BibTeX records: Dongdai Lin

download as .bib file

@article{DBLP:journals/cj/WangLLM23,
  author       = {Shichang Wang and
                  Meicheng Liu and
                  Dongdai Lin and
                  Li Ma},
  title        = {On Grain-Like Small State Stream Ciphers Against Fast Correlation
                  Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {6},
  pages        = {1376--1399},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac016},
  doi          = {10.1093/COMJNL/BXAC016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangLLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/XuWL23,
  author       = {Yaqi Xu and
                  Baofeng Wu and
                  Dongdai Lin},
  title        = {New Strategies To Improve Differential-Linear Attacks With Applications
                  To Chaskey},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {9},
  pages        = {2279--2295},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac076},
  doi          = {10.1093/COMJNL/BXAC076},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/XuWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiJL23,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {Properties of the cycles that contain all vectors of weight {\textdollar}{\textbackslash}le
                  k{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {221--239},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01100-9},
  doi          = {10.1007/S10623-022-01100-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/LiWL23,
  author       = {Zhengnan Li and
                  Baofeng Wu and
                  Dongdai Lin},
  title        = {Algebraic-Differential Attacks on a Family of Arithmetization-Oriented
                  Symmetric Ciphers},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {36},
  number       = {6},
  pages        = {2681--2702},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11424-023-1511-7},
  doi          = {10.1007/S11424-023-1511-7},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jossac/LiWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/XuDWL23,
  author       = {Luyao Xu and
                  Zhengyi Dai and
                  Baofeng Wu and
                  Dongdai Lin},
  title        = {Improved Attacks on {(EC)DSA} with Nonce Leakage by Lattice Sieving
                  with Predicate},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {568--586},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.568-586},
  doi          = {10.46586/TCHES.V2023.I2.568-586},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/XuDWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLCWTL23,
  author       = {Wenhao Wang and
                  Weijie Liu and
                  Hongbo Chen and
                  XiaoFeng Wang and
                  Hongliang Tian and
                  Dongdai Lin},
  title        = {Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting
                  In-Enclave Services},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {522--538},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2021.3138427},
  doi          = {10.1109/TDSC.2021.3138427},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangLCWTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiL23,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {Partial Cycle Structure of FSRs and Its Applications in Searching
                  De Bruijn Sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {1},
  pages        = {598--609},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2022.3201519},
  doi          = {10.1109/TIT.2022.3201519},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JiangLL23,
  author       = {Yupeng Jiang and
                  Ming Li and
                  Dongdai Lin},
  title        = {Proofs of Conjectures on Extremal Weight De Bruijn Sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {8},
  pages        = {5357--5363},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2023.3263532},
  doi          = {10.1109/TIT.2023.3263532},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/JiangLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangLHL23,
  author       = {Shichang Wang and
                  Meicheng Liu and
                  Shiqi Hou and
                  Dongdai Lin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Moving a Step of ChaCha in Syncopated Rhythm},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {273--304},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_10},
  doi          = {10.1007/978-3-031-38548-3\_10},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WangLHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GuoWL23,
  author       = {Chun Guo and
                  Lei Wang and
                  Dongdai Lin},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Impossibility of Indifferentiable Iterated Blockciphers from 3 or
                  Less Primitive Calls},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {408--439},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_14},
  doi          = {10.1007/978-3-031-30634-1\_14},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GuoWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiZL23,
  author       = {Shuaishuai Li and
                  Cong Zhang and
                  Dongdai Lin},
  editor       = {Ding Wang and
                  Moti Yung and
                  Zheli Liu and
                  Xiaofeng Chen},
  title        = {Oblivious Transfer from Rerandomizable {PKE}},
  booktitle    = {Information and Communications Security - 25th International Conference,
                  {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  pages        = {128--145},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7356-9\_8},
  doi          = {10.1007/978-981-99-7356-9\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangLDL23,
  author       = {Cong Zhang and
                  Weiran Liu and
                  Bolin Ding and
                  Dongdai Lin},
  editor       = {Ding Wang and
                  Moti Yung and
                  Zheli Liu and
                  Xiaofeng Chen},
  title        = {Efficient Private Multiset {ID} Protocols},
  booktitle    = {Information and Communications Security - 25th International Conference,
                  {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  pages        = {351--369},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7356-9\_21},
  doi          = {10.1007/978-981-99-7356-9\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangLDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Zhang0LZL23,
  author       = {Cong Zhang and
                  Yu Chen and
                  Weiran Liu and
                  Min Zhang and
                  Dongdai Lin},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Linear Private Set Union from Multi-Query Reverse Private Membership
                  Test},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {337--354},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-cong},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Zhang0LZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoWL23,
  author       = {Chun Guo and
                  Lei Wang and
                  Dongdai Lin},
  title        = {Impossibility of Indifferentiable Iterated Blockciphers from 3 or
                  Less Primitive Calls},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/226},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLDL23,
  author       = {Cong Zhang and
                  Weiran Liu and
                  Bolin Ding and
                  Dongdai Lin},
  title        = {Efficient Private Multiset {ID} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/986},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiZL23,
  author       = {Shuaishuai Li and
                  Cong Zhang and
                  Dongdai Lin},
  title        = {Oblivious Transfer from Rerandomizable {PKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1002},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1002},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangLHL23,
  author       = {Shichang Wang and
                  Meicheng Liu and
                  Shiqi Hou and
                  Dongdai Lin},
  title        = {Moving a Step of ChaCha in Syncopated Rhythm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1087},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1087},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangLHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLPZGLZLH23,
  author       = {Shuaishuai Li and
                  Weiran Liu and
                  Liqiang Peng and
                  Cong Zhang and
                  Xinwei Gao and
                  Aiping Liang and
                  Lei Zhang and
                  Dongdai Lin and
                  Yuan Hong},
  title        = {Encode and Permute that Database! Single-Server Private Information
                  Retrieval with Constant Online Time, Communication, and Client-Side
                  Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1619},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1619},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLPZGLZLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZL23,
  author       = {Xianghan Wang and
                  Jianghua Zhong and
                  Dongdai Lin},
  title        = {Cycle Structure and Observability of Two Types of Galois NFSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1847},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1847},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HouLL22,
  author       = {Lin Hou and
                  Dongdai Lin and
                  Renzhang Liu},
  title        = {Hierarchical group signature with verifier-local revocation revisited},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {8},
  pages        = {1--3},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-019-2709-7},
  doi          = {10.1007/S11432-019-2709-7},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HouLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/KongZL22,
  author       = {Wenhui Kong and
                  Jianghua Zhong and
                  Dongdai Lin},
  title        = {Observability of Galois nonlinear feedback shift registers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {9},
  pages        = {1--16},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-021-3346-6},
  doi          = {10.1007/S11432-021-3346-6},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/KongZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/LuLLL22,
  author       = {Xiaojuan Lu and
                  Bohan Li and
                  Meicheng Liu and
                  Dongdai Lin},
  title        = {Improved conditional differential attacks on lightweight hash family
                  {QUARK}},
  journal      = {Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {12},
  year         = {2022},
  url          = {https://doi.org/10.1186/s42400-021-00108-3},
  doi          = {10.1186/S42400-021-00108-3},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/LuLLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiL22,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {The Adjacency Graphs of FSRs With Affine Characteristic Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {1},
  pages        = {649--658},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2021.3120841},
  doi          = {10.1109/TIT.2021.3120841},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangLL22,
  author       = {Cong Zhang and
                  Shuaishuai Li and
                  Dongdai Lin},
  editor       = {Yi Deng and
                  Moti Yung},
  title        = {Amortizing Division and Exponentiation},
  booktitle    = {Information Security and Cryptology - 18th International Conference,
                  Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13837},
  pages        = {192--210},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26553-2\_10},
  doi          = {10.1007/978-3-031-26553-2\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiWL22,
  author       = {Chenmeng Li and
                  Baofeng Wu and
                  Dongdai Lin},
  editor       = {Yi Deng and
                  Moti Yung},
  title        = {Generalized Boomerang Connectivity Table and Improved Cryptanalysis
                  of {GIFT}},
  booktitle    = {Information Security and Cryptology - 18th International Conference,
                  Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13837},
  pages        = {213--233},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26553-2\_11},
  doi          = {10.1007/978-3-031-26553-2\_11},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LiWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangLLL22,
  author       = {Lulu Zhang and
                  Meicheng Liu and
                  Shuaishuai Li and
                  Dongdai Lin},
  editor       = {Yi Deng and
                  Moti Yung},
  title        = {Cryptanalysis of Ciminion},
  booktitle    = {Information Security and Cryptology - 18th International Conference,
                  Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13837},
  pages        = {234--251},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26553-2\_12},
  doi          = {10.1007/978-3-031-26553-2\_12},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangLLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiZL22,
  author       = {Bohan Li and
                  Hailong Zhang and
                  Dongdai Lin},
  editor       = {Yi Deng and
                  Moti Yung},
  title        = {Higher-Order Masking Scheme for Trivium Hardware Implementation},
  booktitle    = {Information Security and Cryptology - 18th International Conference,
                  Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13837},
  pages        = {337--356},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26553-2\_18},
  doi          = {10.1007/978-3-031-26553-2\_18},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LiZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/PanZL22,
  author       = {Yingyin Pan and
                  Jianghua Zhong and
                  Dongdai Lin},
  title        = {Nonsingularity of Galois Nonlinear Feedback Shift Registers},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2022,
                  Espoo, Finland, June 26 - July 1, 2022},
  pages        = {366--371},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISIT50566.2022.9834495},
  doi          = {10.1109/ISIT50566.2022.9834495},
  timestamp    = {Mon, 08 Aug 2022 16:44:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/PanZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/YangQJFL22,
  author       = {Minghui Yang and
                  Shiyuan Qiang and
                  Xiaoyan Jing and
                  Keqin Feng and
                  Dongdai Lin},
  title        = {The 4-Adic Complexity of Quaternary Sequences of Even Period With
                  Ideal Autocorrelation},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2022,
                  Espoo, Finland, June 26 - July 1, 2022},
  pages        = {528--531},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISIT50566.2022.9834582},
  doi          = {10.1109/ISIT50566.2022.9834582},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/YangQJFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-1,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3},
  doi          = {10.1007/978-3-031-22963-3},
  isbn         = {978-3-031-22962-6},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-2,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4},
  doi          = {10.1007/978-3-031-22966-4},
  isbn         = {978-3-031-22965-7},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-3,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5},
  doi          = {10.1007/978-3-031-22969-5},
  isbn         = {978-3-031-22968-8},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-4,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5},
  doi          = {10.1007/978-3-031-22972-5},
  isbn         = {978-3-031-22971-8},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangCLZL22,
  author       = {Cong Zhang and
                  Yu Chen and
                  Weiran Liu and
                  Min Zhang and
                  Dongdai Lin},
  title        = {Optimal Private Set Union from Multi-Query Reverse Private Membership
                  Test},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/358},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangCLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/HuLZ21,
  author       = {Zhi Hu and
                  Dongdai Lin and
                  Chang{-}An Zhao},
  title        = {Fast scalar multiplication of degenerate divisors for hyperelliptic
                  curve cryptosystems},
  journal      = {Appl. Math. Comput.},
  volume       = {404},
  pages        = {126239},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.amc.2021.126239},
  doi          = {10.1016/J.AMC.2021.126239},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/HuLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/WangWHL21,
  author       = {Xuzi Wang and
                  Baofeng Wu and
                  Lin Hou and
                  Dongdai Lin},
  title        = {Searching for impossible subspace trails and improved impossible differential
                  characteristics for SIMON-like block ciphers},
  journal      = {Cybersecur.},
  volume       = {4},
  number       = {1},
  pages        = {17},
  year         = {2021},
  url          = {https://doi.org/10.1186/s42400-021-00081-x},
  doi          = {10.1186/S42400-021-00081-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/WangWHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/HuangSL21,
  author       = {Zhenyu Huang and
                  Yao Sun and
                  Dongdai Lin},
  title        = {Analyzing Boolean Functions via Solving Parametric Polynomial Systems},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {34},
  number       = {2},
  pages        = {792--808},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11424-020-9209-6},
  doi          = {10.1007/S11424-020-9209-6},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jossac/HuangSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/HuangSL21,
  author       = {Zhenyu Huang and
                  Yao Sun and
                  Dongdai Lin},
  title        = {On the efficiency of solving Boolean polynomial systems with the characteristic
                  set method},
  journal      = {J. Symb. Comput.},
  volume       = {103},
  pages        = {66--94},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jsc.2019.11.001},
  doi          = {10.1016/J.JSC.2019.11.001},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/HuangSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiL21,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {Efficient Construction of Cross-Join Pairs in a Product of Primitive
                  Polynomials of Pairwise-Coprime Degrees},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {10},
  pages        = {6940--6951},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3102523},
  doi          = {10.1109/TIT.2021.3102523},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/LiL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangHLL21,
  author       = {Shichang Wang and
                  Shiqi Hou and
                  Meicheng Liu and
                  Dongdai Lin},
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {Differential-Linear Cryptanalysis of the Lightweight Crytographic
                  Algorithm {KNOT}},
  booktitle    = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  pages        = {171--190},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2\_9},
  doi          = {10.1007/978-3-030-88323-2\_9},
  timestamp    = {Tue, 19 Oct 2021 18:32:12 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangHLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KongZL21,
  author       = {Wenhui Kong and
                  Jianghua Zhong and
                  Dongdai Lin},
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {Isomorphism and Equivalence of Galois Nonlinear Feedback Shift Registers},
  booktitle    = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  pages        = {301--315},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2\_16},
  doi          = {10.1007/978-3-030-88323-2\_16},
  timestamp    = {Tue, 19 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KongZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhengJLQ21,
  author       = {Qun{-}Xiong Zheng and
                  Yupeng Jiang and
