inf. Sci., 2015

Bayesian mechanism for rational secret sharing scheme.
Sci. China Inf. Sci., 2015

Improved domain extender for the ideal cipher.
Cryptogr. Commun., 2015

On implementing signature-based Gröbner basis algorithms using linear algebraic routines from M4RI.
ACM Commun. Comput. Algebra, 2015

Towards Optimal Bounds for Implicit Factorization Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

A New Construction of Tagged Visual Cryptography Scheme.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Estimating Differential-Linear Distinguishers and Applications to CTC2.
Proceedings of the Information Security Practice and Experience, 2015

Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI.
Proceedings of the Information Security Practice and Experience, 2015

Fault Attacks on Stream Cipher Scream.
Proceedings of the Information Security Practice and Experience, 2015

Constructing Boolean functions with (potentially) optimal algebraic immunity based on multiplicative decompositions of finite fields.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On the dual of generalized Boolean bent functions over ℤ4.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Construction of cubic rotation symmetric bent functions in power-of-two variables.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Searching cubes for testing Boolean functions and its application to Trivium.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract).
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015

Solving Linear Equations Modulo Unknown Divisors: Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers.
IEEE Trans. Inf. Theory, 2014

Symmetry Constraint for Foreground Extraction.
IEEE Trans. Cybern., 2014

On the Nonlinearity and Correlation Immunity of Two Classes of Boolean Functions.
Int. J. Software and Informatics, 2014

Minimum Linear Complexity Approximation of Sequences with Period <i>q<sup>n</sup></i>-1 over F<sub><i>q</i></sub>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Generalized Fourier Transform and the Joint <i>N</i>-Adic Complexity of a Multisequence.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

On the Linear Complexity of Legendre Sequences Over F<i><sub>q</sub></i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

On the Linear Complexity of New Modified Jacobi Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms.
IACR Cryptol. ePrint Arch., 2014

New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications.
IACR Cryptol. ePrint Arch., 2014

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof.
IACR Cryptol. ePrint Arch., 2014

A Class of FSRs and Their Adjacency Graphs.
IACR Cryptol. ePrint Arch., 2014

Solving Polynomial Systems with Noise over F_2: Revisited.
IACR Cryptol. ePrint Arch., 2014

On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation.
IACR Cryptol. ePrint Arch., 2014

On the immunity of rotation symmetric Boolean functions against fast algebraic attacks.
Discret. Appl. Math., 2014

Constructing Boolean Functions With Potential Optimal Algebraic Immunity Based on Additive Decompositions of Finite Fields.
CoRR, 2014

A Monomial-Oriented GVW for Computing Gröbner Bases.
CoRR, 2014

An Improvement over the GVW Algorithm for Inhomogeneous Polynomial Systems.
CoRR, 2014

On the distinctness of binary sequences derived from $2$-adic expansion of m-sequences over finite prime fields.
CoRR, 2014

On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method.
CoRR, 2014

CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System.
Comput. J., 2014

Defending Blind DDoS Attack on SDN Based on Moving Target Defense.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract).
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Almost perfect algebraic immune functions with good nonlinearity.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Optional multi-biometric cryptosystem based on fuzzy extractor.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
A method for counting the number of polynomial equivalence classes.
J. Mathematical Cryptology, 2013

Distinguishing Attacks on RC4 and A New Improvement of the Cipher.
IACR Cryptol. ePrint Arch., 2013

L-P States of RC4 Stream Cipher.
IACR Cryptol. ePrint Arch., 2013

CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems.
IACR Cryptol. ePrint Arch., 2013

New constructions of quaternary bent functions.
CoRR, 2013

Improved bounds for the implicit factorization problem.
Adv. Math. Commun., 2013

Some New Weaknesses in the RC4 Stream Cipher.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method.
Proceedings of the Network and System Security - 7th International Conference, 2013

Robust Tensor Clustering with Non-Greedy Maximization.
Proceedings of the IJCAI 2013, 2013

Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Near Collision Attack on the Grain v1 Stream Cipher.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Omega Pairing on Hyperelliptic Curves.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
On Efficient Pairings on Elliptic Curves over Extension Fields.
IACR Cryptol. ePrint Arch., 2012

On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation.
IACR Cryptol. ePrint Arch., 2012

Perfect Algebraic Immune Functions.
IACR Cryptol. ePrint Arch., 2012

Integrated PKE and PEKS - Stronger Security Notions and New Constructions.
IACR Cryptol. ePrint Arch., 2012

Ergodic theory over F<sub>2</sub>[[T]].
Finite Fields Their Appl., 2012

On enumeration of polynomial equivalence classes and their application to MPKC.
Finite Fields Their Appl., 2012

Linear Weaknesses in T-functions.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Anonymous Identity-Based Hash Proof System and Its Applications.
Proceedings of the Provable Security - 6th International Conference, 2012

Stronger Security Model for Public-Key Encryption with Equality Test.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

An Improved Twisted Ate Pairing over KSS Curves with k = 18.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Analysis of Optimum Pairing Products at High Security Levels.
Proceedings of the Progress in Cryptology, 2012

