Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dongdai Lin
@article{DBLP:journals/cj/WangLLM23, author = {Shichang Wang and Meicheng Liu and Dongdai Lin and Li Ma}, title = {On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80}, journal = {Comput. J.}, volume = {66}, number = {6}, pages = {1376--1399}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac016}, doi = {10.1093/COMJNL/BXAC016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangLLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuWL23, author = {Yaqi Xu and Baofeng Wu and Dongdai Lin}, title = {New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey}, journal = {Comput. J.}, volume = {66}, number = {9}, pages = {2279--2295}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac076}, doi = {10.1093/COMJNL/BXAC076}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/XuWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiJL23, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, title = {Properties of the cycles that contain all vectors of weight {\textdollar}{\textbackslash}le k{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {221--239}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01100-9}, doi = {10.1007/S10623-022-01100-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/LiWL23, author = {Zhengnan Li and Baofeng Wu and Dongdai Lin}, title = {Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers}, journal = {J. Syst. Sci. Complex.}, volume = {36}, number = {6}, pages = {2681--2702}, year = {2023}, url = {https://doi.org/10.1007/s11424-023-1511-7}, doi = {10.1007/S11424-023-1511-7}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jossac/LiWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/XuDWL23, author = {Luyao Xu and Zhengyi Dai and Baofeng Wu and Dongdai Lin}, title = {Improved Attacks on {(EC)DSA} with Nonce Leakage by Lattice Sieving with Predicate}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {568--586}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.568-586}, doi = {10.46586/TCHES.V2023.I2.568-586}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/XuDWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLCWTL23, author = {Wenhao Wang and Weijie Liu and Hongbo Chen and XiaoFeng Wang and Hongliang Tian and Dongdai Lin}, title = {Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {522--538}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2021.3138427}, doi = {10.1109/TDSC.2021.3138427}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLCWTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiL23, author = {Ming Li and Dongdai Lin}, title = {Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {1}, pages = {598--609}, year = {2023}, url = {https://doi.org/10.1109/TIT.2022.3201519}, doi = {10.1109/TIT.2022.3201519}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JiangLL23, author = {Yupeng Jiang and Ming Li and Dongdai Lin}, title = {Proofs of Conjectures on Extremal Weight De Bruijn Sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {8}, pages = {5357--5363}, year = {2023}, url = {https://doi.org/10.1109/TIT.2023.3263532}, doi = {10.1109/TIT.2023.3263532}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/JiangLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangLHL23, author = {Shichang Wang and Meicheng Liu and Shiqi Hou and Dongdai Lin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Moving a Step of ChaCha in Syncopated Rhythm}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {273--304}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_10}, doi = {10.1007/978-3-031-38548-3\_10}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WangLHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuoWL23, author = {Chun Guo and Lei Wang and Dongdai Lin}, editor = {Carmit Hazay and Martijn Stam}, title = {Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {408--439}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_14}, doi = {10.1007/978-3-031-30634-1\_14}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuoWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiZL23, author = {Shuaishuai Li and Cong Zhang and Dongdai Lin}, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {Oblivious Transfer from Rerandomizable {PKE}}, booktitle = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {128--145}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9\_8}, doi = {10.1007/978-981-99-7356-9\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangLDL23, author = {Cong Zhang and Weiran Liu and Bolin Ding and Dongdai Lin}, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {Efficient Private Multiset {ID} Protocols}, booktitle = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {351--369}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9\_21}, doi = {10.1007/978-981-99-7356-9\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangLDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Zhang0LZL23, author = {Cong Zhang and Yu Chen and Weiran Liu and Min Zhang and Dongdai Lin}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Linear Private Set Union from Multi-Query Reverse Private Membership Test}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {337--354}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-cong}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Zhang0LZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoWL23, author = {Chun Guo and Lei Wang and Dongdai Lin}, title = {Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2023}, url = {https://eprint.iacr.org/2023/226}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLDL23, author = {Cong Zhang and Weiran Liu and Bolin Ding and Dongdai Lin}, title = {Efficient Private Multiset {ID} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2023}, url = {https://eprint.iacr.org/2023/986}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiZL23, author = {Shuaishuai Li and Cong Zhang and Dongdai Lin}, title = {Oblivious Transfer from Rerandomizable {PKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1002}, year = {2023}, url = {https://eprint.iacr.org/2023/1002}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangLHL23, author = {Shichang Wang and Meicheng Liu and Shiqi Hou and Dongdai Lin}, title = {Moving a Step of ChaCha in Syncopated Rhythm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1087}, year = {2023}, url = {https://eprint.iacr.org/2023/1087}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangLHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLPZGLZLH23, author = {Shuaishuai Li and Weiran Liu and Liqiang Peng and Cong Zhang and Xinwei Gao and Aiping Liang and Lei Zhang and Dongdai Lin and Yuan Hong}, title = {Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1619}, year = {2023}, url = {https://eprint.iacr.org/2023/1619}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiLPZGLZLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZL23, author = {Xianghan Wang and Jianghua Zhong and Dongdai Lin}, title = {Cycle Structure and Observability of Two Types of Galois NFSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1847}, year = {2023}, url = {https://eprint.iacr.org/2023/1847}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HouLL22, author = {Lin Hou and Dongdai Lin and Renzhang Liu}, title = {Hierarchical group signature with verifier-local revocation revisited}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {8}, pages = {1--3}, year = {2022}, url = {https://doi.org/10.1007/s11432-019-2709-7}, doi = {10.1007/S11432-019-2709-7}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HouLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/KongZL22, author = {Wenhui Kong and Jianghua Zhong and Dongdai Lin}, title = {Observability of Galois nonlinear feedback shift registers}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {9}, pages = {1--16}, year = {2022}, url = {https://doi.org/10.1007/s11432-021-3346-6}, doi = {10.1007/S11432-021-3346-6}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/KongZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/LuLLL22, author = {Xiaojuan Lu and Bohan Li and Meicheng Liu and Dongdai Lin}, title = {Improved conditional differential attacks on lightweight hash family {QUARK}}, journal = {Cybersecur.}, volume = {5}, number = {1}, pages = {12}, year = {2022}, url = {https://doi.org/10.1186/s42400-021-00108-3}, doi = {10.1186/S42400-021-00108-3}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/LuLLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiL22, author = {Ming Li and Dongdai Lin}, title = {The Adjacency Graphs of FSRs With Affine Characteristic Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {1}, pages = {649--658}, year = {2022}, url = {https://doi.org/10.1109/TIT.2021.3120841}, doi = {10.1109/TIT.2021.3120841}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangLL22, author = {Cong Zhang and Shuaishuai Li and Dongdai Lin}, editor = {Yi Deng and Moti Yung}, title = {Amortizing Division and Exponentiation}, booktitle = {Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13837}, pages = {192--210}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26553-2\_10}, doi = {10.1007/978-3-031-26553-2\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiWL22, author = {Chenmeng Li and Baofeng Wu and Dongdai Lin}, editor = {Yi Deng and Moti Yung}, title = {Generalized Boomerang Connectivity Table and Improved Cryptanalysis of {GIFT}}, booktitle = {Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13837}, pages = {213--233}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26553-2\_11}, doi = {10.1007/978-3-031-26553-2\_11}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LiWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangLLL22, author = {Lulu Zhang and Meicheng Liu and Shuaishuai Li and Dongdai Lin}, editor = {Yi Deng and Moti Yung}, title = {Cryptanalysis of Ciminion}, booktitle = {Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13837}, pages = {234--251}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26553-2\_12}, doi = {10.1007/978-3-031-26553-2\_12}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangLLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiZL22, author = {Bohan Li and Hailong Zhang and Dongdai Lin}, editor = {Yi Deng and Moti Yung}, title = {Higher-Order Masking Scheme for Trivium Hardware Implementation}, booktitle = {Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13837}, pages = {337--356}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26553-2\_18}, doi = {10.1007/978-3-031-26553-2\_18}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LiZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/PanZL22, author = {Yingyin Pan and Jianghua Zhong and Dongdai Lin}, title = {Nonsingularity of Galois Nonlinear Feedback Shift Registers}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2022, Espoo, Finland, June 26 - July 1, 2022}, pages = {366--371}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISIT50566.2022.9834495}, doi = {10.1109/ISIT50566.2022.9834495}, timestamp = {Mon, 08 Aug 2022 16:44:13 +0200}, biburl = {https://dblp.org/rec/conf/isit/PanZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/YangQJFL22, author = {Minghui Yang and Shiyuan Qiang and Xiaoyan Jing and Keqin Feng and Dongdai Lin}, title = {The 4-Adic Complexity of Quaternary Sequences of Even Period With Ideal Autocorrelation}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2022, Espoo, Finland, June 26 - July 1, 2022}, pages = {528--531}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISIT50566.2022.9834582}, doi = {10.1109/ISIT50566.2022.9834582}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/YangQJFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-1, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3}, doi = {10.1007/978-3-031-22963-3}, isbn = {978-3-031-22962-6}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-2, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4}, doi = {10.1007/978-3-031-22966-4}, isbn = {978-3-031-22965-7}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-3, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5}, doi = {10.1007/978-3-031-22969-5}, isbn = {978-3-031-22968-8}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-4, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5}, doi = {10.1007/978-3-031-22972-5}, isbn = {978-3-031-22971-8}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangCLZL22, author = {Cong Zhang and Yu Chen and Weiran Liu and Min Zhang and Dongdai Lin}, title = {Optimal Private Set Union from Multi-Query Reverse Private Membership Test}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2022}, url = {https://eprint.iacr.org/2022/358}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangCLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/HuLZ21, author = {Zhi Hu and Dongdai Lin and Chang{-}An Zhao}, title = {Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems}, journal = {Appl. Math. Comput.}, volume = {404}, pages = {126239}, year = {2021}, url = {https://doi.org/10.1016/j.amc.2021.126239}, doi = {10.1016/J.AMC.2021.126239}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/HuLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/WangWHL21, author = {Xuzi Wang and Baofeng Wu and Lin Hou and Dongdai Lin}, title = {Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers}, journal = {Cybersecur.}, volume = {4}, number = {1}, pages = {17}, year = {2021}, url = {https://doi.org/10.1186/s42400-021-00081-x}, doi = {10.1186/S42400-021-00081-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/WangWHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/HuangSL21, author = {Zhenyu Huang and Yao Sun and Dongdai Lin}, title = {Analyzing Boolean Functions via Solving Parametric Polynomial Systems}, journal = {J. Syst. Sci. Complex.}, volume = {34}, number = {2}, pages = {792--808}, year = {2021}, url = {https://doi.org/10.1007/s11424-020-9209-6}, doi = {10.1007/S11424-020-9209-6}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jossac/HuangSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/HuangSL21, author = {Zhenyu Huang and Yao Sun and Dongdai Lin}, title = {On the efficiency of solving Boolean polynomial systems with the characteristic set method}, journal = {J. Symb. Comput.}, volume = {103}, pages = {66--94}, year = {2021}, url = {https://doi.org/10.1016/j.jsc.2019.11.001}, doi = {10.1016/J.JSC.2019.11.001}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/HuangSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiL21, author = {Ming Li and Dongdai Lin}, title = {Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {10}, pages = {6940--6951}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3102523}, doi = {10.1109/TIT.2021.3102523}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/LiL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangHLL21, author = {Shichang Wang and Shiqi Hou and Meicheng Liu and Dongdai Lin}, editor = {Yu Yu and Moti Yung}, title = {Differential-Linear Cryptanalysis of the Lightweight Crytographic Algorithm {KNOT}}, booktitle = {Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13007}, pages = {171--190}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88323-2\_9}, doi = {10.1007/978-3-030-88323-2\_9}, timestamp = {Tue, 19 Oct 2021 18:32:12 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangHLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KongZL21, author = {Wenhui Kong and Jianghua Zhong and Dongdai Lin}, editor = {Yu Yu and Moti Yung}, title = {Isomorphism and Equivalence of Galois Nonlinear Feedback Shift Registers}, booktitle = {Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13007}, pages = {301--315}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88323-2\_16}, doi = {10.1007/978-3-030-88323-2\_16}, timestamp = {Tue, 19 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KongZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhengJLQ21, author = {Qun{-}Xiong Zheng and Yupeng Jiang and Dongdai Lin and Wen{-}Feng Qi}, editor = {Yu Yu and Moti Yung}, title = {Binary Sequences Derived from Monomial Permutation Polynomials over GF(2\({}^{\mbox{p}}\))}, booktitle = {Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13007}, pages = {371--383}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88323-2\_20}, doi = {10.1007/978-3-030-88323-2\_20}, timestamp = {Tue, 19 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhengJLQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuLL21, author = {Meicheng Liu and Xiaojuan Lu and Dongdai Lin}, editor = {Tal Malkin and Chris Peikert}, title = {Differential-Linear Cryptanalysis from an Algebraic Perspective}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {247--277}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_9}, doi = {10.1007/978-3-030-84252-9\_9}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XuWL21, author = {Yaqi Xu and Baofeng Wu and Dongdai Lin}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Rotational-Linear Attack: {A} New Framework of Cryptanalysis on {ARX} Ciphers with Applications to Chaskey}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {192--209}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_12}, doi = {10.1007/978-3-030-88052-1\_12}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/XuWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LiJL21, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, title = {Construction of De Bruijn Sequences from l-sequences}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2021, Melbourne, Australia, July 12-20, 2021}, pages = {1522--1527}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIT45174.2021.9517782}, doi = {10.1109/ISIT45174.2021.9517782}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/LiJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/YangQFL21, author = {Minghui Yang and Shiyuan Qiang and Keqin Feng and Dongdai Lin}, title = {On the 4-Adic Complexity of Quaternary Sequences of Period {\textdollar}2p{\textdollar} with Ideal Autocorrelation}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2021, Melbourne, Australia, July 12-20, 2021}, pages = {1812--1816}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIT45174.2021.9518210}, doi = {10.1109/ISIT45174.2021.9518210}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/YangQFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/PanZL21, author = {Yingyin Pan and Jianghua Zhong and Dongdai Lin}, title = {On Galois NFSRs with Terminal Bits}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2021, Melbourne, Australia, July 12-20, 2021}, pages = {3062--3067}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIT45174.2021.9517929}, doi = {10.1109/ISIT45174.2021.9517929}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/PanZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/LuLWL21, author = {Xiaojuan Lu and Bohan Li and Shichang Wang and Dongdai Lin}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Conditional Differential Cryptanalysis on Bagua}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {178--189}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_13}, doi = {10.1007/978-3-031-17510-7\_13}, timestamp = {Fri, 21 Oct 2022 16:47:32 +0200}, biburl = {https://dblp.org/rec/conf/secitc/LuLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-03574, author = {Minghui Yang and Shiyuan Qiang and Xiaoyan Jing and Keqin Feng and Dongdai Lin}, title = {On the 4-Adic Complexity of Quaternary Sequences with Ideal Autocorrelation}, journal = {CoRR}, volume = {abs/2107.03574}, year = {2021}, url = {https://arxiv.org/abs/2107.03574}, eprinttype = {arXiv}, eprint = {2107.03574}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-03574.