                  Dongdai Lin and
                  Wen{-}Feng Qi},
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {Binary Sequences Derived from Monomial Permutation Polynomials over
                  GF(2\({}^{\mbox{p}}\))},
  booktitle    = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  pages        = {371--383},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2\_20},
  doi          = {10.1007/978-3-030-88323-2\_20},
  timestamp    = {Tue, 19 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhengJLQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuLL21,
  author       = {Meicheng Liu and
                  Xiaojuan Lu and
                  Dongdai Lin},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Differential-Linear Cryptanalysis from an Algebraic Perspective},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {247--277},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_9},
  doi          = {10.1007/978-3-030-84252-9\_9},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XuWL21,
  author       = {Yaqi Xu and
                  Baofeng Wu and
                  Dongdai Lin},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Rotational-Linear Attack: {A} New Framework of Cryptanalysis on {ARX}
                  Ciphers with Applications to Chaskey},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12919},
  pages        = {192--209},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88052-1\_12},
  doi          = {10.1007/978-3-030-88052-1\_12},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/XuWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LiJL21,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {Construction of De Bruijn Sequences from l-sequences},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2021,
                  Melbourne, Australia, July 12-20, 2021},
  pages        = {1522--1527},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIT45174.2021.9517782},
  doi          = {10.1109/ISIT45174.2021.9517782},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/LiJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/YangQFL21,
  author       = {Minghui Yang and
                  Shiyuan Qiang and
                  Keqin Feng and
                  Dongdai Lin},
  title        = {On the 4-Adic Complexity of Quaternary Sequences of Period {\textdollar}2p{\textdollar}
                  with Ideal Autocorrelation},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2021,
                  Melbourne, Australia, July 12-20, 2021},
  pages        = {1812--1816},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIT45174.2021.9518210},
  doi          = {10.1109/ISIT45174.2021.9518210},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/YangQFL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/PanZL21,
  author       = {Yingyin Pan and
                  Jianghua Zhong and
                  Dongdai Lin},
  title        = {On Galois NFSRs with Terminal Bits},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2021,
                  Melbourne, Australia, July 12-20, 2021},
  pages        = {3062--3067},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIT45174.2021.9517929},
  doi          = {10.1109/ISIT45174.2021.9517929},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/PanZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/LuLWL21,
  author       = {Xiaojuan Lu and
                  Bohan Li and
                  Shichang Wang and
                  Dongdai Lin},
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Conditional Differential Cryptanalysis on Bagua},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  pages        = {178--189},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-17510-7\_13},
  doi          = {10.1007/978-3-031-17510-7\_13},
  timestamp    = {Fri, 21 Oct 2022 16:47:32 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/LuLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-03574,
  author       = {Minghui Yang and
                  Shiyuan Qiang and
                  Xiaoyan Jing and
                  Keqin Feng and
                  Dongdai Lin},
  title        = {On the 4-Adic Complexity of Quaternary Sequences with Ideal Autocorrelation},
  journal      = {CoRR},
  volume       = {abs/2107.03574},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.03574},
  eprinttype    = {arXiv},
  eprint       = {2107.03574},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-03574.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhongPKL21,
  author       = {Jianghua Zhong and
                  Yingyin Pan and
                  Wenhui Kong and
                  Dongdai Lin},
  title        = {Necessary and Sufficient Conditions for Galois NFSRs Equivalent to
                  Fibonacci Ones and Their Application to the Stream Cipher Trivium},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/928},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhongPKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanZL21,
  author       = {Yingyin Pan and
                  Jianghua Zhong and
                  Dongdai Lin},
  title        = {On the Nonsingularity and Equivalence of NFSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1062},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1062},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuWL21,
  author       = {Yaqi Xu and
                  Baofeng Wu and
                  Dongdai Lin},
  title        = {Rotational-Linear Attack: {A} New Framework of Cryptanalysis on {ARX}
                  ciphers with Applications to Chaskey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1690},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1690},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/XuWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MaL20,
  author       = {Xuecheng Ma and
                  Dongdai Lin},
  title        = {Server-aided Revocable {IBE} with Identity Reuse},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {4},
  pages        = {620--632},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz114},
  doi          = {10.1093/COMJNL/BXZ114},
  timestamp    = {Wed, 10 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MaL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiangL20,
  author       = {Yupeng Jiang and
                  Dongdai Lin},
  title        = {Longest subsequences shared by two de Bruijn sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1463--1475},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00759-2},
  doi          = {10.1007/S10623-020-00759-2},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiangL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/GaoLLW20,
  author       = {Guangpu Gao and
                  Dongdai Lin and
                  Wenfen Liu and
                  Yongjuan Wang},
  title        = {Composition of Boolean functions: An application to the secondary
                  constructions of bent functions},
  journal      = {Discret. Math.},
  volume       = {343},
  number       = {3},
  pages        = {111711},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.disc.2019.111711},
  doi          = {10.1016/J.DISC.2019.111711},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dm/GaoLLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/LiuZL20,
  author       = {Junying Liu and
                  Qunxiong Zheng and
                  Dongdai Lin},
  title        = {A New Upper Bound on the Order of Affine Sub-families of NFSRs},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {33},
  number       = {1},
  pages        = {196--214},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11424-019-8072-9},
  doi          = {10.1007/S11424-019-8072-9},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/LiuZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/LiLL20,
  author       = {Bohan Li and
                  Meicheng Liu and
                  Dongdai Lin},
  title        = {{FPGA} implementations of Grain v1, Mickey 2.0, Trivium, Lizard and
                  Plantlet},
  journal      = {Microprocess. Microsystems},
  volume       = {78},
  pages        = {103210},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.micpro.2020.103210},
  doi          = {10.1016/J.MICPRO.2020.103210},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/LiLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhuWZLL20,
  author       = {Yuqing Zhu and
                  Jiejing Wen and
                  Jincheng Zhuang and
                  Chang Lv and
                  Dongdai Lin},
  title        = {Refined analysis to the extended tower number field sieve},
  journal      = {Theor. Comput. Sci.},
  volume       = {814},
  pages        = {49--68},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.01.010},
  doi          = {10.1016/J.TCS.2020.01.010},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhuWZLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiJL20,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin},
  editor       = {Yongdong Wu and
                  Moti Yung},
  title        = {On the k-Error Linear Complexities of De Bruijn Sequences},
  booktitle    = {Information Security and Cryptology - 16th International Conference,
                  Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12612},
  pages        = {344--356},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-71852-7\_23},
  doi          = {10.1007/978-3-030-71852-7\_23},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LiJL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhongPL20,
  author       = {Jianghua Zhong and
                  Yingyin Pan and
                  Dongdai Lin},
  editor       = {Yongdong Wu and
                  Moti Yung},
  title        = {On Galois NFSRs Equivalent to Fibonacci Ones},
  booktitle    = {Information Security and Cryptology - 16th International Conference,
                  Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12612},
  pages        = {433--449},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-71852-7\_29},
  doi          = {10.1007/978-3-030-71852-7\_29},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhongPL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/0033JL20,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {The Numbers of De Bruijn Sequences in Extremal Weight Classes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2020,
                  Los Angeles, CA, USA, June 21-26, 2020},
  pages        = {2909--2914},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISIT44484.2020.9174413},
  doi          = {10.1109/ISIT44484.2020.9174413},
  timestamp    = {Tue, 15 Sep 2020 10:18:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/0033JL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhongL19,
  author       = {Jianghua Zhong and
                  Dongdai Lin},
  title        = {Decomposition of nonlinear feedback shift registers based on Boolean
                  networks},
  journal      = {Sci. China Inf. Sci.},
  volume       = {62},
  number       = {3},
  pages        = {39110:1--39110:3},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11432-017-9460-4},
  doi          = {10.1007/S11432-017-9460-4},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhongL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhongL19,
  author       = {Jianghua Zhong and
                  Dongdai Lin},
  title        = {On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift
                  Registers},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {12},
  pages        = {1793--1804},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz057},
  doi          = {10.1093/COMJNL/BXZ057},
  timestamp    = {Thu, 09 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhongL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/WangLCLZLWM19,
  author       = {Haiyan Wang and
                  Qiuzhen Lin and
                  Jianyong Chen and
                  Jianqiang Li and
                  Jianghua Zhong and
                  Dongdai Lin and
                  Jia Wang and
                  Lijia Ma},
  title        = {On Stability of Multi-Valued Nonlinear Feedback Shift Registers},
  journal      = {Complex.},
  volume       = {2019},
  pages        = {8765970:1--8765970:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8765970},
  doi          = {10.1155/2019/8765970},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/WangLCLZLWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhuZYLL19,
  author       = {Yuqing Zhu and
                  Jincheng Zhuang and
                  Hairong Yi and
                  Chang Lv and
                  Dongdai Lin},
  title        = {A variant of the Galbraith-Ruprai algorithm for discrete logarithms
                  with improved complexity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {971--986},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0492-3},
  doi          = {10.1007/S10623-018-0492-3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhuZYLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FuFLW19,
  author       = {Shihui Fu and
                  Xiutao Feng and
                  Dongdai Lin and
                  Qiang Wang},
  title        = {A recursive construction of permutation polynomials over F\({}_{\mbox{q\({}^{\mbox{2}}\)}}\)
                  with odd characteristic related to R{\'{e}}dei functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1481--1498},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0548-4},
  doi          = {10.1007/S10623-018-0548-4},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FuFLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuJZL19,
  author       = {Junying Liu and
                  Yupeng Jiang and
                  Qunxiong Zheng and
                  Dongdai Lin},
  title        = {A new construction of zero-difference balanced functions and two applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2251--2265},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00616-x},
  doi          = {10.1007/S10623-019-00616-X},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuJZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/FengLWW19,
  author       = {Xiutao Feng and
                  Dongdai Lin and
                  Li{-}Ping Wang and
                  Qiang Wang},
  title        = {Further results on complete permutation monomials over finite fields},
  journal      = {Finite Fields Their Appl.},
  volume       = {57},
  pages        = {47--59},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ffa.2019.01.003},
  doi          = {10.1016/J.FFA.2019.01.003},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/FengLWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YangLWG19,
  author       = {Minghui Yang and
                  Dongdai Lin and
                  Qiuyan Wang and
                  Jian Gao},
  title        = {On the Linear Complexity of Binary Generalized Cyclotomic Sequences
                  of Period 2\emph{p}\({}^{\mbox{\emph{m}+1}}\)\emph{q}\({}^{\mbox{\emph{n}+1}}\)},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {4},
  pages        = {676--679},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.676},
  doi          = {10.1587/TRANSFUN.E102.A.676},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/YangLWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/LiSHWL19,
  author       = {Ting Li and
                  Yao Sun and
                  Zhenyu Huang and
                  Dingkang Wang and
                  Dongdai Lin},
  title        = {Speeding Up the {GVW} Algorithm via a Substituting Method},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {32},
  number       = {1},
  pages        = {205--233},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11424-019-8345-3},
  doi          = {10.1007/S11424-019-8345-3},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jossac/LiSHWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/GaoLL19,
  author       = {Guangpu Gao and
                  Dongdai Lin and
                  Wenfen Liu},
  title        = {A Note on Rotation Symmetric S-boxes},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {32},
  number       = {5},
  pages        = {1460--1472},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11424-019-7263-8},
  doi          = {10.1007/S11424-019-7263-8},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/GaoLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LuoML19,
  author       = {Lan Luo and
                  Zhi Ma and
                  Dongdai Lin},
  title        = {Two new families of quantum synchronizable codes},
  journal      = {Quantum Inf. Process.},
  volume       = {18},
  number       = {9},
  pages        = {277},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11128-019-2389-0},
  doi          = {10.1007/S11128-019-2389-0},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/LuoML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WangZL19,
  author       = {Anyu Wang and
                  Zhifang Zhang and
                  Dongdai Lin},
  title        = {Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing
                  Approach},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {7},
  pages        = {4167--4179},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2019.2895315},
  doi          = {10.1109/TIT.2019.2895315},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WangZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/YiLL19,
  author       = {Hairong Yi and
                  Guiwen Luo and
                  Dongdai Lin},
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Faster Scalar Multiplication on the x-Line: Three-Dimensional {GLV}
                  Method with Three-Dimensional Differential Addition Chains},
  booktitle    = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  pages        = {236--253},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4\_14},
  doi          = {10.1007/978-3-030-16458-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/YiLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MaL19,
  author       = {Xuecheng Ma and
                  Dongdai Lin},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Generic Constructions of Revocable Identity-Based Encryption},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {381--396},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_22},
  doi          = {10.1007/978-3-030-42921-8\_22},
  timestamp    = {Mon, 06 Apr 2020 19:10:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MaL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/QiuHL19,
  author       = {Tian Qiu and
                  Lin Hou and
                  Dongdai Lin},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {A Multi-Group Signature Scheme from Lattices},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {359--377},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_21},
  doi          = {10.1007/978-3-030-41579-2\_21},
  timestamp    = {Mon, 02 Mar 2020 17:19:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/QiuHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangLL19,
  author       = {Jingchun Yang and
                  Meicheng Liu and
                  Dongdai Lin},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {Cube Cryptanalysis of Round-Reduced {ACORN}},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {44--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_3},
  doi          = {10.1007/978-3-030-30215-3\_3},
  timestamp    = {Mon, 02 Sep 2019 15:19:30 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YangLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2019-1,
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4},
  doi          = {10.1007/978-3-030-17253-4},
  isbn         = {978-3-030-17252-7},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2019-2,
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6},
  doi          = {10.1007/978-3-030-17259-6},
  isbn         = {978-3-030-17258-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-03902,
  author       = {Lan Luo and
                  Zhi Ma and
                  Dongdai Lin},
  title        = {Two New Families of Quantum Synchronizable Codes},
  journal      = {CoRR},
  volume       = {abs/1904.03902},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.03902},
  eprinttype    = {arXiv},
  eprint       = {1904.03902},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-03902.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-07766,
  author       = {Wenhao Wang and
                  Yichen Jiang and
                  Qintao Shen and
                  Weihao Huang and
                  Hao Chen and
                  Shuang Wang and
                  Xiaofeng Wang and
                  Haixu Tang and