Cube Cryptanalysis of LBlock with Noisy Leakage.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Fast Evaluation of T-Functions via Time-Memory Trade-Offs.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Identity-Based Extractable Hash Proofs and Their Applications.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions.
IEEE Trans. Inf. Theory, 2011

On the nonexistence of Bent Functions.
Int. J. Found. Comput. Sci., 2011

ECDLP on GPU.
IACR Cryptol. ePrint Arch., 2011

Ergodic Theory Over F<sub>2[[T]]</sub>.
IACR Cryptol. ePrint Arch., 2011

Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge.
IACR Cryptol. ePrint Arch., 2011

Linear Relation on General Ergodic T-Function
CoRR, 2011

Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

A universal distributed model for password cracking.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

The Initialization Stage Analysis of ZUC v1.5.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Attacking Bivium and Trivium with the Characteristic Set Method.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A two-round honest-verifier zero-knowledge protocol.
Sci. China Inf. Sci., 2010

A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables.
Proceedings of the Information Security, 2010

Accelerating Inverse of <i>GF</i>(2<sup><i>n</i></sup>) with Precomputation.
Proceedings of the Information Security, 2010

Refinement of Miller's Algorithm Over Edwards Curves.
Proceedings of the Topics in Cryptology, 2010

2009
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
CoRR, 2009

Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge.
Proceedings of the Information Security Practice and Experience, 2009

Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model.
Proceedings of the Computer Science, 2009

2008
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine.
I. J. Network Security, 2008

Analysis of bilinear pairing-based accumulator for identity escrowing.
IET Information Security, 2008

Novel Omega-protocols for NP.
Sci. China Ser. F Inf. Sci., 2008

2007
Another Look at PMAC.
I. J. Network Security, 2007

Related-Mode Attacks on CTR Encryption Mode.
I. J. Network Security, 2007

Distributed Cryptographic Computing on Grid.
I. J. Network Security, 2007

Unlinkable Randomizable Signature and Its Application in Group Signature.
IACR Cryptol. ePrint Arch., 2007

An Interesting Member ID-based Group Signature.
IACR Cryptol. ePrint Arch., 2007

Constructing parallel long-message signcryption scheme from trapdoor permutation.
Sci. China Ser. F Inf. Sci., 2007

Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability.
Proceedings of the Advances in Cryptology, 2007

Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Security on Generalized Feistel Scheme with SP Round Function.
I. J. Network Security, 2006

Security Analysis of Some Batch Verifying Signatures from Pairings.
I. J. Network Security, 2006

Cryptanalysis of two password authenticated key exchange protocols based on RSA.
IEEE Communications Letters, 2006

Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps.
IACR Cryptol. ePrint Arch., 2006

A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability.
IACR Cryptol. ePrint Arch., 2006

Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption.
IACR Cryptol. ePrint Arch., 2006

Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model.
IACR Cryptol. ePrint Arch., 2006

Integrating Grid with Cryptographic Computing.
Proceedings of the Information Security Practice and Experience, 2006

Security Analysis of a Server-Aided RSA Key Generation Protocol.
Proceedings of the Information Security Practice and Experience, 2006

OPMAC: One-Key Poly1305 MAC.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

An Improved Poly1305 MAC.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
On Anonymity of Group Signatures.
IACR Cryptol. ePrint Arch., 2005

Analyzing Unlinkability of Some Group Signatures.
IACR Cryptol. ePrint Arch., 2005

A randomized RSA-based partially blind signature scheme for electronic cash.
Comput. Secur., 2005

A Distributed Cryptographic Computing System.
Proceedings of the 2005 International Conference on Semantics, 2005

A Packet Marking Scheme for IP Traceback.
Proceedings of the Networking, 2005

Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

A Variant of Poly1305 MAC and Its Security Proof.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

ID-Based Ring Authenticated Encryption.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Efficient ID-Based Deniable Authentication Protocol from Pairings.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
The Internet accessible mathematical computation framework.
Sci. China Ser. F Inf. Sci., 2004

Survey of Security in Grid Services.
Proceedings of the Fourth International Conference on Electronic Business, 2004

DisCAS: A Distributed-Parallel Computer Algebra System.
Proceedings of the Computational Science, 2004

Improved Privacy-Protecting Proxy Signature Scheme.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Security Analysis of User Efficient Blind Signatures.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2001
IAMC architecture and prototyping: a progress report.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001

1999
Object-oriented analysis of ELIMINO.
J. Comput. Sci. Technol., 1999

1993
Structure and properties of linear recurring m-arrays.
IEEE Trans. Inf. Theory, 1993

The Equivalence Classes of LR Arrays.
Discret. Appl. Math., 1993

Some Results on Theorem Proving in Geometry over Finite Fields.
Proceedings of the 1993 International Symposium on Symbolic and Algebraic Computation, 1993

1988
Linear Recurring m-Arrays.
Proceedings of the Advances in Cryptology, 1988


  Loading...