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhongPKL21, author = {Jianghua Zhong and Yingyin Pan and Wenhui Kong and Dongdai Lin}, title = {Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2021}, url = {https://eprint.iacr.org/2021/928}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhongPKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanZL21, author = {Yingyin Pan and Jianghua Zhong and Dongdai Lin}, title = {On the Nonsingularity and Equivalence of NFSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1062}, year = {2021}, url = {https://eprint.iacr.org/2021/1062}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuWL21, author = {Yaqi Xu and Baofeng Wu and Dongdai Lin}, title = {Rotational-Linear Attack: {A} New Framework of Cryptanalysis on {ARX} ciphers with Applications to Chaskey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1690}, year = {2021}, url = {https://eprint.iacr.org/2021/1690}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/XuWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MaL20, author = {Xuecheng Ma and Dongdai Lin}, title = {Server-aided Revocable {IBE} with Identity Reuse}, journal = {Comput. J.}, volume = {63}, number = {4}, pages = {620--632}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz114}, doi = {10.1093/COMJNL/BXZ114}, timestamp = {Wed, 10 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MaL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiangL20, author = {Yupeng Jiang and Dongdai Lin}, title = {Longest subsequences shared by two de Bruijn sequences}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1463--1475}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00759-2}, doi = {10.1007/S10623-020-00759-2}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/GaoLLW20, author = {Guangpu Gao and Dongdai Lin and Wenfen Liu and Yongjuan Wang}, title = {Composition of Boolean functions: An application to the secondary constructions of bent functions}, journal = {Discret. Math.}, volume = {343}, number = {3}, pages = {111711}, year = {2020}, url = {https://doi.org/10.1016/j.disc.2019.111711}, doi = {10.1016/J.DISC.2019.111711}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dm/GaoLLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/LiuZL20, author = {Junying Liu and Qunxiong Zheng and Dongdai Lin}, title = {A New Upper Bound on the Order of Affine Sub-families of NFSRs}, journal = {J. Syst. Sci. Complex.}, volume = {33}, number = {1}, pages = {196--214}, year = {2020}, url = {https://doi.org/10.1007/s11424-019-8072-9}, doi = {10.1007/S11424-019-8072-9}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/LiuZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/LiLL20, author = {Bohan Li and Meicheng Liu and Dongdai Lin}, title = {{FPGA} implementations of Grain v1, Mickey 2.0, Trivium, Lizard and Plantlet}, journal = {Microprocess. Microsystems}, volume = {78}, pages = {103210}, year = {2020}, url = {https://doi.org/10.1016/j.micpro.2020.103210}, doi = {10.1016/J.MICPRO.2020.103210}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/LiLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhuWZLL20, author = {Yuqing Zhu and Jiejing Wen and Jincheng Zhuang and Chang Lv and Dongdai Lin}, title = {Refined analysis to the extended tower number field sieve}, journal = {Theor. Comput. Sci.}, volume = {814}, pages = {49--68}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.01.010}, doi = {10.1016/J.TCS.2020.01.010}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ZhuWZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiJL20, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, editor = {Yongdong Wu and Moti Yung}, title = {On the k-Error Linear Complexities of De Bruijn Sequences}, booktitle = {Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12612}, pages = {344--356}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-71852-7\_23}, doi = {10.1007/978-3-030-71852-7\_23}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LiJL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhongPL20, author = {Jianghua Zhong and Yingyin Pan and Dongdai Lin}, editor = {Yongdong Wu and Moti Yung}, title = {On Galois NFSRs Equivalent to Fibonacci Ones}, booktitle = {Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12612}, pages = {433--449}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-71852-7\_29}, doi = {10.1007/978-3-030-71852-7\_29}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhongPL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/0033JL20, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, title = {The Numbers of De Bruijn Sequences in Extremal Weight Classes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2020, Los Angeles, CA, USA, June 21-26, 2020}, pages = {2909--2914}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISIT44484.2020.9174413}, doi = {10.1109/ISIT44484.2020.9174413}, timestamp = {Tue, 15 Sep 2020 10:18:53 +0200}, biburl = {https://dblp.org/rec/conf/isit/0033JL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhongL19, author = {Jianghua Zhong and Dongdai Lin}, title = {Decomposition of nonlinear feedback shift registers based on Boolean networks}, journal = {Sci. China Inf. Sci.}, volume = {62}, number = {3}, pages = {39110:1--39110:3}, year = {2019}, url = {https://doi.org/10.1007/s11432-017-9460-4}, doi = {10.1007/S11432-017-9460-4}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhongL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhongL19, author = {Jianghua Zhong and Dongdai Lin}, title = {On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers}, journal = {Comput. J.}, volume = {62}, number = {12}, pages = {1793--1804}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz057}, doi = {10.1093/COMJNL/BXZ057}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhongL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/WangLCLZLWM19, author = {Haiyan Wang and Qiuzhen Lin and Jianyong Chen and Jianqiang Li and Jianghua Zhong and Dongdai Lin and Jia Wang and Lijia Ma}, title = {On Stability of Multi-Valued Nonlinear Feedback Shift Registers}, journal = {Complex.}, volume = {2019}, pages = {8765970:1--8765970:11}, year = {2019}, url = {https://doi.org/10.1155/2019/8765970}, doi = {10.1155/2019/8765970}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/WangLCLZLWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhuZYLL19, author = {Yuqing Zhu and Jincheng Zhuang and Hairong Yi and Chang Lv and Dongdai Lin}, title = {A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {971--986}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0492-3}, doi = {10.1007/S10623-018-0492-3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhuZYLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FuFLW19, author = {Shihui Fu and Xiutao Feng and Dongdai Lin and Qiang Wang}, title = {A recursive construction of permutation polynomials over F\({}_{\mbox{q\({}^{\mbox{2}}\)}}\) with odd characteristic related to R{\'{e}}dei functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1481--1498}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0548-4}, doi = {10.1007/S10623-018-0548-4}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FuFLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuJZL19, author = {Junying Liu and Yupeng Jiang and Qunxiong Zheng and Dongdai Lin}, title = {A new construction of zero-difference balanced functions and two applications}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2251--2265}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00616-x}, doi = {10.1007/S10623-019-00616-X}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuJZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/FengLWW19, author = {Xiutao Feng and Dongdai Lin and Li{-}Ping Wang and Qiang Wang}, title = {Further results on complete permutation monomials over finite fields}, journal = {Finite Fields Their Appl.}, volume = {57}, pages = {47--59}, year = {2019}, url = {https://doi.org/10.1016/j.ffa.2019.01.003}, doi = {10.1016/J.FFA.2019.01.003}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/FengLWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YangLWG19, author = {Minghui Yang and Dongdai Lin and Qiuyan Wang and Jian Gao}, title = {On the Linear Complexity of Binary Generalized Cyclotomic Sequences of Period 2\emph{p}\({}^{\mbox{\emph{m}+1}}\)\emph{q}\({}^{\mbox{\emph{n}+1}}\)}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {4}, pages = {676--679}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.676}, doi = {10.1587/TRANSFUN.E102.A.676}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/YangLWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/LiSHWL19, author = {Ting Li and Yao Sun and Zhenyu Huang and Dingkang Wang and Dongdai Lin}, title = {Speeding Up the {GVW} Algorithm via a Substituting Method}, journal = {J. Syst. Sci. Complex.}, volume = {32}, number = {1}, pages = {205--233}, year = {2019}, url = {https://doi.org/10.1007/s11424-019-8345-3}, doi = {10.1007/S11424-019-8345-3}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jossac/LiSHWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/GaoLL19, author = {Guangpu Gao and Dongdai Lin and Wenfen Liu}, title = {A Note on Rotation Symmetric S-boxes}, journal = {J. Syst. Sci. Complex.}, volume = {32}, number = {5}, pages = {1460--1472}, year = {2019}, url = {https://doi.org/10.1007/s11424-019-7263-8}, doi = {10.1007/S11424-019-7263-8}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/GaoLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LuoML19, author = {Lan Luo and Zhi Ma and Dongdai Lin}, title = {Two new families of quantum synchronizable codes}, journal = {Quantum Inf. Process.}, volume = {18}, number = {9}, pages = {277}, year = {2019}, url = {https://doi.org/10.1007/s11128-019-2389-0}, doi = {10.1007/S11128-019-2389-0}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/LuoML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WangZL19, author = {Anyu Wang and Zhifang Zhang and Dongdai Lin}, title = {Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {7}, pages = {4167--4179}, year = {2019}, url = {https://doi.org/10.1109/TIT.2019.2895315}, doi = {10.1109/TIT.2019.2895315}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WangZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/YiLL19, author = {Hairong Yi and Guiwen Luo and Dongdai Lin}, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Faster Scalar Multiplication on the x-Line: Three-Dimensional {GLV} Method with Three-Dimensional Differential Addition Chains}, booktitle = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, pages = {236--253}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4\_14}, doi = {10.1007/978-3-030-16458-4\_14}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/c2si/YiLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MaL19, author = {Xuecheng Ma and Dongdai Lin}, editor = {Zhe Liu and Moti Yung}, title = {Generic Constructions of Revocable Identity-Based Encryption}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {381--396}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_22}, doi = {10.1007/978-3-030-42921-8\_22}, timestamp = {Mon, 06 Apr 2020 19:10:55 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MaL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/QiuHL19, author = {Tian Qiu and Lin Hou and Dongdai Lin}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {A Multi-Group Signature Scheme from Lattices}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {359--377}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_21}, doi = {10.1007/978-3-030-41579-2\_21}, timestamp = {Mon, 02 Mar 2020 17:19:02 +0100}, biburl = {https://dblp.org/rec/conf/icics/QiuHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YangLL19, author = {Jingchun Yang and Meicheng Liu and Dongdai Lin}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {Cube Cryptanalysis of Round-Reduced {ACORN}}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {44--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_3}, doi = {10.1007/978-3-030-30215-3\_3}, timestamp = {Mon, 02 Sep 2019 15:19:30 +0200}, biburl = {https://dblp.org/rec/conf/isw/YangLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2019-1, editor = {Dongdai Lin and Kazue Sako}, title = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4}, doi = {10.1007/978-3-030-17253-4}, isbn = {978-3-030-17252-7}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2019-2, editor = {Dongdai Lin and Kazue Sako}, title = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6}, doi = {10.1007/978-3-030-17259-6}, isbn = {978-3-030-17258-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-03902, author = {Lan Luo and Zhi Ma and Dongdai Lin}, title = {Two New Families of Quantum Synchronizable Codes}, journal = {CoRR}, volume = {abs/1904.03902}, year = {2019}, url = {http://arxiv.org/abs/1904.03902}, eprinttype = {arXiv}, eprint = {1904.03902}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-03902.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-07766, author = {Wenhao Wang and Yichen Jiang and Qintao Shen and Weihao Huang and Hao Chen and Shuang Wang and Xiaofeng Wang and Haixu Tang and Kai Chen and Kristin E. Lauter and Dongdai Lin}, title = {Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance}, journal = {CoRR}, volume = {abs/1905.07766}, year = {2019}, url = {http://arxiv.org/abs/1905.07766}, eprinttype = {arXiv}, eprint = {1905.07766}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-07766.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaL19, author = {Xuecheng Ma and Dongdai Lin}, title = {A Generic Construction of Revocable Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2019}, url = {https://eprint.iacr.org/2019/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangLLM19, author = {Shichang Wang and Meicheng Liu and Dongdai Lin and Li Ma}, title = {Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {763}, year = {2019}, url = {https://eprint.iacr.org/2019/763}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangLLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaL19a, author = {Xuecheng Ma and Dongdai Lin}, title = {Generic Constructions of {RIBE} via Subset Difference Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1376}, year = {2019}, url = {https://eprint.iacr.org/2019/1376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangWLL18, author = {Libo Wang and Baofeng Wu and Zhuojun Liu and Dongdai Lin}, title = {Three new infinite families of bent functions}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {032104:1--032104:14}, year = {2018}, url = {https://doi.org/10.1007/s11432-016-0624-x}, doi = {10.1007/S11432-016-0624-X}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WangWLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/BaiLSWL18, author = {Jian Bai and Ting Li and Yao Sun and Dingkang Wang and Dongdai Lin}, title = {The lightest 4 {\texttimes} 4 {MDS} matrices over GL(4, {\(\mathbb{F}\)}\({}_{\mbox{2}}\))}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {11}, pages = {119102:1--119102:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9320-8}, doi = {10.1007/S11432-017-9320-8}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/BaiLSWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangFL18, author = {Xiaojuan Zhang and Xiutao Feng and Dongdai Lin}, title = {Fault Attack on {ACORN} v3}, journal = {Comput. J.