                  Kai Chen and
                  Kristin E. Lauter and
                  Dongdai Lin},
  title        = {Toward Scalable Fully Homomorphic Encryption Through Light Trusted
                  Computing Assistance},
  journal      = {CoRR},
  volume       = {abs/1905.07766},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.07766},
  eprinttype    = {arXiv},
  eprint       = {1905.07766},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-07766.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaL19,
  author       = {Xuecheng Ma and
                  Dongdai Lin},
  title        = {A Generic Construction of Revocable Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangLLM19,
  author       = {Shichang Wang and
                  Meicheng Liu and
                  Dongdai Lin and
                  Li Ma},
  title        = {Fast Correlation Attacks on Grain-like Small State Stream Ciphers
                  and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {763},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/763},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangLLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaL19a,
  author       = {Xuecheng Ma and
                  Dongdai Lin},
  title        = {Generic Constructions of {RIBE} via Subset Difference Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1376},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaL19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangWLL18,
  author       = {Libo Wang and
                  Baofeng Wu and
                  Zhuojun Liu and
                  Dongdai Lin},
  title        = {Three new infinite families of bent functions},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {032104:1--032104:14},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-016-0624-x},
  doi          = {10.1007/S11432-016-0624-X},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangWLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/BaiLSWL18,
  author       = {Jian Bai and
                  Ting Li and
                  Yao Sun and
                  Dingkang Wang and
                  Dongdai Lin},
  title        = {The lightest 4 {\texttimes} 4 {MDS} matrices over GL(4, {\(\mathbb{F}\)}\({}_{\mbox{2}}\))},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {11},
  pages        = {119102:1--119102:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9320-8},
  doi          = {10.1007/S11432-017-9320-8},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/BaiLSWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangFL18,
  author       = {Xiaojuan Zhang and
                  Xiutao Feng and
                  Dongdai Lin},
  title        = {Fault Attack on {ACORN} v3},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {8},
  pages        = {1166--1179},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxy044},
  doi          = {10.1093/COMJNL/BXY044},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/LiWL18,
  author       = {Fei Li and
                  Qiuyan Wang and
                  Dongdai Lin},
  title        = {A class of three-weight and five-weight linear codes},
  journal      = {Discret. Appl. Math.},
  volume       = {241},
  pages        = {25--38},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.dam.2016.11.005},
  doi          = {10.1016/J.DAM.2016.11.005},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/LiWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinPLZ18,
  author       = {Zhiqiang Lin and
                  Dingyi Pei and
                  Dongdai Lin and
                  Xiaolei Zhang},
  title        = {Fast construction of binary ring FCSRs for hardware stream ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {939--953},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0370-4},
  doi          = {10.1007/S10623-017-0370-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinPLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/HeBLW18,
  author       = {Zheng He and
                  Kunpeng Bai and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Unification of identifiers in the Sea-Cloud system},
  journal      = {Frontiers Comput. Sci.},
  volume       = {12},
  number       = {4},
  pages        = {749--762},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11704-017-6054-4},
  doi          = {10.1007/S11704-017-6054-4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/HeBLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhangGHL18,
  author       = {Kai Zhang and
                  Jie Guan and
                  Bin Hu and
                  Dongdai Lin},
  title        = {Security evaluation on Simeck against zero-correlation linear cryptanalysis},
  journal      = {{IET} Inf. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {87--93},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ifs.2016.0503},
  doi          = {10.1049/IET-IFS.2016.0503},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhangGHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiL18,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {De Bruijn Sequences, Adjacency Graphs, and Cyclotomy},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {4},
  pages        = {2941--2952},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2017.2787742},
  doi          = {10.1109/TIT.2017.2787742},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JiangL18,
  author       = {Yupeng Jiang and
                  Dongdai Lin},
  title        = {Lower and Upper Bounds on the Density of Irreducible NFSRs},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {5},
  pages        = {3944--3952},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2018.2796127},
  doi          = {10.1109/TIT.2018.2796127},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JiangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZhongL18,
  author       = {Jianghua Zhong and
                  Dongdai Lin},
  title        = {On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like
                  Structure},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {9},
  pages        = {6429--6442},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2018.2849392},
  doi          = {10.1109/TIT.2018.2849392},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZhongL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaWL18,
  author       = {Xuecheng Ma and
                  Xin Wang and
                  Dongdai Lin},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Anonymous Identity-Based Encryption with Identity Recovery},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {360--375},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_21},
  doi          = {10.1007/978-3-319-93638-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhengLQ18,
  author       = {Qun{-}Xiong Zheng and
                  Dongdai Lin and
                  Wen{-}Feng Qi},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Distribution Properties of Binary Sequences Derived from Primitive
                  Sequences Modulo Square-free Odd Integers},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {568--585},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_30},
  doi          = {10.1007/978-3-030-14234-6\_30},
  timestamp    = {Thu, 14 Jul 2022 16:21:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhengLQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LiuYWL18,
  author       = {Meicheng Liu and
                  Jingchun Yang and
                  Wenhao Wang and
                  Dongdai Lin},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {715--744},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_23},
  doi          = {10.1007/978-3-319-78375-8\_23},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LiuYWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HouLQL18,
  author       = {Lin Hou and
                  Renzhang Liu and
                  Tian Qiu and
                  Dongdai Lin},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Hierarchical Group Signatures with Verifier-Local Revocation},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {271--286},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_16},
  doi          = {10.1007/978-3-030-01950-1\_16},
  timestamp    = {Sat, 05 Sep 2020 18:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HouLQL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MaL18,
  author       = {Xuecheng Ma and
                  Dongdai Lin},
  editor       = {Kwangsu Lee},
  title        = {Multi-identity {IBFHE} and Multi-attribute {ABFHE} in the Standard
                  Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_5},
  doi          = {10.1007/978-3-030-12146-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MaL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangWHL18,
  author       = {Xuzi Wang and
                  Baofeng Wu and
                  Lin Hou and
                  Dongdai Lin},
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Automatic Search for Related-Key Differential Trails in SIMON-like
                  Block Ciphers Based on {MILP}},
  booktitle    = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8\_7},
  doi          = {10.1007/978-3-319-99136-8\_7},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangWHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/0003LL18,
  author       = {Xiaojuan Zhang and
                  Meicheng Liu and
                  Dongdai Lin},
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Conditional Cube Searching and Applications on Trivium-Variant Ciphers},
  booktitle    = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8\_9},
  doi          = {10.1007/978-3-319-99136-8\_9},
  timestamp    = {Mon, 03 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/0003LL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YangLLW18,
  author       = {Jingchun Yang and
                  Meicheng Liu and
                  Dongdai Lin and
                  Wenhao Wang},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Symbolic-Like Computation and Conditional Differential Cryptanalysis
                  of {QUARK}},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {244--261},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_16},
  doi          = {10.1007/978-3-319-97916-8\_16},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YangLLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenWCCZWLL18,
  author       = {Guoxing Chen and
                  Wenhao Wang and
                  Tianyu Chen and
                  Sanchuan Chen and
                  Yinqian Zhang and
                  XiaoFeng Wang and
                  Ten{-}Hwang Lai and
                  Dongdai Lin},
  title        = {Racing in Hyperspace: Closing Hyper-Threading Side Channels on {SGX}
                  with Contrived Data Races},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {178--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00024},
  doi          = {10.1109/SP.2018.00024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenWCCZWLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLZZG18,
  author       = {Wei Zhang and
                  Dongdai Lin and
                  Hailong Zhang and
                  Xiaojun Zhou and
                  Yiwen Gao},
  title        = {A Lightweight FourQ Primitive on {ARM} Cortex-M0},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {699--704},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00102},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLZZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLZZGC18,
  author       = {Wei Zhang and
                  Dongdai Lin and
                  Hailong Zhang and
                  Xiaojun Zhou and
                  Yiwen Gao and
                  Cong Chen},
  title        = {A Lightweight Multi-precision Squaring on Embedded Processors for
                  {ECC}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1014--1019},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00143},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00143},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLZZGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HePL18,
  author       = {Zheng He and
                  Shiran Pan and
                  Dongdai Lin},
  title        = {{PMDA:} Privacy-Preserving Multi-functional Data Aggregation Without
                  {TTP} in Smart Grid},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1107--1114},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00154},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HePL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2017,
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-75160-3},
  doi          = {10.1007/978-3-319-75160-3},
  isbn         = {978-3-319-75159-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-05943,
  author       = {Xuecheng Ma and
                  Xin Wang and
                  Dongdai Lin},
  title        = {Anonymous Identity-Based Encryption with Identity Recovery},
  journal      = {CoRR},
  volume       = {abs/1806.05943},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.05943},
  eprinttype    = {arXiv},
  eprint       = {1806.05943},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-05943.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuYWL18,
  author       = {Meicheng Liu and
                  Jingchun Yang and
                  Wenhao Wang and
                  Dongdai Lin},
  title        = {Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/158},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuYWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/WangDLX17,
  author       = {Qiuyan Wang and
                  Kelan Ding and
                  Dongdai Lin and
                  Rui Xue},
  title        = {A kind of three-weight linear codes},
  journal      = {Cryptogr. Commun.},
  volume       = {9},
  number       = {3},
  pages        = {315--322},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12095-015-0180-3},
  doi          = {10.1007/S12095-015-0180-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/WangDLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LinLP17,
  author       = {Zhiqiang Lin and
                  Dongdai Lin and
                  Dingyi Pei},
  title        = {Practical construction of ring LFSRs and ring FCSRs with low diffusion
                  delay for hardware cryptographic applications},
  journal      = {Cryptogr. Commun.},
  volume       = {9},
  number       = {4},
  pages        = {431--443},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12095-016-0183-8},
  doi          = {10.1007/S12095-016-0183-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LinLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/JiangZL17,
  author       = {Yupeng Jiang and
                  Qun{-}Xiong Zheng and
                  Dongdai Lin},
  title        = {On s-uniform property of compressing sequences derived from primitive
                  sequences modulo odd prime powers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {5},
  pages        = {052102:1--052102:12},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-5472-x},
  doi          = {10.1007/S11432-015-5472-X},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/JiangZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiangL17,
  author       = {Yupeng Jiang and
                  Dongdai Lin},
  title        = {On affine sub-families of Grain-like structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {3},
  pages        = {531--542},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0178-7},
  doi          = {10.1007/S10623-016-0178-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiangL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiJL17,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {The adjacency graphs of some feedback shift registers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {3},
  pages        = {695--713},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0187-6},
  doi          = {10.1007/S10623-016-0187-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/WangLDL17,
  author       = {Qiuyan Wang and
                  Fei Li and
                  Kelan Ding and
                  Dongdai Lin},
  title        = {Complete weight enumerators of two classes of linear codes},
  journal      = {Discret. Math.},
  volume       = {340},
  number       = {3},
  pages        = {467--480},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.disc.2016.09.003},
  doi          = {10.1016/J.DISC.2016.09.003},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/WangLDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/0033JLW17,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin and
                  Qiuyan Wang},
  title        = {Transition Mappings between De Bruijn Sequences},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {5},
  pages        = {1254--1256},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1254},
  doi          = {10.1587/TRANSFUN.E100.A.1254},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/0033JLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/RenLGFL17,
  author       = {YaWei Ren and
                  Feng Liu and
                  Teng Guo and
                  Rongquan Feng and
                  Dongdai Lin},
  title        = {Cheating prevention visual cryptography scheme using Latin square},
  journal      = {{IET} Inf. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {211--219},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-ifs.2016.0126},
  doi          = {10.1049/IET-IFS.2016.0126},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/RenLGFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiuL17a,
  author       = {Meicheng Liu and
                  Dongdai Lin},
  title        = {Results on highly nonlinear Boolean functions with provably good immunity
                  to fast algebraic attacks},
  journal      = {Inf. Sci.},
  volume       = {421},
  pages        = {181--203},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2017.08.097},
  doi          = {10.1016/J.INS.2017.08.097},
  timestamp    = {Mon, 16 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiuL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/WangZL17,
  author       = {Haiyan Wang and
                  Jianghua Zhong and
                  Dongdai Lin},
  title        = {Linearization of multi-valued nonlinear feedback shift registers},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {30},
  number       = {2},
  pages        = {494--509},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11424-016-5156-7},
  doi          = {10.1007/S11424-016-5156-7},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/WangZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangFL17,
  author       = {Xiaojuan Zhang and
                  Xiutao Feng and
                  Dongdai Lin},
  title        = {Fault Attack on the Authenticated Cipher {ACORN} v2},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {3834685:1--3834685:16},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/3834685},
  doi          = {10.1155/2017/3834685},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HuangL17,
  author       = {Zhenyu Huang and
                  Dongdai Lin},
  title        = {Solving polynomial systems with noise over F\({}_{\mbox{2}}\): Revisited},
  journal      = {Theor. Comput. Sci.},
  volume       = {676},
  pages        = {52--68},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.tcs.2017.03.005},
  doi          = {10.1016/J.TCS.2017.03.005},
  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/HuangL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiL17,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {63},
  number       = {2},
  pages        = {1325--1335},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIT.2016.2634420},
  doi          = {10.1109/TIT.2016.2634420},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoLGWL17,
  author       = {Zhiyuan Guo and
                  Renzhang Liu and
                  Si Gao and
                  Wenling Wu and
                  Dongdai Lin},
  title        = {Direct Construction of Optimal Rotational-XOR Diffusion Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {169--187},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.169-187},
  doi          = {10.13154/TOSC.V2017.I4.169-187},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoLGWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenLZZ17,
  author       = {Cong Chen and
                  Dongdai Lin and
                  Wei Zhang and
                  Xiaojun Zhou},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {A Game-Based Framework Towards Cyber-Attacks on State Estimation in