}, volume = {61}, number = {8}, pages = {1166--1179}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxy044}, doi = {10.1093/COMJNL/BXY044}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/LiWL18, author = {Fei Li and Qiuyan Wang and Dongdai Lin}, title = {A class of three-weight and five-weight linear codes}, journal = {Discret. Appl. Math.}, volume = {241}, pages = {25--38}, year = {2018}, url = {https://doi.org/10.1016/j.dam.2016.11.005}, doi = {10.1016/J.DAM.2016.11.005}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/LiWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinPLZ18, author = {Zhiqiang Lin and Dingyi Pei and Dongdai Lin and Xiaolei Zhang}, title = {Fast construction of binary ring FCSRs for hardware stream ciphers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {939--953}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0370-4}, doi = {10.1007/S10623-017-0370-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinPLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/HeBLW18, author = {Zheng He and Kunpeng Bai and Dongdai Lin and Chuankun Wu}, title = {Unification of identifiers in the Sea-Cloud system}, journal = {Frontiers Comput. Sci.}, volume = {12}, number = {4}, pages = {749--762}, year = {2018}, url = {https://doi.org/10.1007/s11704-017-6054-4}, doi = {10.1007/S11704-017-6054-4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/HeBLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangGHL18, author = {Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin}, title = {Security evaluation on Simeck against zero-correlation linear cryptanalysis}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {1}, pages = {87--93}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2016.0503}, doi = {10.1049/IET-IFS.2016.0503}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangGHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiL18, author = {Ming Li and Dongdai Lin}, title = {De Bruijn Sequences, Adjacency Graphs, and Cyclotomy}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {4}, pages = {2941--2952}, year = {2018}, url = {https://doi.org/10.1109/TIT.2017.2787742}, doi = {10.1109/TIT.2017.2787742}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JiangL18, author = {Yupeng Jiang and Dongdai Lin}, title = {Lower and Upper Bounds on the Density of Irreducible NFSRs}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {5}, pages = {3944--3952}, year = {2018}, url = {https://doi.org/10.1109/TIT.2018.2796127}, doi = {10.1109/TIT.2018.2796127}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JiangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZhongL18, author = {Jianghua Zhong and Dongdai Lin}, title = {On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {9}, pages = {6429--6442}, year = {2018}, url = {https://doi.org/10.1109/TIT.2018.2849392}, doi = {10.1109/TIT.2018.2849392}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZhongL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaWL18, author = {Xuecheng Ma and Xin Wang and Dongdai Lin}, editor = {Willy Susilo and Guomin Yang}, title = {Anonymous Identity-Based Encryption with Identity Recovery}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {360--375}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_21}, doi = {10.1007/978-3-319-93638-3\_21}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhengLQ18, author = {Qun{-}Xiong Zheng and Dongdai Lin and Wen{-}Feng Qi}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {568--585}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_30}, doi = {10.1007/978-3-030-14234-6\_30}, timestamp = {Thu, 14 Jul 2022 16:21:07 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhengLQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuYWL18, author = {Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {715--744}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_23}, doi = {10.1007/978-3-319-78375-8\_23}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuYWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HouLQL18, author = {Lin Hou and Renzhang Liu and Tian Qiu and Dongdai Lin}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Hierarchical Group Signatures with Verifier-Local Revocation}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {271--286}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_16}, doi = {10.1007/978-3-030-01950-1\_16}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/HouLQL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MaL18, author = {Xuecheng Ma and Dongdai Lin}, editor = {Kwangsu Lee}, title = {Multi-identity {IBFHE} and Multi-attribute {ABFHE} in the Standard Model}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {69--84}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_5}, doi = {10.1007/978-3-030-12146-4\_5}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangWHL18, author = {Xuzi Wang and Baofeng Wu and Lin Hou and Dongdai Lin}, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on {MILP}}, booktitle = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, pages = {116--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8\_7}, doi = {10.1007/978-3-319-99136-8\_7}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangWHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/0003LL18, author = {Xiaojuan Zhang and Meicheng Liu and Dongdai Lin}, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Conditional Cube Searching and Applications on Trivium-Variant Ciphers}, booktitle = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, pages = {151--168}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8\_9}, doi = {10.1007/978-3-319-99136-8\_9}, timestamp = {Mon, 03 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/0003LL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YangLLW18, author = {Jingchun Yang and Meicheng Liu and Dongdai Lin and Wenhao Wang}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Symbolic-Like Computation and Conditional Differential Cryptanalysis of {QUARK}}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {244--261}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_16}, doi = {10.1007/978-3-319-97916-8\_16}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YangLLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenWCCZWLL18, author = {Guoxing Chen and Wenhao Wang and Tianyu Chen and Sanchuan Chen and Yinqian Zhang and XiaoFeng Wang and Ten{-}Hwang Lai and Dongdai Lin}, title = {Racing in Hyperspace: Closing Hyper-Threading Side Channels on {SGX} with Contrived Data Races}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {178--194}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00024}, doi = {10.1109/SP.2018.00024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenWCCZWLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLZZG18, author = {Wei Zhang and Dongdai Lin and Hailong Zhang and Xiaojun Zhou and Yiwen Gao}, title = {A Lightweight FourQ Primitive on {ARM} Cortex-M0}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {699--704}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00102}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLZZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLZZGC18, author = {Wei Zhang and Dongdai Lin and Hailong Zhang and Xiaojun Zhou and Yiwen Gao and Cong Chen}, title = {A Lightweight Multi-precision Squaring on Embedded Processors for {ECC}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1014--1019}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00143}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00143}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLZZGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HePL18, author = {Zheng He and Shiran Pan and Dongdai Lin}, title = {{PMDA:} Privacy-Preserving Multi-functional Data Aggregation Without {TTP} in Smart Grid}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1107--1114}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00154}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HePL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2017, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-75160-3}, doi = {10.1007/978-3-319-75160-3}, isbn = {978-3-319-75159-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-05943, author = {Xuecheng Ma and Xin Wang and Dongdai Lin}, title = {Anonymous Identity-Based Encryption with Identity Recovery}, journal = {CoRR}, volume = {abs/1806.05943}, year = {2018}, url = {http://arxiv.org/abs/1806.05943}, eprinttype = {arXiv}, eprint = {1806.05943}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-05943.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuYWL18, author = {Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin}, title = {Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2018}, url = {http://eprint.iacr.org/2018/158}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuYWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangDLX17, author = {Qiuyan Wang and Kelan Ding and Dongdai Lin and Rui Xue}, title = {A kind of three-weight linear codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {3}, pages = {315--322}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0180-3}, doi = {10.1007/S12095-015-0180-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangDLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LinLP17, author = {Zhiqiang Lin and Dongdai Lin and Dingyi Pei}, title = {Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {431--443}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0183-8}, doi = {10.1007/S12095-016-0183-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LinLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/JiangZL17, author = {Yupeng Jiang and Qun{-}Xiong Zheng and Dongdai Lin}, title = {On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {5}, pages = {052102:1--052102:12}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-5472-x}, doi = {10.1007/S11432-015-5472-X}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/JiangZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiangL17, author = {Yupeng Jiang and Dongdai Lin}, title = {On affine sub-families of Grain-like structures}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {3}, pages = {531--542}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0178-7}, doi = {10.1007/S10623-016-0178-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiangL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiJL17, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, title = {The adjacency graphs of some feedback shift registers}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {3}, pages = {695--713}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0187-6}, doi = {10.1007/S10623-016-0187-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/WangLDL17, author = {Qiuyan Wang and Fei Li and Kelan Ding and Dongdai Lin}, title = {Complete weight enumerators of two classes of linear codes}, journal = {Discret. Math.}, volume = {340}, number = {3}, pages = {467--480}, year = {2017}, url = {https://doi.org/10.1016/j.disc.2016.09.003}, doi = {10.1016/J.DISC.2016.09.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/WangLDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/0033JLW17, author = {Ming Li and Yupeng Jiang and Dongdai Lin and Qiuyan Wang}, title = {Transition Mappings between De Bruijn Sequences}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {5}, pages = {1254--1256}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1254}, doi = {10.1587/TRANSFUN.E100.A.1254}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/0033JLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/RenLGFL17, author = {YaWei Ren and Feng Liu and Teng Guo and Rongquan Feng and Dongdai Lin}, title = {Cheating prevention visual cryptography scheme using Latin square}, journal = {{IET} Inf. Secur.}, volume = {11}, number = {4}, pages = {211--219}, year = {2017}, url = {https://doi.org/10.1049/iet-ifs.2016.0126}, doi = {10.1049/IET-IFS.2016.0126}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/RenLGFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiuL17a, author = {Meicheng Liu and Dongdai Lin}, title = {Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks}, journal = {Inf. Sci.}, volume = {421}, pages = {181--203}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2017.08.097}, doi = {10.1016/J.INS.2017.08.097}, timestamp = {Mon, 16 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiuL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/WangZL17, author = {Haiyan Wang and Jianghua Zhong and Dongdai Lin}, title = {Linearization of multi-valued nonlinear feedback shift registers}, journal = {J. Syst. Sci. Complex.}, volume = {30}, number = {2}, pages = {494--509}, year = {2017}, url = {https://doi.org/10.1007/s11424-016-5156-7}, doi = {10.1007/S11424-016-5156-7}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/WangZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangFL17, author = {Xiaojuan Zhang and Xiutao Feng and Dongdai Lin}, title = {Fault Attack on the Authenticated Cipher {ACORN} v2}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {3834685:1--3834685:16}, year = {2017}, url = {https://doi.org/10.1155/2017/3834685}, doi = {10.1155/2017/3834685}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HuangL17, author = {Zhenyu Huang and Dongdai Lin}, title = {Solving polynomial systems with noise over F\({}_{\mbox{2}}\): Revisited}, journal = {Theor. Comput. Sci.}, volume = {676}, pages = {52--68}, year = {2017}, url = {https://doi.org/10.1016/j.tcs.2017.03.005}, doi = {10.1016/J.TCS.2017.03.005}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/HuangL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiL17, author = {Ming Li and Dongdai Lin}, title = {The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials}, journal = {{IEEE} Trans. Inf. Theory}, volume = {63}, number = {2}, pages = {1325--1335}, year = {2017}, url = {https://doi.org/10.1109/TIT.2016.2634420}, doi = {10.1109/TIT.2016.2634420}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoLGWL17, author = {Zhiyuan Guo and Renzhang Liu and Si Gao and Wenling Wu and Dongdai Lin}, title = {Direct Construction of Optimal Rotational-XOR Diffusion Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {169--187}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.169-187}, doi = {10.13154/TOSC.V2017.I4.169-187}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoLGWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenLZZ17, author = {Cong Chen and Dongdai Lin and Wei Zhang and Xiaojun Zhou}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {321--341}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_20}, doi = {10.1007/978-3-319-75160-3\_20}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ChenLZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangL17, author = {Xiaojuan Zhang and Dongdai Lin}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {Cryptanalysis of Acorn in Nonce-Reuse Setting}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {342--361}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_21}, doi = {10.1007/978-3-319-75160-3\_21}, timestamp = {Mon, 12 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangLL17, author = {Yang Zhang and Renzhang Liu and Dongdai Lin}, editor = {Howon Kim and Dong{-}Chan Kim}, title = {Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10779}, pages = {93--111}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78556-1\_6}, doi = {10.1007/978-3-319-78556-1\_6}, timestamp = {Thu, 02 Mar 2023 10:53:05 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ZhangLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/0001ZL17, author = {Anyu Wang and Zhifang Zhang and Dongdai Lin}, title = {Bounds and constructions for linear locally repairable codes over binary fields}, booktitle = {2017 {IEEE} International Symposium on Information Theory, {ISIT} 2017, Aachen, Germany, June 25-30, 2017}, pages = {2033--2037}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISIT.2017.8006886}, doi = {10.1109/ISIT.2017.8006886}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/0001ZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/YiZL17, author = {Hairong Yi and Yuqing Zhu and Dongdai Lin}, editor = {Carlisle Adams and Jan Camenisch}, title = {Refinement of the Four-Dimensional {GLV} Method on Elliptic Curves}, booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {23--42}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72565-9\_2}, doi = {10.1007/978-3-319-72565-9\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/YiZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLZCZ17, author = {Wei Zhang and Dongdai Lin and Hailong Zhang and Cong Chen and Xiaojun Zhou}, title = {A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on {ECC}}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {170--176}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.234}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.234}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLZCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2016, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54705-3}, doi = {10.1007/978-3-319-54705-3}, isbn = {978-3-319-54704-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangZL17, author = {Anyu Wang and Zhifang Zhang and Dongdai Lin}, title = {Bounds and Constructions for Linear Locally Repairable Codes over Binary Fields}, journal = {CoRR}, volume = {abs/1701.05989}, year = {2017}, url = {http://arxiv.org/abs/1701.05989}, eprinttype = {arXiv}, eprint = {1701.05989}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-06724, author = {Yang Zhang and Renzhang Liu and Dongdai Lin}, title = {Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme}, journal = {CoRR}, volume = {abs/1709.06724}, year = {2017}, url = {http://arxiv.org/abs/1709.06724}, eprinttype = {arXiv}, eprint = {1709.06724}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-06724.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-07890, author = {Shihui Fu and Xiutao Feng and Dongdai Lin and Qiang Wang}, title = {A Recursive Construction of Permutation Polynomials over F\({}_{\mbox{q\({}^{\mbox{2}}\)}}\) with Odd Characteristic from R{\'{e}}dei Functions}, journal = {CoRR}, volume = {abs/1712.07890}, year = {2017}, url = {http://arxiv.org/abs/1712.07890}, eprinttype = {arXiv}, eprint = {1712.07890}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-07890.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0003FL17, author = {Xiaojuan Zhang and Xiutao Feng and Dongdai Lin}, title = {Fault Attack on {ACORN} v3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {855}, year = {2017}, url = {http://eprint.iacr.org/2017/855}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0003FL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangJL16, author = {Mingxing Wang and Yupeng Jiang and Dongdai Lin}, title = {Further results on the nonlinearity of maximum-length {NFSR} feedbacks}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {1--6}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0133-x}, doi = {10.1007/S12095-015-0133-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangJL16a, author = {Qiuyan Wang and Yupeng Jiang and Dongdai Lin}, title = {Linear complexity of Ding-Helleseth sequences of order 2 over GF(l)}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {33--49}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0138-5}, doi = {10.1007/S12095-015-0138-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangJL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangL16, author = {Qiuyan Wang and Dongdai Lin}, title = {Generalized cyclotomic numbers of order two and their applications}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {605--616}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0165-2}, doi = {10.1007/S12095-015-0165-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhongL16, author = {Jianghua Zhong and Dongdai Lin}, title = {Stability of nonlinear feedback shift registers}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {1}, pages = {1--12}, year = {2016}, url = {https://doi.org/10.1007/s11432-015-5311-0}, doi = {10.1007/S11432-015-5311-0}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhongL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenZLZ16, author = {Yu Chen and Jiang Zhang and Dongdai Lin and Zhenfeng Zhang}, title = {Generic constructions of integrated {PKE} and {PEKS}}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {493--526}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0014-x}, doi = {10.1007/S10623-014-0014-X}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/0002L16, author = {Chun Guo and Dongdai Lin}, title = {Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour}, journal = {Des. Codes Cryptogr.}, volume = {81}, number = {1}, pages = {109--129}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0132-0}, doi = {10.1007/S10623-015-0132-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/0002L16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/SunHWL16, author = {Yao Sun and Zhenyu Huang and Dingkang Wang and Dongdai Lin}, title = {An improvement over the {GVW} algorithm for inhomogeneous polynomial systems}, journal = {Finite Fields Their Appl.}, volume = {41}, pages = {174--192}, year = {2016}, url = {https://doi.org/10.1016/j.ffa.2016.06.002}, doi = {10.1016/J.FFA.2016.06.002}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/SunHWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhuZLL16, author = {Yuqing Zhu and Jincheng Zhuang and Chang Lv and Dongdai Lin}, title = {Classifying and generating exact coset representatives of PGL\({}_{\mbox{2}}\)(F\({}_{\mbox{q}}\)) in PGL\({}_{\mbox{2}}\)(F\({}_{\mbox{q\({}^{\mbox{2}}\)}}\))}, journal = {Finite Fields Their Appl.}, volume = {42}, pages = {118--127}, year = {2016}, url = {https://doi.org/10.1016/j.ffa.2016.07.010}, doi = {10.1016/J.FFA.2016.07.010}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhuZLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/ZhongL16, author = {Jianghua Zhong and Dongdai Lin}, title = {Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers}, journal = {J. Complex.}, volume = {35}, pages = {29--45}, year = {2016}, url = {https://doi.org/10.1016/j.jco.2015.12.003}, doi = {10.1016/J.JCO.2015.12.003}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jc/ZhongL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/SunHLW16, author = {Yao Sun and Zhenyu Huang and Dongdai Lin and Dingkang Wang}, title = {On implementing the symbolic preprocessing function over Boolean polynomial rings in Gr{\"{o}}bner basis algorithms using linear algebra}, journal = {J. Syst. Sci. Complex.}, volume = {29}, number = {3}, pages = {789--804}, year = {2016}, url = {https://doi.org/10.1007/s11424-015-4085-1}, doi = {10.1007/S11424-015-4085-1}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jossac/SunHLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenZLC16, author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao}, title = {Generalized (identity-based) hash proof system and its applications}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1698--1716}, year = {2016}, url = {https://doi.org/10.1002/sec.827}, doi = {10.1002/SEC.827}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenZLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ZhongL16, author = {Jianghua Zhong and Dongdai Lin}, title = {Driven Stability of Nonlinear Feedback Shift Registers With Inputs}, journal = {{IEEE} Trans. Commun.}, volume = {64}, number = {6}, pages = {2274--2284}, year = {2016}, url = {https://doi.org/10.1109/TCOMM.2016.2557330}, doi = {10.1109/TCOMM.2016.2557330}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/ZhongL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/XiangZBL16, author = {Zejun Xiang and Wentao Zhang and Zhenzhen Bao and Dongdai Lin}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Applying {MILP} Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {648--678}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_24}, doi = {10.1007/978-3-662-53887-6\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/XiangZBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YiWCL16, author = {Wentan Yi and Baofeng Wu and Shaozhen Chen and Dongdai Lin}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Improved Integral and Zero-correlation Linear Cryptanalysis of {CLEFIA} Block Cipher}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {33--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_3}, doi = {10.1007/978-3-319-54705-3\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YiWCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenL16, author = {Cong Chen and Dongdai Lin}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Cyber-Attacks on Remote State Estimation in Industrial Control System: {A} Game-Based Framework}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {431--450}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_27}, doi = {10.1007/978-3-319-54705-3\_27}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PanBLL16, author = {Wenlun Pan and Zhenzhen Bao and Dongdai Lin and Feng Liu}, editor = {Kwok{-}Yan Lam and Chi{-}Hung Chi and Sihan Qing}, title = {The Linear Complexity and 2-Error Linear Complexity Distribution of 2{\^{}}n 2 n -Periodic Binary Sequences with Fixed Hamming Weight}, booktitle = {Information and Communications Security - 18th International Conference, {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9977}, pages = {107--123}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-50011-9\_9}, doi = {10.1007/978-3-319-50011-9\_9}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/PanBLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinfa/WangZL16, author = {Haiyan Wang and Jianghua Zhong and Dongdai Lin}, title = {Stability of multi-valued nonlinear feedback shift registers}, booktitle = {{IEEE} International Conference on Information and Automation, {ICIA} 2016, Ningbo, China, August 1-3, 2016}, pages = {1764--1769}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICInfA.2016.7832103}, doi = {10.1109/ICINFA.2016.7832103}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/icinfa/WangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/GuoL16, author = {Xiaojie Guo and Dongdai Lin}, title = {Robust face image alignment using structural priors}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2016, Seattle, WA, USA, July 11-15, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICME.2016.7552889}, doi = {10.1109/ICME.2016.7552889}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/GuoL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WangZL16, author = {Anyu Wang and Zhifang Zhang and Dongdai Lin}, title = {Two classes of (r, t)-locally repairable codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {445--449}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541338}, doi = {10.1109/ISIT.2016.7541338}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/WangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PanBLL16, author = {Wenlun Pan and Zhenzhen Bao and Dongdai Lin and Feng Liu}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {The Distribution of 2{\^{}}n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {13--36}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_2}, doi = {10.1007/978-3-319-49151-6\_2}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PanBLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XiangZL16, author = {Zejun Xiang and Wentao Zhang and Dongdai Lin}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {On the Division Property of Simon48 and Simon64}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {147--163}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_9}, doi = {10.1007/978-3-319-44524-3\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/XiangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2015, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-38898-4}, doi = {10.1007/978-3-319-38898-4}, isbn = {978-3-319-38897-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiL16, author = {Ming Li and Dongdai Lin}, title = {The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2016}, url = {http://eprint.iacr.org/2016/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiL16a, author = {Ming Li and Dongdai Lin}, title = {Adjacency Graphs, Irreducible Polynomials and Cyclotomy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2016}, url = {http://eprint.iacr.org/2016/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuZLL16, author = {Yuqing Zhu and Jincheng Zhuang and Chang Lv and Dongdai Lin}, title = {Improvements on the Individual Logarithm Step in exTNFS}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2016}, url = {http://eprint.iacr.org/2016/727}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuZLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002LL16, author = {Chun Guo and Dongdai Lin and Meicheng Liu}, title = {Cascade Ciphers Revisited: Indifferentiability Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {825}, year = {2016}, url = {http://eprint.iacr.org/2016/825}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002LL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiangZL16, author = {Zejun Xiang and Wentao Zhang and Dongdai Lin}, title = {On the Division Property of {SIMON48} and {SIMON64}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {839}, year = {2016}, url = {http://eprint.iacr.org/2016/839}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiangZBL16, author = {Zejun Xiang and Wentao Zhang and Zhenzhen Bao and Dongdai Lin}, title = {Applying {MILP} Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {857}, year = {2016}, url = {http://eprint.iacr.org/2016/857}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiangZBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002L16, author = {Chun Guo and Dongdai Lin}, title = {Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2016}, url = {http://eprint.iacr.org/2016/894}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002L16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanBLL16, author = {Wenlun Pan and Zhenzhen Bao and Dongdai Lin and Feng Liu}, title = {An Algorithm for Counting the Number of 2\({}^{\mbox{n}}\)-Periodic Binary Sequences with Fixed k-Error Linear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1025}, year = {2016}, url = {http://eprint.iacr.org/2016/1025}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanBLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLWL16, author = {Zhiyuan Guo and Renzhang Liu and Wenling Wu and Dongdai Lin}, title = {Direct Construction of Lightweight Rotational-XOR {MDS} Diffusion Layers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1036}, year = {2016}, url = {http://eprint.iacr.org/2016/1036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoLWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cca/SunLW15, author = {Yao Sun and Dongdai Lin and Dingkang Wang}, title = {On implementing signature-based Gr{\"{o}}bner basis algorithms using linear algebraic routines from {M4RI}}, journal = {{ACM} Commun. Comput. Algebra}, volume = {49}, number = {2}, pages = {63--64}, year = {2015}, url = {https://doi.org/10.1145/2815111.2815161}, doi = {10.1145/2815111.2815161}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cca/SunLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuoL15, author = {Chun Guo and Dongdai Lin}, title = {Improved domain extender for the ideal cipher}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {509--533}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0128-7}, doi = {10.1007/S12095-015-0128-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TianPLMJJ15, author = {Youliang Tian and Changgen Peng and Dongdai Lin and Jianfeng Ma and Qi Jiang and Wenjiang Ji}, title = {Bayesian mechanism for rational secret sharing scheme}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {5}, pages = {1--13}, year = {2015}, url = {https://doi.org/10.1007/s11432-014-5275-5}, doi = {10.1007/S11432-014-5275-5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/TianPLMJJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangHLLML15, author = {Huanguo Zhang and Wenbao Han and Xuejia Lai and Dongdai Lin and Jianfeng Ma and Jianhua Li}, title = {Survey on cyberspace security}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {11}, pages = {1--43}, year = {2015}, url = {https://doi.org/10.1007/s11432-015-5433-4}, doi = {10.1007/S11432-015-5433-4}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangHLLML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangBLR0V15, author = {Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede}, title = {{RECTANGLE:} a bit-slice lightweight block cipher suitable for multiple platforms}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {12}, pages = {1--15}, year = {2015}, url = {https://doi.org/10.1007/s11432-015-5459-7}, doi = {10.1007/S11432-015-5459-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangBLR0V15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/WuL15, author = {Baofeng Wu and Dongdai Lin}, title = {On constructing complete permutation polynomials over finite fields of even characteristic}, journal = {Discret. Appl. Math.}, volume = {184}, pages = {213--222}, year = {2015}, url = {https://doi.org/10.1016/j.dam.2014.11.008}, doi = {10.1016/J.DAM.2014.11.008}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/WuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/CaoMGDL15, author = {Xiaochun Cao and Meili Ma and Xiaojie Guo and Ling Du and Dongdai Lin}, title = {A new encryption scheme for surveillance videos}, journal = {Frontiers Comput. Sci.