                  ICSs},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {321--341},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_20},
  doi          = {10.1007/978-3-319-75160-3\_20},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenLZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangL17,
  author       = {Xiaojuan Zhang and
                  Dongdai Lin},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Cryptanalysis of Acorn in Nonce-Reuse Setting},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {342--361},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_21},
  doi          = {10.1007/978-3-319-75160-3\_21},
  timestamp    = {Mon, 12 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangLL17,
  author       = {Yang Zhang and
                  Renzhang Liu and
                  Dongdai Lin},
  editor       = {Howon Kim and
                  Dong{-}Chan Kim},
  title        = {Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption
                  Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2017 - 20th International
                  Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10779},
  pages        = {93--111},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78556-1\_6},
  doi          = {10.1007/978-3-319-78556-1\_6},
  timestamp    = {Thu, 02 Mar 2023 10:53:05 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/0001ZL17,
  author       = {Anyu Wang and
                  Zhifang Zhang and
                  Dongdai Lin},
  title        = {Bounds and constructions for linear locally repairable codes over
                  binary fields},
  booktitle    = {2017 {IEEE} International Symposium on Information Theory, {ISIT}
                  2017, Aachen, Germany, June 25-30, 2017},
  pages        = {2033--2037},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISIT.2017.8006886},
  doi          = {10.1109/ISIT.2017.8006886},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/0001ZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/YiZL17,
  author       = {Hairong Yi and
                  Yuqing Zhu and
                  Dongdai Lin},
  editor       = {Carlisle Adams and
                  Jan Camenisch},
  title        = {Refinement of the Four-Dimensional {GLV} Method on Elliptic Curves},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
                  Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10719},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72565-9\_2},
  doi          = {10.1007/978-3-319-72565-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/YiZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLZCZ17,
  author       = {Wei Zhang and
                  Dongdai Lin and
                  Hailong Zhang and
                  Cong Chen and
                  Xiaojun Zhou},
  title        = {A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol
                  on {ECC}},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {170--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.234},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.234},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLZCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2016,
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54705-3},
  doi          = {10.1007/978-3-319-54705-3},
  isbn         = {978-3-319-54704-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangZL17,
  author       = {Anyu Wang and
                  Zhifang Zhang and
                  Dongdai Lin},
  title        = {Bounds and Constructions for Linear Locally Repairable Codes over
                  Binary Fields},
  journal      = {CoRR},
  volume       = {abs/1701.05989},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.05989},
  eprinttype    = {arXiv},
  eprint       = {1701.05989},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WangZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-06724,
  author       = {Yang Zhang and
                  Renzhang Liu and
                  Dongdai Lin},
  title        = {Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption
                  Scheme},
  journal      = {CoRR},
  volume       = {abs/1709.06724},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.06724},
  eprinttype    = {arXiv},
  eprint       = {1709.06724},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-06724.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-07890,
  author       = {Shihui Fu and
                  Xiutao Feng and
                  Dongdai Lin and
                  Qiang Wang},
  title        = {A Recursive Construction of Permutation Polynomials over F\({}_{\mbox{q\({}^{\mbox{2}}\)}}\)
                  with Odd Characteristic from R{\'{e}}dei Functions},
  journal      = {CoRR},
  volume       = {abs/1712.07890},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.07890},
  eprinttype    = {arXiv},
  eprint       = {1712.07890},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-07890.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0003FL17,
  author       = {Xiaojuan Zhang and
                  Xiutao Feng and
                  Dongdai Lin},
  title        = {Fault Attack on {ACORN} v3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {855},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/855},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0003FL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/WangJL16,
  author       = {Mingxing Wang and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {Further results on the nonlinearity of maximum-length {NFSR} feedbacks},
  journal      = {Cryptogr. Commun.},
  volume       = {8},
  number       = {1},
  pages        = {1--6},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12095-015-0133-x},
  doi          = {10.1007/S12095-015-0133-X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/WangJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/WangJL16a,
  author       = {Qiuyan Wang and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {Linear complexity of Ding-Helleseth sequences of order 2 over GF(l)},
  journal      = {Cryptogr. Commun.},
  volume       = {8},
  number       = {1},
  pages        = {33--49},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12095-015-0138-5},
  doi          = {10.1007/S12095-015-0138-5},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/WangJL16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/WangL16,
  author       = {Qiuyan Wang and
                  Dongdai Lin},
  title        = {Generalized cyclotomic numbers of order two and their applications},
  journal      = {Cryptogr. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {605--616},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12095-015-0165-2},
  doi          = {10.1007/S12095-015-0165-2},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/WangL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhongL16,
  author       = {Jianghua Zhong and
                  Dongdai Lin},
  title        = {Stability of nonlinear feedback shift registers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {1},
  pages        = {1--12},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-015-5311-0},
  doi          = {10.1007/S11432-015-5311-0},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhongL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenZLZ16,
  author       = {Yu Chen and
                  Jiang Zhang and
                  Dongdai Lin and
                  Zhenfeng Zhang},
  title        = {Generic constructions of integrated {PKE} and {PEKS}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {493--526},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0014-x},
  doi          = {10.1007/S10623-014-0014-X},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/0002L16,
  author       = {Chun Guo and
                  Dongdai Lin},
  title        = {Separating invertible key derivations from non-invertible ones: sequential
                  indifferentiability of 3-round Even-Mansour},
  journal      = {Des. Codes Cryptogr.},
  volume       = {81},
  number       = {1},
  pages        = {109--129},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0132-0},
  doi          = {10.1007/S10623-015-0132-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/0002L16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/SunHWL16,
  author       = {Yao Sun and
                  Zhenyu Huang and
                  Dingkang Wang and
                  Dongdai Lin},
  title        = {An improvement over the {GVW} algorithm for inhomogeneous polynomial
                  systems},
  journal      = {Finite Fields Their Appl.},
  volume       = {41},
  pages        = {174--192},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ffa.2016.06.002},
  doi          = {10.1016/J.FFA.2016.06.002},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/SunHWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhuZLL16,
  author       = {Yuqing Zhu and
                  Jincheng Zhuang and
                  Chang Lv and
                  Dongdai Lin},
  title        = {Classifying and generating exact coset representatives of PGL\({}_{\mbox{2}}\)(F\({}_{\mbox{q}}\))
                  in PGL\({}_{\mbox{2}}\)(F\({}_{\mbox{q\({}^{\mbox{2}}\)}}\))},
  journal      = {Finite Fields Their Appl.},
  volume       = {42},
  pages        = {118--127},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ffa.2016.07.010},
  doi          = {10.1016/J.FFA.2016.07.010},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhuZLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/ZhongL16,
  author       = {Jianghua Zhong and
                  Dongdai Lin},
  title        = {Linearization of nonlinear filter generators and its application to
                  cryptanalysis of stream ciphers},
  journal      = {J. Complex.},
  volume       = {35},
  pages        = {29--45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jco.2015.12.003},
  doi          = {10.1016/J.JCO.2015.12.003},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jc/ZhongL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/SunHLW16,
  author       = {Yao Sun and
                  Zhenyu Huang and
                  Dongdai Lin and
                  Dingkang Wang},
  title        = {On implementing the symbolic preprocessing function over Boolean polynomial
                  rings in Gr{\"{o}}bner basis algorithms using linear algebra},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {29},
  number       = {3},
  pages        = {789--804},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11424-015-4085-1},
  doi          = {10.1007/S11424-015-4085-1},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jossac/SunHLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenZLC16,
  author       = {Yu Chen and
                  Zongyang Zhang and
                  Dongdai Lin and
                  Zhenfu Cao},
  title        = {Generalized (identity-based) hash proof system and its applications},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1698--1716},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.827},
  doi          = {10.1002/SEC.827},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenZLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ZhongL16,
  author       = {Jianghua Zhong and
                  Dongdai Lin},
  title        = {Driven Stability of Nonlinear Feedback Shift Registers With Inputs},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {64},
  number       = {6},
  pages        = {2274--2284},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCOMM.2016.2557330},
  doi          = {10.1109/TCOMM.2016.2557330},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/ZhongL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/XiangZBL16,
  author       = {Zejun Xiang and
                  Wentao Zhang and
                  Zhenzhen Bao and
                  Dongdai Lin},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Applying {MILP} Method to Searching Integral Distinguishers Based
                  on Division Property for 6 Lightweight Block Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {648--678},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_24},
  doi          = {10.1007/978-3-662-53887-6\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/XiangZBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YiWCL16,
  author       = {Wentan Yi and
                  Baofeng Wu and
                  Shaozhen Chen and
                  Dongdai Lin},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Improved Integral and Zero-correlation Linear Cryptanalysis of {CLEFIA}
                  Block Cipher},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_3},
  doi          = {10.1007/978-3-319-54705-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YiWCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenL16,
  author       = {Cong Chen and
                  Dongdai Lin},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Cyber-Attacks on Remote State Estimation in Industrial Control System:
                  {A} Game-Based Framework},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {431--450},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_27},
  doi          = {10.1007/978-3-319-54705-3\_27},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PanBLL16,
  author       = {Wenlun Pan and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Feng Liu},
  editor       = {Kwok{-}Yan Lam and
                  Chi{-}Hung Chi and
                  Sihan Qing},
  title        = {The Linear Complexity and 2-Error Linear Complexity Distribution of
                  2{\^{}}n 2 n -Periodic Binary Sequences with Fixed Hamming Weight},
  booktitle    = {Information and Communications Security - 18th International Conference,
                  {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9977},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-50011-9\_9},
  doi          = {10.1007/978-3-319-50011-9\_9},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PanBLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinfa/WangZL16,
  author       = {Haiyan Wang and
                  Jianghua Zhong and
                  Dongdai Lin},
  title        = {Stability of multi-valued nonlinear feedback shift registers},
  booktitle    = {{IEEE} International Conference on Information and Automation, {ICIA}
                  2016, Ningbo, China, August 1-3, 2016},
  pages        = {1764--1769},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICInfA.2016.7832103},
  doi          = {10.1109/ICINFA.2016.7832103},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icinfa/WangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/GuoL16,
  author       = {Xiaojie Guo and
                  Dongdai Lin},
  title        = {Robust face image alignment using structural priors},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2016,
                  Seattle, WA, USA, July 11-15, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICME.2016.7552889},
  doi          = {10.1109/ICME.2016.7552889},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/GuoL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WangZL16,
  author       = {Anyu Wang and
                  Zhifang Zhang and
                  Dongdai Lin},
  title        = {Two classes of (r, t)-locally repairable codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {445--449},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541338},
  doi          = {10.1109/ISIT.2016.7541338},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/WangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PanBLL16,
  author       = {Wenlun Pan and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Feng Liu},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {The Distribution of 2{\^{}}n 2 n -Periodic Binary Sequences with Fixed
                  k-Error Linear Complexity},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {13--36},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_2},
  doi          = {10.1007/978-3-319-49151-6\_2},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PanBLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XiangZL16,
  author       = {Zejun Xiang and
                  Wentao Zhang and
                  Dongdai Lin},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {On the Division Property of Simon48 and Simon64},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_9},
  doi          = {10.1007/978-3-319-44524-3\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/XiangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2015,
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-38898-4},
  doi          = {10.1007/978-3-319-38898-4},
  isbn         = {978-3-319-38897-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiL16,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like
                  Characteristic Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiL16a,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {Adjacency Graphs, Irreducible Polynomials and Cyclotomy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiL16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuZLL16,
  author       = {Yuqing Zhu and
                  Jincheng Zhuang and
                  Chang Lv and
                  Dongdai Lin},
  title        = {Improvements on the Individual Logarithm Step in exTNFS},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {727},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/727},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuZLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002LL16,
  author       = {Chun Guo and
                  Dongdai Lin and
                  Meicheng Liu},
  title        = {Cascade Ciphers Revisited: Indifferentiability Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {825},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/825},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002LL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiangZL16,
  author       = {Zejun Xiang and
                  Wentao Zhang and
                  Dongdai Lin},
  title        = {On the Division Property of {SIMON48} and {SIMON64}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {839},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/839},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiangZBL16,
  author       = {Zejun Xiang and
                  Wentao Zhang and
                  Zhenzhen Bao and
                  Dongdai Lin},
  title        = {Applying {MILP} Method to Searching Integral Distinguishers Based
                  on Division Property for 6 Lightweight Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {857},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/857},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiangZBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002L16,
  author       = {Chun Guo and
                  Dongdai Lin},
  title        = {Indifferentiability of 3-Round Even-Mansour with Random Oracle Key
                  Derivation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/894},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002L16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanBLL16,
  author       = {Wenlun Pan and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Feng Liu},
  title        = {An Algorithm for Counting the Number of 2\({}^{\mbox{n}}\)-Periodic
                  Binary Sequences with Fixed k-Error Linear Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1025},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1025},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanBLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLWL16,
  author       = {Zhiyuan Guo and
                  Renzhang Liu and
                  Wenling Wu and
                  Dongdai Lin},
  title        = {Direct Construction of Lightweight Rotational-XOR {MDS} Diffusion
                  Layers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1036},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cca/SunLW15,
  author       = {Yao Sun and
                  Dongdai Lin and
                  Dingkang Wang},
  title        = {On implementing signature-based Gr{\"{o}}bner basis algorithms
                  using linear algebraic routines from {M4RI}},
  journal      = {{ACM} Commun. Comput. Algebra},
  volume       = {49},
  number       = {2},
  pages        = {63--64},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815111.2815161},
  doi          = {10.1145/2815111.2815161},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cca/SunLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GuoL15,
  author       = {Chun Guo and
                  Dongdai Lin},