}, volume = {9}, number = {5}, pages = {765--777}, year = {2015}, url = {https://doi.org/10.1007/s11704-015-3362-4}, doi = {10.1007/S11704-015-3362-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/CaoMGDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LinKLG15, author = {Zhiqiang Lin and Lishan Ke and Dongdai Lin and Jian Gao}, title = {On the LFSRization of a Class of {FCSR} Automata}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {434--440}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.434}, doi = {10.1587/TRANSFUN.E98.A.434}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LinKLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/WangJL15, author = {Qiuyan Wang and Yupeng Jiang and Dongdai Lin}, title = {Linear complexity of binary generalized cyclotomic sequences over GF(q)}, journal = {J. Complex.}, volume = {31}, number = {5}, pages = {731--740}, year = {2015}, url = {https://doi.org/10.1016/j.jco.2015.01.001}, doi = {10.1016/J.JCO.2015.01.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jc/WangJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/ChenCXLW15, author = {Kai Chen and Weifeng Chen and Zhen Xu and Dongdai Lin and Yazhe Wang}, title = {{VFA:} {A} Variable-Factor Authentication Framework for Mobile Users}, journal = {J. Commun.}, volume = {10}, number = {6}, pages = {366--379}, year = {2015}, url = {https://doi.org/10.12720/jcm.10.6.366-379}, doi = {10.12720/JCM.10.6.366-379}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/ChenCXLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ZhongL15, author = {Jianghua Zhong and Dongdai Lin}, title = {A new linearization method for nonlinear feedback shift registers}, journal = {J. Comput. Syst. Sci.}, volume = {81}, number = {4}, pages = {783--796}, year = {2015}, url = {https://doi.org/10.1016/j.jcss.2014.12.030}, doi = {10.1016/J.JCSS.2014.12.030}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/ZhongL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/TianWL15, author = {Chengliang Tian and Wei Wei and Dongdai Lin}, title = {Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle}, journal = {J. Comput. Sci. Technol.}, volume = {30}, number = {6}, pages = {1370--1377}, year = {2015}, url = {https://doi.org/10.1007/s11390-015-1604-4}, doi = {10.1007/S11390-015-1604-4}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/TianWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/CaoWHL15, author = {Xiaochun Cao and Xingxing Wei and Yahong Han and Dongdai Lin}, title = {Robust Face Clustering Via Tensor Decomposition}, journal = {{IEEE} Trans. Cybern.}, volume = {45}, number = {11}, pages = {2546--2557}, year = {2015}, url = {https://doi.org/10.1109/TCYB.2014.2376938}, doi = {10.1109/TCYB.2014.2376938}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/CaoWHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YangLFL15, author = {Minghui Yang and Jin Li and Keqin Feng and Dongdai Lin}, title = {Generalized Hamming Weights of Irreducible Cyclic Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {9}, pages = {4905--4913}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2444013}, doi = {10.1109/TIT.2015.2444013}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/YangLFL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LuZPL15, author = {Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Solving Linear Equations Modulo Unknown Divisors: Revisited}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {189--213}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_9}, doi = {10.1007/978-3-662-48797-6\_9}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LuZPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuoL15, author = {Chun Guo and Dongdai Lin}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {389--410}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_16}, doi = {10.1007/978-3-662-48800-3\_16}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BaoLL15, author = {Zhenzhen Bao and Peng Luo and Dongdai Lin}, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {Bitsliced Implementations of the PRINCE, {LED} and {RECTANGLE} Block Ciphers on {AVR} 8-Bit Microcontrollers}, booktitle = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, pages = {18--36}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29814-6\_3}, doi = {10.1007/978-3-319-29814-6\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/BaoLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/YanWLQ15, author = {Jun Yan and Jian Weng and Dongdai Lin and Yujuan Quan}, editor = {Khaled M. Elbassioni and Kazuhisa Makino}, title = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)}, booktitle = {Algorithms and Computation - 26th International Symposium, {ISAAC} 2015, Nagoya, Japan, December 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9472}, pages = {555--565}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48971-0\_47}, doi = {10.1007/978-3-662-48971-0\_47}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isaac/YanWLQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WangLZL15, author = {Tianze Wang and Meicheng Liu and Shangwei Zhao and Dongdai Lin}, title = {Construction of cubic rotation symmetric bent functions in power-of-two variables}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {486--490}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282502}, doi = {10.1109/ISIT.2015.7282502}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/WangLZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WuZL15, author = {Baofeng Wu and Jia Zheng and Dongdai Lin}, title = {Constructing Boolean functions with (potentially) optimal algebraic immunity based on multiplicative decompositions of finite fields}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {491--495}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282503}, doi = {10.1109/ISIT.2015.7282503}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/WuZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LiuLW15, author = {Meicheng Liu and Dongdai Lin and Wenhao Wang}, title = {Searching cubes for testing Boolean functions and its application to Trivium}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {496--500}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282504}, doi = {10.1109/ISIT.2015.7282504}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/LiuLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WuL15, author = {Baofeng Wu and Dongdai Lin}, title = {On the dual of generalized Boolean bent functions over {\(\mathbb{Z}\)}4}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {506--510}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282506}, doi = {10.1109/ISIT.2015.7282506}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/WuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Du0LL15, author = {Shaoyu Du and Bin Zhang and Zhenqi Li and Dongdai Lin}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Fault Attacks on Stream Cipher Scream}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {50--64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_4}, doi = {10.1007/978-3-319-17533-1\_4}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Du0LL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GuoZL15, author = {Chun Guo and Hailong Zhang and Dongdai Lin}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Estimating Differential-Linear Distinguishers and Applications to {CTC2}}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {220--234}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_16}, doi = {10.1007/978-3-319-17533-1\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GuoZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/DuL0L15, author = {Shaoyu Du and Zhenqi Li and Bin Zhang and Dongdai Lin}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Combined Cache Timing Attacks and Template Attacks on Stream Cipher {MUGI}}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {235--249}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_17}, doi = {10.1007/978-3-319-17533-1\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/DuL0L15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/RenLLFW15, author = {YaWei Ren and Feng Liu and Dongdai Lin and Rongquan Feng and Wen Wang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Isao Echizen}, title = {A New Construction of Tagged Visual Cryptography Scheme}, booktitle = {Digital-Forensics and Watermarking - 14th International Workshop, {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9569}, pages = {433--445}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31960-5\_35}, doi = {10.1007/978-3-319-31960-5\_35}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/RenLLFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LuP0HL15, author = {Yao Lu and Liqiang Peng and Rui Zhang and Lei Hu and Dongdai Lin}, editor = {Orr Dunkelman and Liam Keliher}, title = {Towards Optimal Bounds for Implicit Factorization Problem}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {462--476}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_26}, doi = {10.1007/978-3-319-31301-6\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LuP0HL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GuoL15, author = {Chun Guo and Dongdai Lin}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {110--133}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_6}, doi = {10.1007/978-3-662-46494-6\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GuoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2014, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16745-9}, doi = {10.1007/978-3-319-16745-9}, isbn = {978-3-319-16744-2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiWL15, author = {Fei Li and Qiuyan Wang and Dongdai Lin}, title = {A class of three-weight and five-weight linear codes}, journal = {CoRR}, volume = {abs/1509.06242}, year = {2015}, url = {http://arxiv.org/abs/1509.06242}, eprinttype = {arXiv}, eprint = {1509.06242}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangLL15b, author = {Qiuyan Wang and Fei Li and Dongdai Lin}, title = {A Class of Linear Codes With Three Weights}, journal = {CoRR}, volume = {abs/1512.03866}, year = {2015}, url = {http://arxiv.org/abs/1512.03866}, eprinttype = {arXiv}, eprint = {1512.03866}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangLL15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangLDL15, author = {Qiuyan Wang and Fei Li and Kelan Ding and Dongdai Lin}, title = {Complete weight enumerators of two classes of linear codes}, journal = {CoRR}, volume = {abs/1512.07341}, year = {2015}, url = {http://arxiv.org/abs/1512.07341}, eprinttype = {arXiv}, eprint = {1512.07341}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangLDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZL15, author = {Haiyan Wang and Jianghua Zhong and Dongdai Lin}, title = {Linearization of Multi-valued Nonlinear Feedback Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2015}, url = {http://eprint.iacr.org/2015/252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangL15, author = {Haiyan Wang and Dongdai Lin}, title = {Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2015}, url = {http://eprint.iacr.org/2015/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiJL15, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, title = {A Group-theory Method to The Cycle Structures of Feedback Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2015}, url = {http://eprint.iacr.org/2015/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiL15, author = {Ming Li and Dongdai Lin}, title = {De Bruijn Sequences from Nonlinear Feedback Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2015}, url = {http://eprint.iacr.org/2015/667}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoL15, author = {Chun Guo and Dongdai Lin}, title = {A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {861}, year = {2015}, url = {http://eprint.iacr.org/2015/861}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangGHL15, author = {Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin}, title = {Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {911}, year = {2015}, url = {http://eprint.iacr.org/2015/911}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangGHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWL15, author = {Ming Li and Mingxing Wang and Dongdai Lin}, title = {De Bruijn Sequences from Symmetric Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1079}, year = {2015}, url = {http://eprint.iacr.org/2015/1079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoLL15, author = {Zhenzhen Bao and Peng Luo and Dongdai Lin}, title = {Bitsliced Implementations of the PRINCE, {LED} and {RECTANGLE} Block Ciphers on {AVR} 8-bit Microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1118}, year = {2015}, url = {http://eprint.iacr.org/2015/1118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPL15, author = {Zhiqiang Lin and Dingyi Pei and Dongdai Lin}, title = {Construction of Transition Matrices for Binary FCSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1181}, year = {2015}, url = {http://eprint.iacr.org/2015/1181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenZLC14, author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao}, title = {CCA-Secure {IB-KEM} from Identity-Based Extractable Hash Proof System}, journal = {Comput. J.}, volume = {57}, number = {10}, pages = {1537--1556}, year = {2014}, url = {https://doi.org/10.1093/comjnl/bxt090}, doi = {10.1093/COMJNL/BXT090}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenZLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/ZhangLL14, author = {Yin Zhang and Meicheng Liu and Dongdai Lin}, title = {On the immunity of rotation symmetric Boolean functions against fast algebraic attacks}, journal = {Discret. Appl. Math.}, volume = {162}, pages = {17--27}, year = {2014}, url = {https://doi.org/10.1016/j.dam.2013.04.014}, doi = {10.1016/J.DAM.2013.04.014}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/ZhangLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangLG14, author = {Qiuyan Wang and Dongdai Lin and Xuan Guang}, title = {On the Linear Complexity of Legendre Sequences Over F\emph{\({}_{\mbox{q}}\)}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {7}, pages = {1627--1630}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1627}, doi = {10.1587/TRANSFUN.E97.A.1627}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YangLG14, author = {Minghui Yang and Dongdai Lin and Xuan Guang}, title = {Generalized Fourier Transform and the Joint \emph{N}-Adic Complexity of a Multisequence}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {9}, pages = {1982--1986}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1982}, doi = {10.1587/TRANSFUN.E97.A.1982}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YangLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangJLG14, author = {Qiuyan Wang and Yupeng Jiang and Dongdai Lin and Xuan Guang}, title = {On the Linear Complexity of New Modified Jacobi Sequences}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {11}, pages = {2263--2266}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.2263}, doi = {10.1587/TRANSFUN.E97.A.2263}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangJLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YangLS14, author = {Minghui Yang and Dongdai Lin and Minjia Shi}, title = {Minimum Linear Complexity Approximation of Sequences with Period \emph{q\({}^{\mbox{n}}\)}-1 over F\({}_{\mbox{\emph{q}}}\)}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {12}, pages = {2667--2670}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.2667}, doi = {10.1587/TRANSFUN.E97.A.2667}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YangLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsi/DuLZL14, author = {Shaoyu Du and Meicheng Liu and Yin Zhang and Dongdai Lin}, title = {On the Nonlinearity and Correlation Immunity of Two Classes of Boolean Functions}, journal = {Int. J. Softw. Informatics}, volume = {8}, number = {2}, pages = {177--192}, year = {2014}, url = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i187}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsi/DuLZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/FuCTL14, author = {Huazhu Fu and Xiaochun Cao and Zhuowen Tu and Dongdai Lin}, title = {Symmetry Constraint for Foreground Extraction}, journal = {{IEEE} Trans. Cybern.}, volume = {44}, number = {5}, pages = {644--654}, year = {2014}, url = {https://doi.org/10.1109/TCYB.2013.2264051}, doi = {10.1109/TCYB.2013.2264051}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/FuCTL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JiangL14, author = {Yupeng Jiang and Dongdai Lin}, title = {Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {10}, pages = {6602--6608}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2345769}, doi = {10.1109/TIT.2014.2345769}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JiangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Lu0L14, author = {Yao Lu and Rui Zhang and Dongdai Lin}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {New Partial Key Exposure Attacks on {CRT-RSA} with Large Public Exponents}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {151--162}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_10}, doi = {10.1007/978-3-319-07536-5\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Lu0L14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/BaoZL14, author = {Zhenzhen Bao and Wentao Zhang and Dongdai Lin}, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails}, booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, pages = {259--285}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16745-9\_15}, doi = {10.1007/978-3-319-16745-9\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/BaoZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/ChenWYLWH14, author = {Chi Chen and Chaogang Wang and Tengfei Yang and Dongdai Lin and Song Wang and Jiankun Hu}, title = {Optional multi-biometric cryptosystem based on fuzzy extractor}, booktitle = {11th International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2014, Xiamen, China, August 19-21, 2014}, pages = {989--994}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/FSKD.2014.6980974}, doi = {10.1109/FSKD.2014.6980974}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fskd/ChenWYLWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinfa/ZhongL14, author = {Jianghua Zhong and Dongdai Lin}, title = {Stability of nonlinear feedback shift registers}, booktitle = {{IEEE} International Conference on Information and Automation, {ICIA} 2014, Hailar, Hulun Buir, China, July 28-30, 2014}, pages = {671--676}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICInfA.2014.6932738}, doi = {10.1109/ICINFA.2014.6932738}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/icinfa/ZhongL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WuJLL14, author = {Baofeng Wu and Qingfang Jin and Zhuojun Liu and Dongdai Lin}, title = {Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1361--1365}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875055}, doi = {10.1109/ISIT.2014.6875055}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/WuJLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LiuL14a, author = {Meicheng Liu and Dongdai Lin}, title = {Almost perfect algebraic immune functions with good nonlinearity}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1837--1841}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875151}, doi = {10.1109/ISIT.2014.6875151}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/LiuL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MaXL14, author = {Duohe Ma and Zhen Xu and Dongdai Lin}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Defending Blind DDoS Attack on {SDN} Based on Moving Target Defense}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {463--480}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_32}, doi = {10.1007/978-3-319-23829-6\_32}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/MaXL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2013, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12087-4}, doi = {10.1007/978-3-319-12087-4}, isbn = {978-3-319-12086-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JiangL14, author = {Yupeng Jiang and Dongdai Lin}, title = {Distribution properties of compressing sequences derived from primitive sequences modulo odd prime powers}, journal = {CoRR}, volume = {abs/1401.5874}, year = {2014}, url = {http://arxiv.org/abs/1401.5874}, eprinttype = {arXiv}, eprint = {1401.5874}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JiangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuJLL14, author = {Baofeng Wu and Qingfang Jin and Zhuojun Liu and Dongdai Lin}, title = {Constructing Boolean Functions With Potential Optimal Algebraic Immunity Based on Additive Decompositions of Finite Fields}, journal = {CoRR}, volume = {abs/1401.6604}, year = {2014}, url = {http://arxiv.org/abs/1401.6604}, eprinttype = {arXiv}, eprint = {1401.6604}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuJLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JiangL14a, author = {Yupeng Jiang and Dongdai Lin}, title = {On the distinctness of binary sequences derived from {\textdollar}2{\textdollar}-adic expansion of m-sequences over finite prime fields}, journal = {CoRR}, volume = {abs/1402.4590}, year = {2014}, url = {http://arxiv.org/abs/1402.4590}, eprinttype = {arXiv}, eprint = {1402.4590}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JiangL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SunLW14, author = {Yao Sun and Dongdai Lin and Dingkang Wang}, title = {An Improvement over the {GVW} Algorithm for Inhomogeneous Polynomial Systems}, journal = {CoRR}, volume = {abs/1404.1428}, year = {2014}, url = {http://arxiv.org/abs/1404.1428}, eprinttype = {arXiv}, eprint = {1404.1428}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/SunLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HuangSL14, author = {Zhenyu Huang and Yao Sun and Dongdai Lin}, title = {On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method}, journal = {CoRR}, volume = {abs/1405.4596}, year = {2014}, url = {http://arxiv.org/abs/1405.4596}, eprinttype = {arXiv}, eprint = {1405.4596}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/HuangSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SunWHL14, author = {Yao Sun and Dingkang Wang and Zhenyu Huang and Dongdai Lin}, title = {A Monomial-Oriented {GVW} for Computing Gr{\"{o}}bner Bases}, journal = {CoRR}, volume = {abs/1410.0105}, year = {2014}, url = {http://arxiv.org/abs/1410.0105}, eprinttype = {arXiv}, eprint = {1410.0105}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/SunWHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YangLFL14, author = {Minghui Yang and Jin Li and Keqin Feng and Dongdai Lin}, title = {Generalized Hamming Weights of Irreducible Cyclic Codes}, journal = {CoRR}, volume = {abs/1410.2702}, year = {2014}, url = {http://arxiv.org/abs/1410.2702}, eprinttype = {arXiv}, eprint = {1410.2702}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YangLFL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangBLRYV14, author = {Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede}, title = {{RECTANGLE:} {A} Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2014}, url = {http://eprint.iacr.org/2014/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangBLRYV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lu0L14, author = {Yao Lu and Rui Zhang and Dongdai Lin}, title = {New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2014}, url = {http://eprint.iacr.org/2014/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lu0L14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TianWL14, author = {Chengliang Tian and Wei Wei and Dongdai Lin}, title = {Solving closest vector instances using an approximate shortest independent vectors oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2014}, url = {http://eprint.iacr.org/2014/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TianWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiL14b, author = {Ming Li and Dongdai Lin}, title = {A Class of FSRs and Their Adjacency Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2014}, url = {http://eprint.iacr.org/2014/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiL14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoL14, author = {Chun Guo and Dongdai Lin}, title = {On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2014}, url = {http://eprint.iacr.org/2014/786}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinQWY14, author = {Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan}, title = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {791}, year = {2014}, url = {http://eprint.iacr.org/2014/791}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinQWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL14, author = {Zhenyu Huang and Dongdai Lin}, title = {Solving Polynomial Systems with Noise over F\({}_{\mbox{2}}\): Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {962}, year = {2014}, url = {http://eprint.iacr.org/2014/962}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/Lu0L13, author = {Yao Lu and Rui Zhang and Dongdai Lin}, title = {Improved bounds for the implicit factorization problem}, journal = {Adv. Math. Commun.}, volume = {7}, number = {3}, pages = {243--251}, year = {2013}, url = {https://doi.org/10.3934/amc.2013.7.243}, doi = {10.3934/AMC.2013.7.243}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/Lu0L13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/WangL13, author = {Tianze Wang and Dongdai Lin}, title = {A method for counting the number of polynomial equivalence classes}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {69--95}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0017}, doi = {10.1515/JMC-2012-0017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/WangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuZL13, author = {Yao Lu and Rui Zhang and Dongdai Lin}, editor = {Colin Boyd and Leonie Simpson}, title = {Factoring Multi-power {RSA} Modulus {N} = p r q with Partial Known Bits}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {57--71}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_5}, doi = {10.1007/978-3-642-39059-3\_5}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LuZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenWLW13, author = {Shan Chen and Kunpeng Wang and Dongdai Lin and Tao Wang}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Omega Pairing on Hyperelliptic Curves}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {167--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_11}, doi = {10.1007/978-3-319-12087-4\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenWLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenLYS13, author = {Kai Chen and Dongdai Lin and Li Yan and Xin Sun}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Environment-Bound {SAML} Assertions: {A} Fresh Approach to Enhance the Security of {SAML} Assertions}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {361--376}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_23}, doi = {10.1007/978-3-319-12087-4\_23}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenLYS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangLFL13, author = {Bin Zhang and Zhenqi Li and Dengguo Feng and Dongdai Lin}, editor = {Shiho Moriai}, title = {Near Collision Attack on the Grain v1 Stream Cipher}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {518--538}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_27}, doi = {10.1007/978-3-662-43933-3\_27}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangLFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangL13, author = {Wenhao Wang and Dongdai Lin}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {288--301}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_21}, doi = {10.1007/978-3-319-02726-5\_21}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/WangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/CaoWHYL13, author = {Xiaochun Cao and Xingxing Wei and Yahong Han and Yi Yang and Dongdai Lin}, editor = {Francesca Rossi}, title = {Robust Tensor Clustering with Non-Greedy Maximization}, booktitle = {{IJCAI} 2013, Proceedings of the 23rd International Joint Conference on Artificial Intelligence, Beijing, China, August 3-9, 2013}, pages = {1254--1259}, publisher = {{IJCAI/AAAI}}, year = {2013}, url = {http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6533}, timestamp = {Tue, 23 Jan 2024 13:25:46 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/CaoWHYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Lu0L13, author = {Yao Lu and Rui Zhang and Dongdai Lin}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Factoring {RSA} Modulus with Known Bits from Both p and q: {A} Lattice Method}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {393--404}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_29}, doi = {10.1007/978-3-642-38631-2\_29}, timestamp = {Tue, 09 Feb 2021 08:50:29 +0100}, biburl = {https://dblp.org/rec/conf/nss/Lu0L13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LvZL13, author = {Jing Lv and Bin Zhang and Dongdai Lin}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Some New Weaknesses in the {RC4} Stream Cipher}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {28--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_2}, doi = {10.1007/978-3-319-05149-9\_2}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LvZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuL13, author = {Baofeng Wu and Dongdai Lin}, title = {New constructions of quaternary bent functions}, journal = {CoRR}, volume = {abs/1309.0199}, year = {2013}, url = {http://arxiv.org/abs/1309.0199}, eprinttype = {arXiv}, eprint = {1309.0199}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZLC13, author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao}, title = {Generalized (Identity-Based) Hash Proof System and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2013}, url = {http://eprint.iacr.org/2013/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZLC13a, author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao}, title = {CCA-Secure {IB-KEM} from Identity-Based Extractable Hash Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2013}, url = {http://eprint.iacr.org/2013/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZLC13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LvZL13, author = {Jing Lv and Bin Zhang and Dongdai Lin}, title = {Distinguishing Attacks on {RC4} and {A} New Improvement of the Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2013}, url = {http://eprint.iacr.org/2013/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LvZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LvL13, author = {Jing Lv and Dongdai Lin}, title = {{L-P} States of {RC4} Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2013}, url = {http://eprint.iacr.org/2013/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LvL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/LinFPW12, author = {Dongdai Lin and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret and Tianze Wang}, title = {On enumeration of polynomial equivalence classes and their application to {MPKC}}, journal = {Finite Fields Their Appl.}, volume = {18}, number = {2}, pages = {283--302}, year = {2012}, url = {https://doi.org/10.1016/j.ffa.2011.09.001}, doi = {10.1016/J.FFA.2011.09.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/LinFPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/LinSY12, author = {Dongdai Lin and Tao Shi and Zifeng Yang}, title = {Ergodic theory over F\({}_{\mbox{2}}\)[[T]]}, journal = {Finite Fields Their Appl.}, volume = {18}, number = {3}, pages = {473--491}, year = {2012}, url = {https://doi.org/10.1016/j.ffa.2011.11.001}, doi = {10.1016/J.FFA.2011.11.