  title        = {Improved domain extender for the ideal cipher},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {509--533},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0128-7},
  doi          = {10.1007/S12095-015-0128-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/GuoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TianPLMJJ15,
  author       = {Youliang Tian and
                  Changgen Peng and
                  Dongdai Lin and
                  Jianfeng Ma and
                  Qi Jiang and
                  Wenjiang Ji},
  title        = {Bayesian mechanism for rational secret sharing scheme},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {5},
  pages        = {1--13},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-014-5275-5},
  doi          = {10.1007/S11432-014-5275-5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/TianPLMJJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangHLLML15,
  author       = {Huanguo Zhang and
                  Wenbao Han and
                  Xuejia Lai and
                  Dongdai Lin and
                  Jianfeng Ma and
                  Jianhua Li},
  title        = {Survey on cyberspace security},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {11},
  pages        = {1--43},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-015-5433-4},
  doi          = {10.1007/S11432-015-5433-4},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangHLLML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangBLR0V15,
  author       = {Wentao Zhang and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Vincent Rijmen and
                  Bohan Yang and
                  Ingrid Verbauwhede},
  title        = {{RECTANGLE:} a bit-slice lightweight block cipher suitable for multiple
                  platforms},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {12},
  pages        = {1--15},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-015-5459-7},
  doi          = {10.1007/S11432-015-5459-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangBLR0V15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/WuL15,
  author       = {Baofeng Wu and
                  Dongdai Lin},
  title        = {On constructing complete permutation polynomials over finite fields
                  of even characteristic},
  journal      = {Discret. Appl. Math.},
  volume       = {184},
  pages        = {213--222},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dam.2014.11.008},
  doi          = {10.1016/J.DAM.2014.11.008},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/WuL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/CaoMGDL15,
  author       = {Xiaochun Cao and
                  Meili Ma and
                  Xiaojie Guo and
                  Ling Du and
                  Dongdai Lin},
  title        = {A new encryption scheme for surveillance videos},
  journal      = {Frontiers Comput. Sci.},
  volume       = {9},
  number       = {5},
  pages        = {765--777},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11704-015-3362-4},
  doi          = {10.1007/S11704-015-3362-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/CaoMGDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LinKLG15,
  author       = {Zhiqiang Lin and
                  Lishan Ke and
                  Dongdai Lin and
                  Jian Gao},
  title        = {On the LFSRization of a Class of {FCSR} Automata},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {434--440},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.434},
  doi          = {10.1587/TRANSFUN.E98.A.434},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LinKLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/WangJL15,
  author       = {Qiuyan Wang and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {Linear complexity of binary generalized cyclotomic sequences over
                  GF(q)},
  journal      = {J. Complex.},
  volume       = {31},
  number       = {5},
  pages        = {731--740},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jco.2015.01.001},
  doi          = {10.1016/J.JCO.2015.01.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jc/WangJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/ChenCXLW15,
  author       = {Kai Chen and
                  Weifeng Chen and
                  Zhen Xu and
                  Dongdai Lin and
                  Yazhe Wang},
  title        = {{VFA:} {A} Variable-Factor Authentication Framework for Mobile Users},
  journal      = {J. Commun.},
  volume       = {10},
  number       = {6},
  pages        = {366--379},
  year         = {2015},
  url          = {https://doi.org/10.12720/jcm.10.6.366-379},
  doi          = {10.12720/JCM.10.6.366-379},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/ChenCXLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ZhongL15,
  author       = {Jianghua Zhong and
                  Dongdai Lin},
  title        = {A new linearization method for nonlinear feedback shift registers},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {81},
  number       = {4},
  pages        = {783--796},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jcss.2014.12.030},
  doi          = {10.1016/J.JCSS.2014.12.030},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/ZhongL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/TianWL15,
  author       = {Chengliang Tian and
                  Wei Wei and
                  Dongdai Lin},
  title        = {Solving Closest Vector Instances Using an Approximate Shortest Independent
                  Vectors Oracle},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {30},
  number       = {6},
  pages        = {1370--1377},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11390-015-1604-4},
  doi          = {10.1007/S11390-015-1604-4},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/TianWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/CaoWHL15,
  author       = {Xiaochun Cao and
                  Xingxing Wei and
                  Yahong Han and
                  Dongdai Lin},
  title        = {Robust Face Clustering Via Tensor Decomposition},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {45},
  number       = {11},
  pages        = {2546--2557},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCYB.2014.2376938},
  doi          = {10.1109/TCYB.2014.2376938},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/CaoWHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YangLFL15,
  author       = {Minghui Yang and
                  Jin Li and
                  Keqin Feng and
                  Dongdai Lin},
  title        = {Generalized Hamming Weights of Irreducible Cyclic Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {9},
  pages        = {4905--4913},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2015.2444013},
  doi          = {10.1109/TIT.2015.2444013},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/YangLFL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LuZPL15,
  author       = {Yao Lu and
                  Rui Zhang and
                  Liqiang Peng and
                  Dongdai Lin},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Solving Linear Equations Modulo Unknown Divisors: Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {189--213},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_9},
  doi          = {10.1007/978-3-662-48797-6\_9},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LuZPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoL15,
  author       = {Chun Guo and
                  Dongdai Lin},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {A Synthetic Indifferentiability Analysis of Interleaved Double-Key
                  Even-Mansour Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {389--410},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_16},
  doi          = {10.1007/978-3-662-48800-3\_16},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GuoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BaoLL15,
  author       = {Zhenzhen Bao and
                  Peng Luo and
                  Dongdai Lin},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {Bitsliced Implementations of the PRINCE, {LED} and {RECTANGLE} Block
                  Ciphers on {AVR} 8-Bit Microcontrollers},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {18--36},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_3},
  doi          = {10.1007/978-3-319-29814-6\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BaoLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/YanWLQ15,
  author       = {Jun Yan and
                  Jian Weng and
                  Dongdai Lin and
                  Yujuan Quan},
  editor       = {Khaled M. Elbassioni and
                  Kazuhisa Makino},
  title        = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge
                  Proof (Extended Abstract)},
  booktitle    = {Algorithms and Computation - 26th International Symposium, {ISAAC}
                  2015, Nagoya, Japan, December 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9472},
  pages        = {555--565},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48971-0\_47},
  doi          = {10.1007/978-3-662-48971-0\_47},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isaac/YanWLQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WangLZL15,
  author       = {Tianze Wang and
                  Meicheng Liu and
                  Shangwei Zhao and
                  Dongdai Lin},
  title        = {Construction of cubic rotation symmetric bent functions in power-of-two
                  variables},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {486--490},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282502},
  doi          = {10.1109/ISIT.2015.7282502},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/WangLZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WuZL15,
  author       = {Baofeng Wu and
                  Jia Zheng and
                  Dongdai Lin},
  title        = {Constructing Boolean functions with (potentially) optimal algebraic
                  immunity based on multiplicative decompositions of finite fields},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {491--495},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282503},
  doi          = {10.1109/ISIT.2015.7282503},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/WuZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LiuLW15,
  author       = {Meicheng Liu and
                  Dongdai Lin and
                  Wenhao Wang},
  title        = {Searching cubes for testing Boolean functions and its application
                  to Trivium},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {496--500},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282504},
  doi          = {10.1109/ISIT.2015.7282504},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LiuLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WuL15,
  author       = {Baofeng Wu and
                  Dongdai Lin},
  title        = {On the dual of generalized Boolean bent functions over {\(\mathbb{Z}\)}4},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {506--510},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282506},
  doi          = {10.1109/ISIT.2015.7282506},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/WuL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Du0LL15,
  author       = {Shaoyu Du and
                  Bin Zhang and
                  Zhenqi Li and
                  Dongdai Lin},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Fault Attacks on Stream Cipher Scream},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {50--64},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_4},
  doi          = {10.1007/978-3-319-17533-1\_4},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Du0LL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GuoZL15,
  author       = {Chun Guo and
                  Hailong Zhang and
                  Dongdai Lin},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Estimating Differential-Linear Distinguishers and Applications to
                  {CTC2}},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {220--234},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_16},
  doi          = {10.1007/978-3-319-17533-1\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GuoZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/DuL0L15,
  author       = {Shaoyu Du and
                  Zhenqi Li and
                  Bin Zhang and
                  Dongdai Lin},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Combined Cache Timing Attacks and Template Attacks on Stream Cipher
                  {MUGI}},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {235--249},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_17},
  doi          = {10.1007/978-3-319-17533-1\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/DuL0L15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/RenLLFW15,
  author       = {YaWei Ren and
                  Feng Liu and
                  Dongdai Lin and
                  Rongquan Feng and
                  Wen Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {A New Construction of Tagged Visual Cryptography Scheme},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {433--445},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_35},
  doi          = {10.1007/978-3-319-31960-5\_35},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/RenLLFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LuP0HL15,
  author       = {Yao Lu and
                  Liqiang Peng and
                  Rui Zhang and
                  Lei Hu and
                  Dongdai Lin},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Towards Optimal Bounds for Implicit Factorization Problem},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {462--476},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_26},
  doi          = {10.1007/978-3-319-31301-6\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LuP0HL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GuoL15,
  author       = {Chun Guo and
                  Dongdai Lin},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {On the Indifferentiability of Key-Alternating Feistel Ciphers with
                  No Key Derivation},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {110--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_6},
  doi          = {10.1007/978-3-662-46494-6\_6},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GuoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2014,
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16745-9},
  doi          = {10.1007/978-3-319-16745-9},
  isbn         = {978-3-319-16744-2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiWL15,
  author       = {Fei Li and
                  Qiuyan Wang and
                  Dongdai Lin},
  title        = {A class of three-weight and five-weight linear codes},
  journal      = {CoRR},
  volume       = {abs/1509.06242},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.06242},
  eprinttype    = {arXiv},
  eprint       = {1509.06242},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangLL15b,
  author       = {Qiuyan Wang and
                  Fei Li and
                  Dongdai Lin},
  title        = {A Class of Linear Codes With Three Weights},
  journal      = {CoRR},
  volume       = {abs/1512.03866},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.03866},
  eprinttype    = {arXiv},
  eprint       = {1512.03866},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WangLL15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangLDL15,
  author       = {Qiuyan Wang and
                  Fei Li and
                  Kelan Ding and
                  Dongdai Lin},
  title        = {Complete weight enumerators of two classes of linear codes},
  journal      = {CoRR},
  volume       = {abs/1512.07341},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.07341},
  eprinttype    = {arXiv},
  eprint       = {1512.07341},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WangLDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZL15,
  author       = {Haiyan Wang and
                  Jianghua Zhong and
                  Dongdai Lin},
  title        = {Linearization of Multi-valued Nonlinear Feedback Shift Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangL15,
  author       = {Haiyan Wang and
                  Dongdai Lin},
  title        = {Stability and Linearization of Multi-valued Nonlinear Feedback Shift
                  Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiJL15,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {A Group-theory Method to The Cycle Structures of Feedback Shift Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiL15,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {De Bruijn Sequences from Nonlinear Feedback Shift Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/667},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoL15,
  author       = {Chun Guo and
                  Dongdai Lin},
  title        = {A Synthetic Indifferentiability Analysis of Interleaved Double-Key
                  Even-Mansour Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {861},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/861},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangGHL15,
  author       = {Kai Zhang and
                  Jie Guan and
                  Bin Hu and
                  Dongdai Lin},
  title        = {Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {911},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/911},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangGHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWL15,
  author       = {Ming Li and
                  Mingxing Wang and
                  Dongdai Lin},
  title        = {De Bruijn Sequences from Symmetric Shift Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1079},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoLL15,
  author       = {Zhenzhen Bao and
                  Peng Luo and
                  Dongdai Lin},
  title        = {Bitsliced Implementations of the PRINCE, {LED} and {RECTANGLE} Block
                  Ciphers on {AVR} 8-bit Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1118},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPL15,
  author       = {Zhiqiang Lin and
                  Dingyi Pei and
                  Dongdai Lin},
  title        = {Construction of Transition Matrices for Binary FCSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1181},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenZLC14,
  author       = {Yu Chen and
                  Zongyang Zhang and
                  Dongdai Lin and
                  Zhenfu Cao},
  title        = {CCA-Secure {IB-KEM} from Identity-Based Extractable Hash Proof System},
  journal      = {Comput. J.},
  volume       = {57},
  number       = {10},
  pages        = {1537--1556},
  year         = {2014},
  url          = {https://doi.org/10.1093/comjnl/bxt090},
  doi          = {10.1093/COMJNL/BXT090},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ChenZLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/ZhangLL14,
  author       = {Yin Zhang and
                  Meicheng Liu and
                  Dongdai Lin},
  title        = {On the immunity of rotation symmetric Boolean functions against fast
                  algebraic attacks},
  journal      = {Discret. Appl. Math.},
  volume       = {162},
  pages        = {17--27},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.dam.2013.04.014},
  doi          = {10.1016/J.DAM.2013.04.014},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/ZhangLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangLG14,
  author       = {Qiuyan Wang and
                  Dongdai Lin and
                  Xuan Guang},
  title        = {On the Linear Complexity of Legendre Sequences Over F\emph{\({}_{\mbox{q}}\)}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {7},
  pages        = {1627--1630},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1627},
  doi          = {10.1587/TRANSFUN.E97.A.1627},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YangLG14,
  author       = {Minghui Yang and
                  Dongdai Lin and
                  Xuan Guang},
  title        = {Generalized Fourier Transform and the Joint \emph{N}-Adic Complexity
                  of a Multisequence},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {9},
  pages        = {1982--1986},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1982},
  doi          = {10.1587/TRANSFUN.E97.A.1982},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YangLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangJLG14,
  author       = {Qiuyan Wang and
                  Yupeng Jiang and
                  Dongdai Lin and
                  Xuan Guang},