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/LinSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenZLC12, author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Identity-Based Extractable Hash Proofs and Their Applications}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {153--170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_10}, doi = {10.1007/978-3-642-31284-7\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChenZLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuZL12, author = {Meicheng Liu and Yin Zhang and Dongdai Lin}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Perfect Algebraic Immune Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {172--189}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_12}, doi = {10.1007/978-3-642-34961-4\_12}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ShiAL12, author = {Tao Shi and Vladimir Anashin and Dongdai Lin}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Fast Evaluation of T-Functions via Time-Memory Trade-Offs}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {263--275}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_17}, doi = {10.1007/978-3-642-38519-3\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ShiAL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangLL12, author = {Tianze Wang and Meicheng Liu and Dongdai Lin}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {276--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_18}, doi = {10.1007/978-3-642-38519-3\_18}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiLWZL12, author = {Zhenqi Li and Yao Lu and Wenhao Wang and Bin Zhang and Dongdai Lin}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {311--320}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_28}, doi = {10.1007/978-3-642-34129-8\_28}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiLWZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiZLZL12, author = {Zhenqi Li and Bin Zhang and Yao Lu and Jing Zou and Dongdai Lin}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {321--330}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_29}, doi = {10.1007/978-3-642-34129-8\_29}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiZLZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiZYL12, author = {Zhenqi Li and Bin Zhang and Yuan Yao and Dongdai Lin}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Cube Cryptanalysis of LBlock with Noisy Leakage}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {141--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_11}, doi = {10.1007/978-3-642-37682-5\_11}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LiZYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ZhangL12, author = {Xusheng Zhang and Dongdai Lin}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Analysis of Optimum Pairing Products at High Security Levels}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {412--430}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_24}, doi = {10.1007/978-3-642-34931-7\_24}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ZhangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/ZhangWL12, author = {Xusheng Zhang and Kunpeng Wang and Dongdai Lin}, editor = {Michel Abdalla and Tanja Lange}, title = {On Efficient Pairings on Elliptic Curves over Extension Fields}, booktitle = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, pages = {1--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36334-4\_1}, doi = {10.1007/978-3-642-36334-4\_1}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/ZhangWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/ChenWL12, author = {Shan Chen and Kunpeng Wang and Dongdai Lin}, editor = {Michel Abdalla and Tanja Lange}, title = {An Improved Twisted Ate Pairing over {KSS} Curves with k = 18}, booktitle = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, pages = {35--45}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36334-4\_3}, doi = {10.1007/978-3-642-36334-4\_3}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/ChenWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/LuZL12, author = {Yao Lu and Rui Zhang and Dongdai Lin}, editor = {Michel Abdalla and Tanja Lange}, title = {Stronger Security Model for Public-Key Encryption with Equality Test}, booktitle = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, pages = {65--82}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36334-4\_5}, doi = {10.1007/978-3-642-36334-4\_5}, timestamp = {Wed, 06 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/LuZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChenZLC12, author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao}, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {Anonymous Identity-Based Hash Proof System and Its Applications}, booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, pages = {143--160}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2\_10}, doi = {10.1007/978-3-642-33272-2\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ChenZLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HuangL12, author = {Zhenyu Huang and Dongdai Lin}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {A New Method for Solving Polynomial Systems with Noise over {\textdollar}{\textbackslash}mathbb\{F\}{\_}2{\textdollar} and Its Applications in Cold Boot Key Recovery}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {16--33}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_2}, doi = {10.1007/978-3-642-35999-6\_2}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HuangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/ShiAL12, author = {Tao Shi and Vladimir Anashin and Dongdai Lin}, editor = {Tor Helleseth and Jonathan Jedwab}, title = {Linear Weaknesses in T-functions}, booktitle = {Sequences and Their Applications - {SETA} 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7280}, pages = {279--290}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30615-0\_26}, doi = {10.1007/978-3-642-30615-0\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seta/ShiAL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2011, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34704-7}, doi = {10.1007/978-3-642-34704-7}, isbn = {978-3-642-34703-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLL12, author = {Yin Zhang and Meicheng Liu and Dongdai Lin}, title = {On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2012}, url = {http://eprint.iacr.org/2012/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZL12, author = {Meicheng Liu and Yin Zhang and Dongdai Lin}, title = {Perfect Algebraic Immune Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2012}, url = {http://eprint.iacr.org/2012/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangWL12, author = {Xusheng Zhang and Kunpeng Wang and Dongdai Lin}, title = {On Efficient Pairings on Elliptic Curves over Extension Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2012}, url = {http://eprint.iacr.org/2012/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZL12a, author = {Meicheng Liu and Yin Zhang and Dongdai Lin}, title = {On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2012}, url = {http://eprint.iacr.org/2012/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZZL12, author = {Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin}, title = {Integrated {PKE} and {PEKS} - Stronger Security Notions and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2012}, url = {http://eprint.iacr.org/2012/692}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/ZhangLL11, author = {Yin Zhang and Meicheng Liu and Dongdai Lin}, title = {On the nonexistence of Bent Functions}, journal = {Int. J. Found. Comput. Sci.}, volume = {22}, number = {6}, pages = {1431--1438}, year = {2011}, url = {https://doi.org/10.1142/S0129054111008799}, doi = {10.1142/S0129054111008799}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/ZhangLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiuLP11, author = {Meicheng Liu and Dongdai Lin and Dingyi Pei}, title = {Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {7}, pages = {4817--4821}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2145690}, doi = {10.1109/TIT.2011.2145690}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiuLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuLP11, author = {Meicheng Liu and Dongdai Lin and Dingyi Pei}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {34--46}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_3}, doi = {10.1007/978-3-642-22497-3\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/HuangL11, author = {Zhenyu Huang and Dongdai Lin}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Attacking Bivium and Trivium with the Characteristic Set Method}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {77--91}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_5}, doi = {10.1007/978-3-642-21969-6\_5}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/HuangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DengFGLSY11, author = {Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {390--406}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_21}, doi = {10.1007/978-3-642-25385-0\_21}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DengFGLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhouFL11, author = {Chunfang Zhou and Xiutao Feng and Dongdai Lin}, editor = {Dongdai Lin and Gene Tsudik and Xiaoyun Wang}, title = {The Initialization Stage Analysis of {ZUC} v1.5}, booktitle = {Cryptology and Network Security - 10th International Conference, {CANS} 2011, Sanya, China, December 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7092}, pages = {40--53}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25513-7\_5}, doi = {10.1007/978-3-642-25513-7\_5}, timestamp = {Mon, 25 Nov 2019 15:32:12 +0100}, biburl = {https://dblp.org/rec/conf/cans/ZhouFL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangCL11, author = {Xusheng Zhang and Shan Chen and Dongdai Lin}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {210--226}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_16}, doi = {10.1007/978-3-642-34704-7\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangLLW11, author = {Wenhao Wang and Dongdai Lin and Zhenqi Li and Tianze Wang}, editor = {Sihan Qing and Willy Susilo and Guilin Wang and Dongmei Liu}, title = {Improvement and Analysis of {VDP} Method in Time/Memory Tradeoff Applications}, booktitle = {Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7043}, pages = {282--296}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25243-3\_23}, doi = {10.1007/978-3-642-25243-3\_23}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/WangLLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/ZouLM11, author = {Jing Zou and Dongdai Lin and Guo{-}Cui Mi}, title = {A universal distributed model for password cracking}, booktitle = {International Conference on Machine Learning and Cybernetics, {ICMLC} 2011, Guilin, China, July 10-13, 2011, Proceedings}, pages = {955--960}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICMLC.2011.6016851}, doi = {10.1109/ICMLC.2011.6016851}, timestamp = {Fri, 13 Aug 2021 09:26:01 +0200}, biburl = {https://dblp.org/rec/conf/icmlc/ZouLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/ZhangL11, author = {Xusheng Zhang and Dongdai Lin}, editor = {Liqun Chen}, title = {Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {309--326}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_19}, doi = {10.1007/978-3-642-25516-8\_19}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/ZhangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2011, editor = {Dongdai Lin and Gene Tsudik and Xiaoyun Wang}, title = {Cryptology and Network Security - 10th International Conference, {CANS} 2011, Sanya, China, December 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7092}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25513-7}, doi = {10.1007/978-3-642-25513-7}, isbn = {978-3-642-25512-0}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2009, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16342-5}, doi = {10.1007/978-3-642-16342-5}, isbn = {978-3-642-16341-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2010, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21518-6}, doi = {10.1007/978-3-642-21518-6}, isbn = {978-3-642-21517-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-4635, author = {Tao Shi and Vladimir Anashin and Dongdai Lin}, title = {Linear Relation on General Ergodic T-Function}, journal = {CoRR}, volume = {abs/1111.4635}, year = {2011}, url = {http://arxiv.org/abs/1111.4635}, eprinttype = {arXiv}, eprint = {1111.4635}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-4635.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinFPW11, author = {Dongdai Lin and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret and Tianze Wang}, title = {On Enumeration of Polynomial Equivalence Classes and Their Application to {MPKC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2011}, url = {http://eprint.iacr.org/2011/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinFPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinSY11, author = {Dongdai Lin and Tao Shi and Zifeng Yang}, title = {Ergodic Theory Over F\({}_{\mbox{2[[T]]}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2011}, url = {http://eprint.iacr.org/2011/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuLZ11, author = {Lei Xu and Dongdai Lin and Jing Zou}, title = {{ECDLP} on {GPU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2011}, url = {http://eprint.iacr.org/2011/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengFGLSY11, author = {Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung}, title = {Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2011}, url = {http://eprint.iacr.org/2011/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengFGLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiuL10a, author = {Hanwu Liu and Dongdai Lin}, title = {A two-round honest-verifier zero-knowledge protocol}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {5}, pages = {954--963}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0082-0}, doi = {10.1007/S11432-010-0082-0}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LiuL10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/XuL10, author = {Lei Xu and Dongdai Lin}, editor = {Josef Pieprzyk}, title = {Refinement of Miller's Algorithm Over Edwards Curves}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {106--118}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_8}, doi = {10.1007/978-3-642-11925-5\_8}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/XuL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuL10, author = {Lei Xu and Dongdai Lin}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Accelerating Inverse of \emph{GF}(2\({}^{\mbox{\emph{n}}}\)) with Precomputation}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {85--95}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_7}, doi = {10.1007/978-3-642-12827-1\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuLL10, author = {Lin Xu and Dongdai Lin and Xin Li}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {123--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_10}, doi = {10.1007/978-3-642-12827-1\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr/DengCLF09, author = {Yi Deng and Giovanni Di Crescenzo and Dongdai Lin and Dengguo Feng}, editor = {Anna E. Frid and Andrey Morozov and Andrey Rybalchenko and Klaus W. Wagner}, title = {Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model}, booktitle = {Computer Science - Theory and Applications, Fourth International Computer Science Symposium in Russia, {CSR} 2009, Novosibirsk, Russia, August 18-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5675}, pages = {80--91}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03351-3\_10}, doi = {10.1007/978-3-642-03351-3\_10}, timestamp = {Mon, 01 Mar 2021 13:46:21 +0100}, biburl = {https://dblp.org/rec/conf/csr/DengCLF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HuangLZ09, author = {Guifang Huang and Dongdai Lin and Yanshuo Zhang}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {93--101}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_9}, doi = {10.1007/978-3-642-00843-6\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HuangLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2008x, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01440-6}, doi = {10.1007/978-3-642-01440-6}, isbn = {978-3-642-01439-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2008x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-4632, author = {Meicheng Liu and Dongdai Lin}, title = {Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions}, journal = {CoRR}, volume = {abs/0910.4632}, year = {2009}, url = {http://arxiv.org/abs/0910.4632}, eprinttype = {arXiv}, eprint = {0910.4632}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-4632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/DengL08, author = {Yi Deng and Dongdai Lin}, title = {Novel Omega-protocols for {NP}}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {51}, number = {1}, pages = {40--52}, year = {2008}, url = {https://doi.org/10.1007/s11432-008-0004-6}, doi = {10.1007/S11432-008-0004-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/DengL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/TartaryZLWP08, author = {Christophe Tartary and Sujing Zhou and Dongdai Lin and Huaxiong Wang and Josef Pieprzyk}, title = {Analysis of bilinear pairing-based accumulator for identity escrowing}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {4}, pages = {99--107}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070091}, doi = {10.1049/IET-IFS:20070091}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/TartaryZLWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuLG08, author = {Zaiqiang Liu and Dongdai Lin and Fengdeng Guo}, title = {A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine}, journal = {Int. J. Netw. Secur.}, volume = {6}, number = {3}, pages = {301--308}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n3/ijns-2008-v6-n3-p301-308.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuLG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2008, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79499-8}, doi = {10.1007/978-3-540-79499-8}, isbn = {978-3-540-79498-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuLWF07, author = {ZhenYu Hu and Dongdai Lin and Wenling Wu and Dengguo Feng}, title = {Constructing parallel long-message signcryption scheme from trapdoor permutation}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {50}, number = {1}, pages = {82--98}, year = {2007}, url = {https://doi.org/10.1007/s11432-007-2018-x}, doi = {10.1007/S11432-007-2018-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HuLWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JiangLXL07, author = {Zhonghua Jiang and Dongdai Lin and Lin Xu and Lei Lin}, title = {Distributed Cryptographic Computing on Grid}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {179--186}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p179-186.pdf}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/JiangLXL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangLW07, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, title = {Related-Mode Attacks on {CTR} Encryption Mode}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {282--287}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p282-287.