  title        = {On the Linear Complexity of New Modified Jacobi Sequences},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {11},
  pages        = {2263--2266},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.2263},
  doi          = {10.1587/TRANSFUN.E97.A.2263},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangJLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YangLS14,
  author       = {Minghui Yang and
                  Dongdai Lin and
                  Minjia Shi},
  title        = {Minimum Linear Complexity Approximation of Sequences with Period \emph{q\({}^{\mbox{n}}\)}-1
                  over F\({}_{\mbox{\emph{q}}}\)},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {12},
  pages        = {2667--2670},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.2667},
  doi          = {10.1587/TRANSFUN.E97.A.2667},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YangLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsi/DuLZL14,
  author       = {Shaoyu Du and
                  Meicheng Liu and
                  Yin Zhang and
                  Dongdai Lin},
  title        = {On the Nonlinearity and Correlation Immunity of Two Classes of Boolean
                  Functions},
  journal      = {Int. J. Softw. Informatics},
  volume       = {8},
  number       = {2},
  pages        = {177--192},
  year         = {2014},
  url          = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i187},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsi/DuLZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/FuCTL14,
  author       = {Huazhu Fu and
                  Xiaochun Cao and
                  Zhuowen Tu and
                  Dongdai Lin},
  title        = {Symmetry Constraint for Foreground Extraction},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {44},
  number       = {5},
  pages        = {644--654},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCYB.2013.2264051},
  doi          = {10.1109/TCYB.2013.2264051},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/FuCTL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JiangL14,
  author       = {Yupeng Jiang and
                  Dongdai Lin},
  title        = {Distribution Properties of Compressing Sequences Derived From Primitive
                  Sequences Modulo Odd Prime Powers},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {10},
  pages        = {6602--6608},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2345769},
  doi          = {10.1109/TIT.2014.2345769},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JiangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Lu0L14,
  author       = {Yao Lu and
                  Rui Zhang and
                  Dongdai Lin},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {New Partial Key Exposure Attacks on {CRT-RSA} with Large Public Exponents},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {151--162},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_10},
  doi          = {10.1007/978-3-319-07536-5\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Lu0L14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/BaoZL14,
  author       = {Zhenzhen Bao and
                  Wentao Zhang and
                  Dongdai Lin},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Speeding Up the Search Algorithm for the Best Differential and Best
                  Linear Trails},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {259--285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_15},
  doi          = {10.1007/978-3-319-16745-9\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/BaoZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/ChenWYLWH14,
  author       = {Chi Chen and
                  Chaogang Wang and
                  Tengfei Yang and
                  Dongdai Lin and
                  Song Wang and
                  Jiankun Hu},
  title        = {Optional multi-biometric cryptosystem based on fuzzy extractor},
  booktitle    = {11th International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2014, Xiamen, China, August 19-21, 2014},
  pages        = {989--994},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/FSKD.2014.6980974},
  doi          = {10.1109/FSKD.2014.6980974},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/ChenWYLWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinfa/ZhongL14,
  author       = {Jianghua Zhong and
                  Dongdai Lin},
  title        = {Stability of nonlinear feedback shift registers},
  booktitle    = {{IEEE} International Conference on Information and Automation, {ICIA}
                  2014, Hailar, Hulun Buir, China, July 28-30, 2014},
  pages        = {671--676},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICInfA.2014.6932738},
  doi          = {10.1109/ICINFA.2014.6932738},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icinfa/ZhongL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WuJLL14,
  author       = {Baofeng Wu and
                  Qingfang Jin and
                  Zhuojun Liu and
                  Dongdai Lin},
  title        = {Constructing Boolean functions with potentially optimal algebraic
                  immunity based on additive decompositions of finite fields (extended
                  abstract)},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1361--1365},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6875055},
  doi          = {10.1109/ISIT.2014.6875055},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/WuJLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LiuL14a,
  author       = {Meicheng Liu and
                  Dongdai Lin},
  title        = {Almost perfect algebraic immune functions with good nonlinearity},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1837--1841},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6875151},
  doi          = {10.1109/ISIT.2014.6875151},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LiuL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MaXL14,
  author       = {Duohe Ma and
                  Zhen Xu and
                  Dongdai Lin},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Defending Blind DDoS Attack on {SDN} Based on Moving Target Defense},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {463--480},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_32},
  doi          = {10.1007/978-3-319-23829-6\_32},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/MaXL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2013,
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12087-4},
  doi          = {10.1007/978-3-319-12087-4},
  isbn         = {978-3-319-12086-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JiangL14,
  author       = {Yupeng Jiang and
                  Dongdai Lin},
  title        = {Distribution properties of compressing sequences derived from primitive
                  sequences modulo odd prime powers},
  journal      = {CoRR},
  volume       = {abs/1401.5874},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.5874},
  eprinttype    = {arXiv},
  eprint       = {1401.5874},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JiangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuJLL14,
  author       = {Baofeng Wu and
                  Qingfang Jin and
                  Zhuojun Liu and
                  Dongdai Lin},
  title        = {Constructing Boolean Functions With Potential Optimal Algebraic Immunity
                  Based on Additive Decompositions of Finite Fields},
  journal      = {CoRR},
  volume       = {abs/1401.6604},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.6604},
  eprinttype    = {arXiv},
  eprint       = {1401.6604},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuJLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JiangL14a,
  author       = {Yupeng Jiang and
                  Dongdai Lin},
  title        = {On the distinctness of binary sequences derived from {\textdollar}2{\textdollar}-adic
                  expansion of m-sequences over finite prime fields},
  journal      = {CoRR},
  volume       = {abs/1402.4590},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.4590},
  eprinttype    = {arXiv},
  eprint       = {1402.4590},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JiangL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SunLW14,
  author       = {Yao Sun and
                  Dongdai Lin and
                  Dingkang Wang},
  title        = {An Improvement over the {GVW} Algorithm for Inhomogeneous Polynomial
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1404.1428},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.1428},
  eprinttype    = {arXiv},
  eprint       = {1404.1428},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/SunLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HuangSL14,
  author       = {Zhenyu Huang and
                  Yao Sun and
                  Dongdai Lin},
  title        = {On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic
                  Set Method},
  journal      = {CoRR},
  volume       = {abs/1405.4596},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.4596},
  eprinttype    = {arXiv},
  eprint       = {1405.4596},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/HuangSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SunWHL14,
  author       = {Yao Sun and
                  Dingkang Wang and
                  Zhenyu Huang and
                  Dongdai Lin},
  title        = {A Monomial-Oriented {GVW} for Computing Gr{\"{o}}bner Bases},
  journal      = {CoRR},
  volume       = {abs/1410.0105},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.0105},
  eprinttype    = {arXiv},
  eprint       = {1410.0105},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/SunWHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YangLFL14,
  author       = {Minghui Yang and
                  Jin Li and
                  Keqin Feng and
                  Dongdai Lin},
  title        = {Generalized Hamming Weights of Irreducible Cyclic Codes},
  journal      = {CoRR},
  volume       = {abs/1410.2702},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.2702},
  eprinttype    = {arXiv},
  eprint       = {1410.2702},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YangLFL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangBLRYV14,
  author       = {Wentao Zhang and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Vincent Rijmen and
                  Bohan Yang and
                  Ingrid Verbauwhede},
  title        = {{RECTANGLE:} {A} Bit-slice Ultra-Lightweight Block Cipher Suitable
                  for Multiple Platforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangBLRYV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lu0L14,
  author       = {Yao Lu and
                  Rui Zhang and
                  Dongdai Lin},
  title        = {New Results on Solving Linear Equations Modulo Unknown Divisors and
                  its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lu0L14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TianWL14,
  author       = {Chengliang Tian and
                  Wei Wei and
                  Dongdai Lin},
  title        = {Solving closest vector instances using an approximate shortest independent
                  vectors oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TianWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiL14b,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {A Class of FSRs and Their Adjacency Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiL14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoL14,
  author       = {Chun Guo and
                  Dongdai Lin},
  title        = {On the Indifferentiability of Key-Alternating Feistel Ciphers with
                  No Key Derivation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/786},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinQWY14,
  author       = {Dongdai Lin and
                  Yujuan Quan and
                  Jian Weng and
                  Jun Yan},
  title        = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge
                  Proof},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {791},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/791},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinQWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL14,
  author       = {Zhenyu Huang and
                  Dongdai Lin},
  title        = {Solving Polynomial Systems with Noise over F\({}_{\mbox{2}}\): Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {962},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/962},
  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/Lu0L13,
  author       = {Yao Lu and
                  Rui Zhang and
                  Dongdai Lin},
  title        = {Improved bounds for the implicit factorization problem},
  journal      = {Adv. Math. Commun.},
  volume       = {7},
  number       = {3},
  pages        = {243--251},
  year         = {2013},
  url          = {https://doi.org/10.3934/amc.2013.7.243},
  doi          = {10.3934/AMC.2013.7.243},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/Lu0L13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/WangL13,
  author       = {Tianze Wang and
                  Dongdai Lin},
  title        = {A method for counting the number of polynomial equivalence classes},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {69--95},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0017},
  doi          = {10.1515/JMC-2012-0017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/WangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuZL13,
  author       = {Yao Lu and
                  Rui Zhang and
                  Dongdai Lin},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Factoring Multi-power {RSA} Modulus {N} = p r q with Partial Known
                  Bits},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_5},
  doi          = {10.1007/978-3-642-39059-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LuZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenWLW13,
  author       = {Shan Chen and
                  Kunpeng Wang and
                  Dongdai Lin and
                  Tao Wang},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Omega Pairing on Hyperelliptic Curves},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {167--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_11},
  doi          = {10.1007/978-3-319-12087-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenWLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenLYS13,
  author       = {Kai Chen and
                  Dongdai Lin and
                  Li Yan and
                  Xin Sun},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Environment-Bound {SAML} Assertions: {A} Fresh Approach to Enhance
                  the Security of {SAML} Assertions},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_23},
  doi          = {10.1007/978-3-319-12087-4\_23},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenLYS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangLFL13,
  author       = {Bin Zhang and
                  Zhenqi Li and
                  Dengguo Feng and
                  Dongdai Lin},
  editor       = {Shiho Moriai},
  title        = {Near Collision Attack on the Grain v1 Stream Cipher},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {518--538},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_27},
  doi          = {10.1007/978-3-662-43933-3\_27},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangLFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangL13,
  author       = {Wenhao Wang and
                  Dongdai Lin},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow
                  Tradeoff Revisited},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {288--301},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_21},
  doi          = {10.1007/978-3-319-02726-5\_21},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/CaoWHYL13,
  author       = {Xiaochun Cao and
                  Xingxing Wei and
                  Yahong Han and
                  Yi Yang and
                  Dongdai Lin},
  editor       = {Francesca Rossi},
  title        = {Robust Tensor Clustering with Non-Greedy Maximization},
  booktitle    = {{IJCAI} 2013, Proceedings of the 23rd International Joint Conference
                  on Artificial Intelligence, Beijing, China, August 3-9, 2013},
  pages        = {1254--1259},
  publisher    = {{IJCAI/AAAI}},
  year         = {2013},
  url          = {http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6533},
  timestamp    = {Tue, 23 Jan 2024 13:25:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/CaoWHYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Lu0L13,
  author       = {Yao Lu and
                  Rui Zhang and
                  Dongdai Lin},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Factoring {RSA} Modulus with Known Bits from Both p and q: {A} Lattice
                  Method},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {393--404},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_29},
  doi          = {10.1007/978-3-642-38631-2\_29},
  timestamp    = {Tue, 09 Feb 2021 08:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/Lu0L13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LvZL13,
  author       = {Jing Lv and
                  Bin Zhang and
                  Dongdai Lin},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Some New Weaknesses in the {RC4} Stream Cipher},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_2},
  doi          = {10.1007/978-3-319-05149-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LvZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuL13,
  author       = {Baofeng Wu and
                  Dongdai Lin},
  title        = {New constructions of quaternary bent functions},
  journal      = {CoRR},
  volume       = {abs/1309.0199},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.0199},
  eprinttype    = {arXiv},
  eprint       = {1309.0199},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZLC13,
  author       = {Yu Chen and
                  Zongyang Zhang and
                  Dongdai Lin and
                  Zhenfu Cao},
  title        = {Generalized (Identity-Based) Hash Proof System and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZLC13a,
  author       = {Yu Chen and
                  Zongyang Zhang and
                  Dongdai Lin and
                  Zhenfu Cao},
  title        = {CCA-Secure {IB-KEM} from Identity-Based Extractable Hash Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZLC13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LvZL13,
  author       = {Jing Lv and
                  Bin Zhang and
                  Dongdai Lin},
  title        = {Distinguishing Attacks on {RC4} and {A} New Improvement of the Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LvZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LvL13,
  author       = {Jing Lv and
                  Dongdai Lin},
  title        = {{L-P} States of {RC4} Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LvL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/LinFPW12,
  author       = {Dongdai Lin and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret and
                  Tianze Wang},
  title        = {On enumeration of polynomial equivalence classes and their application
                  to {MPKC}},
  journal      = {Finite Fields Their Appl.},
  volume       = {18},
  number       = {2},
  pages        = {283--302},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ffa.2011.09.001},
  doi          = {10.1016/J.FFA.2011.09.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/LinFPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/LinSY12,
  author       = {Dongdai Lin and
                  Tao Shi and
                  Zifeng Yang},
  title        = {Ergodic theory over F\({}_{\mbox{2}}\)[[T]]},
  journal      = {Finite Fields Their Appl.},
  volume       = {18},
  number       = {3},
  pages        = {473--491},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ffa.2011.11.001},
  doi          = {10.1016/J.FFA.2011.11.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/LinSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenZLC12,
  author       = {Yu Chen and
                  Zongyang Zhang and
                  Dongdai Lin and
                  Zhenfu Cao},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Identity-Based Extractable Hash Proofs and Their Applications},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {153--170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_10},
  doi          = {10.1007/978-3-642-31284-7\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChenZLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiuZL12,
  author       = {Meicheng Liu and
                  Yin Zhang and
                  Dongdai Lin},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Perfect Algebraic Immune Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {172--189},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_12},
  doi          = {10.1007/978-3-642-34961-4\_12},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ShiAL12,
  author       = {Tao Shi and
                  Vladimir Anashin and
                  Dongdai Lin},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Fast Evaluation of T-Functions via Time-Memory Trade-Offs},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {263--275},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_17},
  doi          = {10.1007/978-3-642-38519-3\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ShiAL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangLL12,
  author       = {Tianze Wang and
                  Meicheng Liu and
                  Dongdai Lin},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Construction of Resilient and Nonlinear Boolean Functions with Almost
                  Perfect Immunity to Algebraic and Fast Algebraic Attacks},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {276--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_18},
  doi          = {10.1007/978-3-642-38519-3\_18},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiLWZL12,
  author       = {Zhenqi Li and
                  Yao Lu and
                  Wenhao Wang and
                  Bin Zhang and
                  Dongdai Lin},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {A New Variant of Time Memory Trade-Off on the Improvement of Thing
                  and Ying's Attack},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {311--320},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_28},
  doi          = {10.1007/978-3-642-34129-8\_28},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiLWZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiZLZL12,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Yao Lu and
                  Jing Zou and
                  Dongdai Lin},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {321--330},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_29},
  doi          = {10.1007/978-3-642-34129-8\_29},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiZLZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiZYL12,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Yuan Yao and
                  Dongdai Lin},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Cube Cryptanalysis of LBlock with Noisy Leakage},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_11},
  doi          = {10.1007/978-3-642-37682-5\_11},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LiZYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhangL12,
  author       = {Xusheng Zhang and
                  Dongdai Lin},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Analysis of Optimum Pairing Products at High Security Levels},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {412--430},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_24},
  doi          = {10.1007/978-3-642-34931-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ZhangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/ZhangWL12,
  author       = {Xusheng Zhang and
                  Kunpeng Wang and
                  Dongdai Lin},
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {On Efficient Pairings on Elliptic Curves over Extension Fields},
  booktitle    = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36334-4\_1},
  doi          = {10.1007/978-3-642-36334-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/ZhangWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/ChenWL12,
  author       = {Shan Chen and
                  Kunpeng Wang and
                  Dongdai Lin},
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {An Improved Twisted Ate Pairing over {KSS} Curves with k = 18},
  booktitle    = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  pages        = {35--45},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36334-4\_3},
  doi          = {10.1007/978-3-642-36334-4\_3},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/ChenWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/LuZL12,
  author       = {Yao Lu and
                  Rui Zhang and
                  Dongdai Lin},
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {Stronger Security Model for Public-Key Encryption with Equality Test},
  booktitle    = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  pages        = {65--82},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36334-4\_5},
  doi          = {10.1007/978-3-642-36334-4\_5},
  timestamp    = {Wed, 06 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/LuZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChenZLC12,
  author       = {Yu Chen and
                  Zongyang Zhang and
                  Dongdai Lin and
                  Zhenfu Cao},
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {Anonymous Identity-Based Hash Proof System and Its Applications},
  booktitle    = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  pages        = {143--160},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2\_10},
  doi          = {10.1007/978-3-642-33272-2\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChenZLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HuangL12,
  author       = {Zhenyu Huang and
                  Dongdai Lin},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {A New Method for Solving Polynomial Systems with Noise over {\textdollar}{\textbackslash}mathbb\{F\}{\_}2{\textdollar}
                  and Its Applications in Cold Boot Key Recovery},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {16--33},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_2},
  doi          = {10.1007/978-3-642-35999-6\_2},
  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HuangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/ShiAL12,
  author       = {Tao Shi and
                  Vladimir Anashin and
                  Dongdai Lin},
  editor       = {Tor Helleseth and
                  Jonathan Jedwab},
  title        = {Linear Weaknesses in T-functions},
  booktitle    = {Sequences and Their Applications - {SETA} 2012 - 7th International
                  Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7280},
  pages        = {279--290},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30615-0\_26},
  doi          = {10.1007/978-3-642-30615-0\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/ShiAL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2011,
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34704-7},
  doi          = {10.1007/978-3-642-34704-7},
  isbn         = {978-3-642-34703-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLL12,
  author       = {Yin Zhang and
                  Meicheng Liu and
                  Dongdai Lin},
  title        = {On the Immunity of Rotation Symmetric Boolean Functions Against Fast
                  Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZL12,
  author       = {Meicheng Liu and
                  Yin Zhang and
                  Dongdai Lin},
  title        = {Perfect Algebraic Immune Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangWL12,
  author       = {Xusheng Zhang and
                  Kunpeng Wang and
                  Dongdai Lin},
  title        = {On Efficient Pairings on Elliptic Curves over Extension Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZL12a,
  author       = {Meicheng Liu and
                  Yin Zhang and
                  Dongdai Lin},
  title        = {On the immunity of Boolean functions against fast algebraic attacks
                  using bivariate polynomial representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZZL12,
  author       = {Yu Chen and
                  Jiang Zhang and
                  Zhenfeng Zhang and
                  Dongdai Lin},
  title        = {Integrated {PKE} and {PEKS} - Stronger Security Notions and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/692},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/ZhangLL11,
  author       = {Yin Zhang and
                  Meicheng Liu and
                  Dongdai Lin},
  title        = {On the nonexistence of Bent Functions},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {22},
  number       = {6},
  pages        = {1431--1438},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0129054111008799},
  doi          = {10.1142/S0129054111008799},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/ZhangLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiuLP11,
  author       = {Meicheng Liu and
                  Dongdai Lin and
                  Dingyi Pei},
  title        = {Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {7},
  pages        = {4817--4821},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2145690},
  doi          = {10.1109/TIT.2011.2145690},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiuLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuLP11,
  author       = {Meicheng Liu and
                  Dongdai Lin and
                  Dingyi Pei},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Results on the Immunity of Boolean Functions against Probabilistic
                  Algebraic Attacks},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_3},
  doi          = {10.1007/978-3-642-22497-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/HuangL11,
  author       = {Zhenyu Huang and
                  Dongdai Lin},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Attacking Bivium and Trivium with the Characteristic Set Method},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_5},
  doi          = {10.1007/978-3-642-21969-6\_5},
  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/HuangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DengFGLSY11,
  author       = {Yi Deng and
                  Dengguo Feng and
                  Vipul Goyal and
                  Dongdai Lin and
                  Amit Sahai and
                  Moti Yung},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {390--406},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_21},
  doi          = {10.1007/978-3-642-25385-0\_21},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DengFGLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZhouFL11,
  author       = {Chunfang Zhou and
                  Xiutao Feng and
                  Dongdai Lin},
  editor       = {Dongdai Lin and
                  Gene Tsudik and
                  Xiaoyun Wang},
  title        = {The Initialization Stage Analysis of {ZUC} v1.5},
  booktitle    = {Cryptology and Network Security - 10th International Conference, {CANS}
                  2011, Sanya, China, December 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7092},
  pages        = {40--53},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25513-7\_5},
  doi          = {10.1007/978-3-642-25513-7\_5},
  timestamp    = {Mon, 25 Nov 2019 15:32:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/ZhouFL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangCL11,
  author       = {Xusheng Zhang and
                  Shan Chen and
                  Dongdai Lin},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {210--226},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_16},
  doi          = {10.1007/978-3-642-34704-7\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangLLW11,
  author       = {Wenhao Wang and
                  Dongdai Lin and
                  Zhenqi Li and
                  Tianze Wang},
  editor       = {Sihan Qing and
                  Willy Susilo and
                  Guilin Wang and
                  Dongmei Liu},
  title        = {Improvement and Analysis of {VDP} Method in Time/Memory Tradeoff Applications},
  booktitle    = {Information and Communications Security - 13th International Conference,
                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7043},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25243-3\_23},
  doi          = {10.1007/978-3-642-25243-3\_23},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WangLLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/ZouLM11,
  author       = {Jing Zou and
                  Dongdai Lin and
                  Guo{-}Cui Mi},
  title        = {A universal distributed model for password cracking},
  booktitle    = {International Conference on Machine Learning and Cybernetics, {ICMLC}
                  2011, Guilin, China, July 10-13, 2011, Proceedings},
  pages        = {955--960},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICMLC.2011.6016851},
  doi          = {10.1109/ICMLC.2011.6016851},
  timestamp    = {Fri, 13 Aug 2021 09:26:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlc/ZouLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ZhangL11,
  author       = {Xusheng Zhang and
                  Dongdai Lin},
  editor       = {Liqun Chen},
  title        = {Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding
                  Degree 1 and 2},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {309--326},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_19},
  doi          = {10.1007/978-3-642-25516-8\_19},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/ZhangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2011,
  editor       = {Dongdai Lin and
                  Gene Tsudik and
                  Xiaoyun Wang},
  title        = {Cryptology and Network Security - 10th International Conference, {CANS}
                  2011, Sanya, China, December 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7092},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25513-7},
  doi          = {10.1007/978-3-642-25513-7},
  isbn         = {978-3-642-25512-0},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2009,
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-16342-5},
  doi          = {10.1007/978-3-642-16342-5},
  isbn         = {978-3-642-16341-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21518-6},
  doi          = {10.1007/978-3-642-21518-6},
  isbn         = {978-3-642-21517-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-4635,
  author       = {Tao Shi and
                  Vladimir Anashin and
                  Dongdai Lin},
  title        = {Linear Relation on General Ergodic T-Function},
  journal      = {CoRR},
  volume       = {abs/1111.4635},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.4635},
  eprinttype    = {arXiv},
  eprint       = {1111.4635},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-4635.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinFPW11,
  author       = {Dongdai Lin and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret and
                  Tianze Wang},
  title        = {On Enumeration of Polynomial Equivalence Classes and Their Application
                  to {MPKC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinFPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinSY11,
  author       = {Dongdai Lin and
                  Tao Shi and
                  Zifeng Yang},
  title        = {Ergodic Theory Over F\({}_{\mbox{2[[T]]}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuLZ11,
  author       = {Lei Xu and
                  Dongdai Lin and
                  Jing Zou},
  title        = {{ECDLP} on {GPU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengFGLSY11,
  author       = {Yi Deng and
                  Dengguo Feng and
                  Vipul Goyal and
                  Dongdai Lin and
                  Amit Sahai and
                  Moti Yung},
  title        = {Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengFGLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiuL10a,
  author       = {Hanwu Liu and
                  Dongdai Lin},
  title        = {A two-round honest-verifier zero-knowledge protocol},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {5},
  pages        = {954--963},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0082-0},
  doi          = {10.1007/S11432-010-0082-0},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiuL10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/XuL10,
  author       = {Lei Xu and
                  Dongdai Lin},
  editor       = {Josef Pieprzyk},
  title        = {Refinement of Miller's Algorithm Over Edwards Curves},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {106--118},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_8},
  doi          = {10.1007/978-3-642-11925-5\_8},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/XuL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuL10,
  author       = {Lei Xu and
                  Dongdai Lin},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Accelerating Inverse of \emph{GF}(2\({}^{\mbox{\emph{n}}}\)) with
                  Precomputation},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {85--95},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_7},
  doi          = {10.1007/978-3-642-12827-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuLL10,
  author       = {Lin Xu and
                  Dongdai Lin and
                  Xin Li},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {A New Efficient Algorithm for Computing All Low Degree Annihilators
                  of Sparse Polynomials with a High Number of Variables},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_10},
  doi          = {10.1007/978-3-642-12827-1\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr/DengCLF09,
  author       = {Yi Deng and
                  Giovanni Di Crescenzo and
                  Dongdai Lin and
                  Dengguo Feng},
  editor       = {Anna E. Frid and
                  Andrey Morozov and
                  Andrey Rybalchenko and
                  Klaus W. Wagner},
  title        = {Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key
                  Model},
  booktitle    = {Computer Science - Theory and Applications, Fourth International Computer
                  Science Symposium in Russia, {CSR} 2009, Novosibirsk, Russia, August
                  18-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5675},
  pages        = {80--91},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03351-3\_10},
  doi          = {10.1007/978-3-642-03351-3\_10},
  timestamp    = {Mon, 01 Mar 2021 13:46:21 +0100},
  biburl       = {https://dblp.org/rec/conf/csr/DengCLF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HuangLZ09,
  author       = {Guifang Huang and
                  Dongdai Lin and
                  Yanshuo Zhang},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {93--101},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_9},
  doi          = {10.1007/978-3-642-00843-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HuangLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2008x,
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01440-6},
  doi          = {10.1007/978-3-642-01440-6},
  isbn         = {978-3-642-01439-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2008x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-4632,
  author       = {Meicheng Liu and
                  Dongdai Lin},
  title        = {Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions},
  journal      = {CoRR},
  volume       = {abs/0910.4632},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.4632},
  eprinttype    = {arXiv},
  eprint       = {0910.4632},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-4632.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DengL08,
  author       = {Yi Deng and
                  Dongdai Lin},
  title        = {Novel Omega-protocols for {NP}},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {51},
  number       = {1},
  pages        = {40--52},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11432-008-0004-6},
  doi          = {10.1007/S11432-008-0004-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/DengL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/TartaryZLWP08,
  author       = {Christophe Tartary and
                  Sujing Zhou and
                  Dongdai Lin and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Analysis of bilinear pairing-based accumulator for identity escrowing},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {99--107},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070091},
  doi          = {10.1049/IET-IFS:20070091},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/TartaryZLWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuLG08,
  author       = {Zaiqiang Liu and
                  Dongdai Lin and
                  Fengdeng Guo},