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangLW07a, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, title = {Another Look at {PMAC}}, journal = {Int. J. Netw. Secur.}, volume = {5}, number = {1}, pages = {16--20}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n1/ijns-2007-v5-n1-p16-20.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangLW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DengL08, author = {Yi Deng and Dongdai Lin}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {123--137}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_11}, doi = {10.1007/978-3-540-79499-8\_11}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/DengL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhouL08, author = {Sujing Zhou and Dongdai Lin}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Unlinkable Randomizable Signature and Its Application in Group Signature}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {328--342}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_26}, doi = {10.1007/978-3-540-79499-8\_26}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhouL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DengL07, author = {Yi Deng and Dongdai Lin}, editor = {Moni Naor}, title = {Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {148--168}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_9}, doi = {10.1007/978-3-540-72540-4\_9}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DengL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL07a, author = {Sujing Zhou and Dongdai Lin}, title = {An Interesting Member ID-based Group Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2007}, url = {http://eprint.iacr.org/2007/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL07b, author = {Sujing Zhou and Dongdai Lin}, title = {Unlinkable Randomizable Signature and Its Application in Group Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2007}, url = {http://eprint.iacr.org/2007/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/CaoL06, author = {Tianjie Cao and Dongdai Lin}, title = {Cryptanalysis of two password authenticated key exchange protocols based on {RSA}}, journal = {{IEEE} Commun. Lett.}, volume = {10}, number = {8}, pages = {623--625}, year = {2006}, url = {https://doi.org/10.1109/LCOMM.2006.1665131}, doi = {10.1109/LCOMM.2006.1665131}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/CaoL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoLX06, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, title = {Security Analysis of Some Batch Verifying Signatures from Pairings}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {2}, pages = {138--143}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p138-143.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoLX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WuZL06, author = {Wenling Wu and Wentao Zhang and Dongdai Lin}, title = {Security on Generalized Feistel Scheme with {SP} Round Function}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {3}, pages = {215--224}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p215-224.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WuZL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangLW06, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {An Improved Poly1305 {MAC}}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {284--292}, year = {2006}, url = {https://doi.org/10.1007/11767480\_19}, doi = {10.1007/11767480\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/WangLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhouL06, author = {Sujing Zhou and Dongdai Lin}, editor = {David Pointcheval and Yi Mu and Kefei Chen}, title = {Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps}, booktitle = {Cryptology and Network Security, 5th International Conference, {CANS} 2006, Suzhou, China, December 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4301}, pages = {126--143}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935070\_8}, doi = {10.1007/11935070\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhouL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangLW06, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {{OPMAC:} One-Key Poly1305 {MAC}}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {78--87}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_7}, doi = {10.1007/11937807\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CaoML06, author = {Tianjie Cao and Xianping Mao and Dongdai Lin}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Security Analysis of a Server-Aided {RSA} Key Generation Protocol}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {314--320}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_29}, doi = {10.1007/11689522\_29}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CaoML06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JiangLXL06, author = {Zhonghua Jiang and Dongdai Lin and Lin Xu and Lei Lin}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Integrating Grid with Cryptographic Computing}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {321--331}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_30}, doi = {10.1007/11689522\_30}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JiangLXL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2006, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807}, doi = {10.1007/11937807}, isbn = {3-540-49608-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0607035, author = {Yi Deng and Dongdai Lin}, title = {Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption}, journal = {CoRR}, volume = {abs/cs/0607035}, year = {2006}, url = {http://arxiv.org/abs/cs/0607035}, eprinttype = {arXiv}, eprint = {cs/0607035}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0607035.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0609057, author = {Yi Deng and Giovanni Di Crescenzo and Dongdai Lin}, title = {Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model}, journal = {CoRR}, volume = {abs/cs/0609057}, year = {2006}, url = {http://arxiv.org/abs/cs/0609057}, eprinttype = {arXiv}, eprint = {cs/0609057}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0609057.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL06, author = {Sujing Zhou and Dongdai Lin}, title = {A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2006}, url = {http://eprint.iacr.org/2006/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengL06, author = {Yi Deng and Dongdai Lin}, title = {Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2006}, url = {http://eprint.iacr.org/2006/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL06a, author = {Sujing Zhou and Dongdai Lin}, title = {Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2006}, url = {http://eprint.iacr.org/2006/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengCL06, author = {Yi Deng and Giovanni Di Crescenzo and Dongdai Lin}, title = {Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2006}, url = {http://eprint.iacr.org/2006/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaoLX05, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, title = {A randomized RSA-based partially blind signature scheme for electronic cash}, journal = {Comput. Secur.}, volume = {24}, number = {1}, pages = {44--49}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2004.05.008}, doi = {10.1016/J.COSE.2004.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaoLX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CaoLX05, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, title = {An Efficient ID-Based Deniable Authentication Protocol from Pairings}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {388--391}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.100}, doi = {10.1109/AINA.2005.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CaoLX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CaoLX05a, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, title = {ID-Based Ring Authenticated Encryption}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {591--596}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.203}, doi = {10.1109/AINA.2005.203}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CaoLX05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouL05, author = {Sujing Zhou and Dongdai Lin}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {On Anonymity of Group Signatures}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {131--136}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_19}, doi = {10.1007/11596981\_19}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhouL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLW05, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Variant of Poly1305 {MAC} and Its Security Proof}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {375--380}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_55}, doi = {10.1007/11596981\_55}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoLX05, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Universal Designated-Verifier Proxy Blind Signatures for E-Commerce}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1036--1041}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_154}, doi = {10.1007/11596981\_154}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/CaoLX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CaoL05, author = {Tianjie Cao and Dongdai Lin}, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, pages = {233--241}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548\_20}, doi = {10.1007/11599548\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CaoL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/QuSLF05, author = {Haipeng Qu and Purui Su and Dongdai Lin and Dengguo Feng}, editor = {Pascal Lorenz and Petre Dini}, title = {A Packet Marking Scheme for {IP} Traceback}, booktitle = {Networking - {ICN} 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3421}, pages = {964--971}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31957-3\_109}, doi = {10.1007/978-3-540-31957-3\_109}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icn/QuSLF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skg/JiangXLWL05, author = {Zhonghua Jiang and Lin Xu and Lei Lin and Dayin Wang and Dongdai Lin}, title = {A Distributed Cryptographic Computing System}, booktitle = {2005 International Conference on Semantics, Knowledge and Grid {(SKG} 2005), 27-29 November 2005, Beijing, China}, pages = {115}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SKG.2005.5}, doi = {10.1109/SKG.2005.5}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/skg/JiangXLWL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2005, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548}, doi = {10.1007/11599548}, isbn = {3-540-30855-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL05, author = {Sujing Zhou and Dongdai Lin}, title = {Analyzing Unlinkability of Some Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2005}, url = {http://eprint.iacr.org/2005/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL05a, author = {Sujing Zhou and Dongdai Lin}, title = {On Anonymity of Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2005}, url = {http://eprint.iacr.org/2005/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangGKLLZ04, author = {Paul S. Wang and Simon Gray and Norbert Kajler and Dongdai Lin and Weidong Liao and Xiao Zou}, title = {The Internet accessible mathematical computation framework}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {47}, number = {1}, pages = {75--88}, year = {2004}, url = {https://doi.org/10.1360/02yf0174}, doi = {10.1360/02YF0174}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WangGKLLZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/awcc/CaoLX04, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, editor = {Chi{-}Hung Chi and Kwok{-}Yan Lam}, title = {Security Analysis of User Efficient Blind Signatures}, booktitle = {Content Computing, Advanced Workshop on Content Computing, {AWCC} 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3309}, pages = {167--172}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30483-8\_21}, doi = {10.1007/978-3-540-30483-8\_21}, timestamp = {Sun, 02 Jun 2019 21:13:11 +0200}, biburl = {https://dblp.org/rec/conf/awcc/CaoLX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/awcc/CaoLX04a, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, editor = {Chi{-}Hung Chi and Kwok{-}Yan Lam}, title = {Improved Privacy-Protecting Proxy Signature Scheme}, booktitle = {Content Computing, Advanced Workshop on Content Computing, {AWCC} 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3309}, pages = {208--213}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30483-8\_25}, doi = {10.1007/978-3-540-30483-8\_25}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/awcc/CaoLX04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/WuYZL04, author = {Yongwei Wu and Guangwen Yang and Weimin Zheng and Dongdai Lin}, editor = {Marian Bubak and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {DisCAS: {A} Distributed-Parallel Computer Algebra System}, booktitle = {Computational Science - {ICCS} 2004, 4th International Conference, Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3039}, pages = {295--302}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25944-2\_38}, doi = {10.1007/978-3-540-25944-2\_38}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/WuYZL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceb/XiaoL04, author = {Jianfang Xiao and Dongdai Lin}, editor = {Jian Chen}, title = {Survey of Security in Grid Services}, booktitle = {The Fourth International Conference on Electronic Business - Shaping Business Strategy in a Networked World}, pages = {1241--1245}, publisher = {Academic Publishers/World Publishing Corporation}, year = {2004}, timestamp = {Tue, 22 Feb 2005 15:21:39 +0100}, biburl = {https://dblp.org/rec/conf/iceb/XiaoL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZL04, author = {Wenling Wu and Wentao Zhang and Dongdai Lin}, title = {Security on Generalized Feistel Scheme with {SP} Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2004}, url = {http://eprint.iacr.org/2004/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issac/WangGKLLZ01, author = {Paul S. Wang and Simon Gray and Norbert Kajler and Dongdai Lin and Weidong Liao and Xiao Zou}, editor = {Erich L. Kaltofen and Gilles Villard}, title = {{IAMC} architecture and prototyping: a progress report}, booktitle = {Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, {ISSAC} 2001, {ORCCA} {\&} University of Western Ontario, London, Ontario, Canada, July 22-25, 2001}, pages = {337--344}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/384101.384147}, doi = {10.1145/384101.384147}, timestamp = {Mon, 03 Apr 2023 17:23:32 +0200}, biburl = {https://dblp.org/rec/conf/issac/WangGKLLZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LinL99, author = {Dongdai Lin and Zhuojun Liu}, title = {Object-oriented analysis of {ELIMINO}}, journal = {J. Comput. Sci. Technol.}, volume = {14}, number = {5}, pages = {487--494}, year = {1999}, url = {https://doi.org/10.1007/BF02948790}, doi = {10.1007/BF02948790}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LinL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/LinL93, author = {Dongdai Lin and Mulan Liu}, title = {The Equivalence Classes of {LR} Arrays}, journal = {Discret. Appl. Math.}, volume = {43}, number = {1}, pages = {47--61}, year = {1993}, url = {https://doi.org/10.1016/0166-218X(93)90168-N}, doi = {10.1016/0166-218X(93)90168-N}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/LinL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LinL93, author = {Dongdai Lin and Mulan Liu}, title = {Structure and properties of linear recurring m-arrays}, journal = {{IEEE} Trans. Inf. Theory}, volume = {39}, number = {5}, pages = {1758--1762}, year = {1993}, url = {https://doi.org/10.1109/18.259672}, doi = {10.1109/18.259672}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LinL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issac/LinL93, author = {Dongdai Lin and Zhuojun Liu}, editor = {Manuel Bronstein}, title = {Some Results on Theorem Proving in Geometry over Finite Fields}, booktitle = {Proceedings of the 1993 International Symposium on Symbolic and Algebraic Computation, {ISSAC} '93, Kiev, Ukraine, July 6-8, 1993}, pages = {292--300}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/164081.164143}, doi = {10.1145/164081.164143}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issac/LinL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LinL88, author = {Dongdai Lin and Mulan Liu}, editor = {Christoph G. G{\"{u}}nther}, title = {Linear Recurring m-Arrays}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {351--357}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_33}, doi = {10.1007/3-540-45961-8\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LinL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.