  title        = {A Method for Locating Digital Evidences with Outlier Detection Using
                  Support Vector Machine},
  journal      = {Int. J. Netw. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {301--308},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n3/ijns-2008-v6-n3-p301-308.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuLG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2008,
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79499-8},
  doi          = {10.1007/978-3-540-79499-8},
  isbn         = {978-3-540-79498-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuLWF07,
  author       = {ZhenYu Hu and
                  Dongdai Lin and
                  Wenling Wu and
                  Dengguo Feng},
  title        = {Constructing parallel long-message signcryption scheme from trapdoor
                  permutation},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {50},
  number       = {1},
  pages        = {82--98},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11432-007-2018-x},
  doi          = {10.1007/S11432-007-2018-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuLWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JiangLXL07,
  author       = {Zhonghua Jiang and
                  Dongdai Lin and
                  Lin Xu and
                  Lei Lin},
  title        = {Distributed Cryptographic Computing on Grid},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {179--186},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p179-186.pdf},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JiangLXL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangLW07,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  title        = {Related-Mode Attacks on {CTR} Encryption Mode},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {282--287},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p282-287.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangLW07a,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  title        = {Another Look at {PMAC}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {16--20},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n1/ijns-2007-v5-n1-p16-20.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangLW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/DengL08,
  author       = {Yi Deng and
                  Dongdai Lin},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key
                  Model under Standard Assumption},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_11},
  doi          = {10.1007/978-3-540-79499-8\_11},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/DengL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhouL08,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Unlinkable Randomizable Signature and Its Application in Group Signature},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {328--342},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_26},
  doi          = {10.1007/978-3-540-79499-8\_26},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhouL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DengL07,
  author       = {Yi Deng and
                  Dongdai Lin},
  editor       = {Moni Naor},
  title        = {Instance-Dependent Verifiable Random Functions and Their Application
                  to Simultaneous Resettability},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {148--168},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_9},
  doi          = {10.1007/978-3-540-72540-4\_9},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DengL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL07a,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {An Interesting Member ID-based Group Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL07b,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {Unlinkable Randomizable Signature and Its Application in Group Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/CaoL06,
  author       = {Tianjie Cao and
                  Dongdai Lin},
  title        = {Cryptanalysis of two password authenticated key exchange protocols
                  based on {RSA}},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {10},
  number       = {8},
  pages        = {623--625},
  year         = {2006},
  url          = {https://doi.org/10.1109/LCOMM.2006.1665131},
  doi          = {10.1109/LCOMM.2006.1665131},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/CaoL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoLX06,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  title        = {Security Analysis of Some Batch Verifying Signatures from Pairings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {138--143},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p138-143.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoLX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WuZL06,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dongdai Lin},
  title        = {Security on Generalized Feistel Scheme with {SP} Round Function},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {215--224},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p215-224.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WuZL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangLW06,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {An Improved Poly1305 {MAC}},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {284--292},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_19},
  doi          = {10.1007/11767480\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WangLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZhouL06,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  editor       = {David Pointcheval and
                  Yi Mu and
                  Kefei Chen},
  title        = {Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps},
  booktitle    = {Cryptology and Network Security, 5th International Conference, {CANS}
                  2006, Suzhou, China, December 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4301},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935070\_8},
  doi          = {10.1007/11935070\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ZhouL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangLW06,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {{OPMAC:} One-Key Poly1305 {MAC}},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {78--87},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_7},
  doi          = {10.1007/11937807\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CaoML06,
  author       = {Tianjie Cao and
                  Xianping Mao and
                  Dongdai Lin},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Security Analysis of a Server-Aided {RSA} Key Generation Protocol},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {314--320},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_29},
  doi          = {10.1007/11689522\_29},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CaoML06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JiangLXL06,
  author       = {Zhonghua Jiang and
                  Dongdai Lin and
                  Lin Xu and
                  Lei Lin},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Integrating Grid with Cryptographic Computing},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {321--331},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_30},
  doi          = {10.1007/11689522\_30},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/JiangLXL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2006,
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807},
  doi          = {10.1007/11937807},
  isbn         = {3-540-49608-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0607035,
  author       = {Yi Deng and
                  Dongdai Lin},
  title        = {Resettable Zero Knowledge in the Bare Public-Key Model under Standard
                  Assumption},
  journal      = {CoRR},
  volume       = {abs/cs/0607035},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0607035},
  eprinttype    = {arXiv},
  eprint       = {cs/0607035},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0607035.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0609057,
  author       = {Yi Deng and
                  Giovanni Di Crescenzo and
                  Dongdai Lin},
  title        = {Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key
                  Model},
  journal      = {CoRR},
  volume       = {abs/cs/0609057},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0609057},
  eprinttype    = {arXiv},
  eprint       = {cs/0609057},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0609057.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL06,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {A Shorter Group Signature with Verifier-Location Revocation and Backward
                  Unlinkability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengL06,
  author       = {Yi Deng and
                  Dongdai Lin},
  title        = {Resettable Zero Knowledge in the Bare Public-Key Model under Standard
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL06a,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengCL06,
  author       = {Yi Deng and
                  Giovanni Di Crescenzo and
                  Dongdai Lin},
  title        = {Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaoLX05,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  title        = {A randomized RSA-based partially blind signature scheme for electronic
                  cash},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {44--49},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2004.05.008},
  doi          = {10.1016/J.COSE.2004.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaoLX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CaoLX05,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  title        = {An Efficient ID-Based Deniable Authentication Protocol from Pairings},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {388--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.100},
  doi          = {10.1109/AINA.2005.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CaoLX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CaoLX05a,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  title        = {ID-Based Ring Authenticated Encryption},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {591--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.203},
  doi          = {10.1109/AINA.2005.203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CaoLX05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhouL05,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {On Anonymity of Group Signatures},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {131--136},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_19},
  doi          = {10.1007/11596981\_19},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhouL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLW05,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {A Variant of Poly1305 {MAC} and Its Security Proof},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {375--380},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_55},
  doi          = {10.1007/11596981\_55},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/WangLW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CaoLX05,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Universal Designated-Verifier Proxy Blind Signatures for E-Commerce},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {1036--1041},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_154},
  doi          = {10.1007/11596981\_154},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/CaoLX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CaoL05,
  author       = {Tianjie Cao and
                  Dongdai Lin},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Security Analysis of Some Threshold Signature Schemes and Multi-signature
                  Schemes},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {233--241},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_20},
  doi          = {10.1007/11599548\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CaoL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/QuSLF05,
  author       = {Haipeng Qu and
                  Purui Su and
                  Dongdai Lin and
                  Dengguo Feng},
  editor       = {Pascal Lorenz and
                  Petre Dini},
  title        = {A Packet Marking Scheme for {IP} Traceback},
  booktitle    = {Networking - {ICN} 2005, 4th International Conference on Networking,
                  ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3421},
  pages        = {964--971},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31957-3\_109},
  doi          = {10.1007/978-3-540-31957-3\_109},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icn/QuSLF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skg/JiangXLWL05,
  author       = {Zhonghua Jiang and
                  Lin Xu and
                  Lei Lin and
                  Dayin Wang and
                  Dongdai Lin},
  title        = {A Distributed Cryptographic Computing System},
  booktitle    = {2005 International Conference on Semantics, Knowledge and Grid {(SKG}
                  2005), 27-29 November 2005, Beijing, China},
  pages        = {115},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SKG.2005.5},
  doi          = {10.1109/SKG.2005.5},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/skg/JiangXLWL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2005,
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548},
  doi          = {10.1007/11599548},
  isbn         = {3-540-30855-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL05,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {Analyzing Unlinkability of Some Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL05a,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {On Anonymity of Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangGKLLZ04,
  author       = {Paul S. Wang and
                  Simon Gray and
                  Norbert Kajler and
                  Dongdai Lin and
                  Weidong Liao and
                  Xiao Zou},
  title        = {The Internet accessible mathematical computation framework},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {47},
  number       = {1},
  pages        = {75--88},
  year         = {2004},
  url          = {https://doi.org/10.1360/02yf0174},
  doi          = {10.1360/02YF0174},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangGKLLZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awcc/CaoLX04,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  editor       = {Chi{-}Hung Chi and
                  Kwok{-}Yan Lam},
  title        = {Security Analysis of User Efficient Blind Signatures},
  booktitle    = {Content Computing, Advanced Workshop on Content Computing, {AWCC}
                  2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3309},
  pages        = {167--172},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30483-8\_21},
  doi          = {10.1007/978-3-540-30483-8\_21},
  timestamp    = {Sun, 02 Jun 2019 21:13:11 +0200},
  biburl       = {https://dblp.org/rec/conf/awcc/CaoLX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awcc/CaoLX04a,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  editor       = {Chi{-}Hung Chi and
                  Kwok{-}Yan Lam},
  title        = {Improved Privacy-Protecting Proxy Signature Scheme},
  booktitle    = {Content Computing, Advanced Workshop on Content Computing, {AWCC}
                  2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3309},
  pages        = {208--213},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30483-8\_25},
  doi          = {10.1007/978-3-540-30483-8\_25},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/awcc/CaoLX04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/WuYZL04,
  author       = {Yongwei Wu and
                  Guangwen Yang and
                  Weimin Zheng and
                  Dongdai Lin},
  editor       = {Marian Bubak and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {DisCAS: {A} Distributed-Parallel Computer Algebra System},
  booktitle    = {Computational Science - {ICCS} 2004, 4th International Conference,
                  Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3039},
  pages        = {295--302},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25944-2\_38},
  doi          = {10.1007/978-3-540-25944-2\_38},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/WuYZL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceb/XiaoL04,
  author       = {Jianfang Xiao and
                  Dongdai Lin},
  editor       = {Jian Chen},
  title        = {Survey of Security in Grid Services},
  booktitle    = {The Fourth International Conference on Electronic Business - Shaping
                  Business Strategy in a Networked World},
  pages        = {1241--1245},
  publisher    = {Academic Publishers/World Publishing Corporation},
  year         = {2004},
  timestamp    = {Tue, 22 Feb 2005 15:21:39 +0100},
  biburl       = {https://dblp.org/rec/conf/iceb/XiaoL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZL04,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dongdai Lin},
  title        = {Security on Generalized Feistel Scheme with {SP} Round Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/WangGKLLZ01,
  author       = {Paul S. Wang and
                  Simon Gray and
                  Norbert Kajler and
                  Dongdai Lin and
                  Weidong Liao and
                  Xiao Zou},
  editor       = {Erich L. Kaltofen and
                  Gilles Villard},
  title        = {{IAMC} architecture and prototyping: a progress report},
  booktitle    = {Proceedings of the 2001 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} 2001, {ORCCA} {\&} University of Western
                  Ontario, London, Ontario, Canada, July 22-25, 2001},
  pages        = {337--344},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/384101.384147},
  doi          = {10.1145/384101.384147},
  timestamp    = {Mon, 03 Apr 2023 17:23:32 +0200},
  biburl       = {https://dblp.org/rec/conf/issac/WangGKLLZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LinL99,
  author       = {Dongdai Lin and
                  Zhuojun Liu},
  title        = {Object-oriented analysis of {ELIMINO}},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {14},
  number       = {5},
  pages        = {487--494},
  year         = {1999},
  url          = {https://doi.org/10.1007/BF02948790},
  doi          = {10.1007/BF02948790},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/LinL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/LinL93,
  author       = {Dongdai Lin and
                  Mulan Liu},
  title        = {The Equivalence Classes of {LR} Arrays},
  journal      = {Discret. Appl. Math.},
  volume       = {43},
  number       = {1},
  pages        = {47--61},
  year         = {1993},
  url          = {https://doi.org/10.1016/0166-218X(93)90168-N},
  doi          = {10.1016/0166-218X(93)90168-N},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/LinL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LinL93,
  author       = {Dongdai Lin and
                  Mulan Liu},
  title        = {Structure and properties of linear recurring m-arrays},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {39},
  number       = {5},
  pages        = {1758--1762},
  year         = {1993},
  url          = {https://doi.org/10.1109/18.259672},
  doi          = {10.1109/18.259672},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LinL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/LinL93,
  author       = {Dongdai Lin and
                  Zhuojun Liu},
  editor       = {Manuel Bronstein},
  title        = {Some Results on Theorem Proving in Geometry over Finite Fields},
  booktitle    = {Proceedings of the 1993 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} '93, Kiev, Ukraine, July 6-8, 1993},
  pages        = {292--300},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/164081.164143},
  doi          = {10.1145/164081.164143},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issac/LinL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LinL88,
  author       = {Dongdai Lin and
                  Mulan Liu},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Linear Recurring m-Arrays},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {351--357},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_33},
  doi          = {10.1007/3-540-45961-8\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LinL88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics