default search action
Dongdai Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j120]Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers. IACR Commun. Cryptol. 1(1): 13 (2024) - [j119]Shiqi Hou, Baofeng Wu, Shichang Wang, Hao Guo, Dongdai Lin:
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros. Comput. J. 67(4): 1483-1500 (2024) - [j118]Yupeng Jiang, Ming Li, Ying Gao, Dongdai Lin:
On prefer-one sequences. Des. Codes Cryptogr. 92(10): 3017-3032 (2024) - [j117]Yingyin Pan, Jianghua Zhong, Dongdai Lin:
The equivalence between Galois and Fibonacci NFSRs. Theor. Comput. Sci. 1003: 114620 (2024) - 2023
- [j116]Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma:
On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. Comput. J. 66(6): 1376-1399 (2023) - [j115]Yaqi Xu, Baofeng Wu, Dongdai Lin:
New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey. Comput. J. 66(9): 2279-2295 (2023) - [j114]Ming Li, Yupeng Jiang, Dongdai Lin:
Properties of the cycles that contain all vectors of weight $\le k$. Des. Codes Cryptogr. 91(1): 221-239 (2023) - [j113]Zhengnan Li, Baofeng Wu, Dongdai Lin:
Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers. J. Syst. Sci. Complex. 36(6): 2681-2702 (2023) - [j112]Luyao Xu, Zhengyi Dai, Baofeng Wu, Dongdai Lin:
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 568-586 (2023) - [j111]Wenhao Wang, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Hongliang Tian, Dongdai Lin:
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. IEEE Trans. Dependable Secur. Comput. 20(1): 522-538 (2023) - [j110]Ming Li, Dongdai Lin:
Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences. IEEE Trans. Inf. Theory 69(1): 598-609 (2023) - [j109]Yupeng Jiang, Ming Li, Dongdai Lin:
Proofs of Conjectures on Extremal Weight De Bruijn Sequences. IEEE Trans. Inf. Theory 69(8): 5357-5363 (2023) - 2022
- [j108]Lin Hou, Dongdai Lin, Renzhang Liu:
Hierarchical group signature with verifier-local revocation revisited. Sci. China Inf. Sci. 65(8): 1-3 (2022) - [j107]Wenhui Kong, Jianghua Zhong, Dongdai Lin:
Observability of Galois nonlinear feedback shift registers. Sci. China Inf. Sci. 65(9): 1-16 (2022) - [j106]Xiaojuan Lu, Bohan Li, Meicheng Liu, Dongdai Lin:
Improved conditional differential attacks on lightweight hash family QUARK. Cybersecur. 5(1): 12 (2022) - [j105]Ming Li, Dongdai Lin:
The Adjacency Graphs of FSRs With Affine Characteristic Functions. IEEE Trans. Inf. Theory 68(1): 649-658 (2022) - 2021
- [j104]Zhi Hu, Dongdai Lin, Chang-An Zhao:
Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems. Appl. Math. Comput. 404: 126239 (2021) - [j103]Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin:
Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers. Cybersecur. 4(1): 17 (2021) - [j102]Zhenyu Huang, Yao Sun, Dongdai Lin:
Analyzing Boolean Functions via Solving Parametric Polynomial Systems. J. Syst. Sci. Complex. 34(2): 792-808 (2021) - [j101]Zhenyu Huang, Yao Sun, Dongdai Lin:
On the efficiency of solving Boolean polynomial systems with the characteristic set method. J. Symb. Comput. 103: 66-94 (2021) - [j100]Ming Li, Dongdai Lin:
Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees. IEEE Trans. Inf. Theory 67(10): 6940-6951 (2021) - 2020
- [j99]Xuecheng Ma, Dongdai Lin:
Server-aided Revocable IBE with Identity Reuse. Comput. J. 63(4): 620-632 (2020) - [j98]Yupeng Jiang, Dongdai Lin:
Longest subsequences shared by two de Bruijn sequences. Des. Codes Cryptogr. 88(7): 1463-1475 (2020) - [j97]Guangpu Gao, Dongdai Lin, Wenfen Liu, Yongjuan Wang:
Composition of Boolean functions: An application to the secondary constructions of bent functions. Discret. Math. 343(3): 111711 (2020) - [j96]Junying Liu, Qunxiong Zheng, Dongdai Lin:
A New Upper Bound on the Order of Affine Sub-families of NFSRs. J. Syst. Sci. Complex. 33(1): 196-214 (2020) - [j95]Bohan Li, Meicheng Liu, Dongdai Lin:
FPGA implementations of Grain v1, Mickey 2.0, Trivium, Lizard and Plantlet. Microprocess. Microsystems 78: 103210 (2020) - [j94]Yuqing Zhu, Jiejing Wen, Jincheng Zhuang, Chang Lv, Dongdai Lin:
Refined analysis to the extended tower number field sieve. Theor. Comput. Sci. 814: 49-68 (2020) - 2019
- [j93]Jianghua Zhong, Dongdai Lin:
Decomposition of nonlinear feedback shift registers based on Boolean networks. Sci. China Inf. Sci. 62(3): 39110:1-39110:3 (2019) - [j92]Jianghua Zhong, Dongdai Lin:
On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers. Comput. J. 62(12): 1793-1804 (2019) - [j91]Haiyan Wang, Qiuzhen Lin, Jianyong Chen, Jianqiang Li, Jianghua Zhong, Dongdai Lin, Jia Wang, Lijia Ma:
On Stability of Multi-Valued Nonlinear Feedback Shift Registers. Complex. 2019: 8765970:1-8765970:11 (2019) - [j90]Yuqing Zhu, Jincheng Zhuang, Hairong Yi, Chang Lv, Dongdai Lin:
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity. Des. Codes Cryptogr. 87(5): 971-986 (2019) - [j89]Shihui Fu, Xiutao Feng, Dongdai Lin, Qiang Wang:
A recursive construction of permutation polynomials over Fq2 with odd characteristic related to Rédei functions. Des. Codes Cryptogr. 87(7): 1481-1498 (2019) - [j88]Junying Liu, Yupeng Jiang, Qunxiong Zheng, Dongdai Lin:
A new construction of zero-difference balanced functions and two applications. Des. Codes Cryptogr. 87(10): 2251-2265 (2019) - [j87]Xiutao Feng, Dongdai Lin, Li-Ping Wang, Qiang Wang:
Further results on complete permutation monomials over finite fields. Finite Fields Their Appl. 57: 47-59 (2019) - [j86]Minghui Yang, Dongdai Lin, Qiuyan Wang, Jian Gao:
On the Linear Complexity of Binary Generalized Cyclotomic Sequences of Period 2pm+1qn+1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(4): 676-679 (2019) - [j85]Ting Li, Yao Sun, Zhenyu Huang, Dingkang Wang, Dongdai Lin:
Speeding Up the GVW Algorithm via a Substituting Method. J. Syst. Sci. Complex. 32(1): 205-233 (2019) - [j84]Guangpu Gao, Dongdai Lin, Wenfen Liu:
A Note on Rotation Symmetric S-boxes. J. Syst. Sci. Complex. 32(5): 1460-1472 (2019) - [j83]Lan Luo, Zhi Ma, Dongdai Lin:
Two new families of quantum synchronizable codes. Quantum Inf. Process. 18(9): 277 (2019) - [j82]Anyu Wang, Zhifang Zhang, Dongdai Lin:
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach. IEEE Trans. Inf. Theory 65(7): 4167-4179 (2019) - 2018
- [j81]Libo Wang, Baofeng Wu, Zhuojun Liu, Dongdai Lin:
Three new infinite families of bent functions. Sci. China Inf. Sci. 61(3): 032104:1-032104:14 (2018) - [j80]Jian Bai, Ting Li, Yao Sun, Dingkang Wang, Dongdai Lin:
The lightest 4 × 4 MDS matrices over GL(4, 𝔽2). Sci. China Inf. Sci. 61(11): 119102:1-119102:3 (2018) - [j79]Xiaojuan Zhang, Xiutao Feng, Dongdai Lin:
Fault Attack on ACORN v3. Comput. J. 61(8): 1166-1179 (2018) - [j78]Fei Li, Qiuyan Wang, Dongdai Lin:
A class of three-weight and five-weight linear codes. Discret. Appl. Math. 241: 25-38 (2018) - [j77]Zhiqiang Lin, Dingyi Pei, Dongdai Lin, Xiaolei Zhang:
Fast construction of binary ring FCSRs for hardware stream ciphers. Des. Codes Cryptogr. 86(4): 939-953 (2018) - [j76]Zheng He, Kunpeng Bai, Dongdai Lin, Chuankun Wu:
Unification of identifiers in the Sea-Cloud system. Frontiers Comput. Sci. 12(4): 749-762 (2018) - [j75]Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security evaluation on Simeck against zero-correlation linear cryptanalysis. IET Inf. Secur. 12(1): 87-93 (2018) - [j74]Ming Li, Dongdai Lin:
De Bruijn Sequences, Adjacency Graphs, and Cyclotomy. IEEE Trans. Inf. Theory 64(4): 2941-2952 (2018) - [j73]Yupeng Jiang, Dongdai Lin:
Lower and Upper Bounds on the Density of Irreducible NFSRs. IEEE Trans. Inf. Theory 64(5): 3944-3952 (2018) - [j72]Jianghua Zhong, Dongdai Lin:
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure. IEEE Trans. Inf. Theory 64(9): 6429-6442 (2018) - 2017
- [j71]Qiuyan Wang, Kelan Ding, Dongdai Lin, Rui Xue:
A kind of three-weight linear codes. Cryptogr. Commun. 9(3): 315-322 (2017) - [j70]Zhiqiang Lin, Dongdai Lin, Dingyi Pei:
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications. Cryptogr. Commun. 9(4): 431-443 (2017) - [j69]Yupeng Jiang, Qun-Xiong Zheng, Dongdai Lin:
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers. Sci. China Inf. Sci. 60(5): 052102:1-052102:12 (2017) - [j68]Yupeng Jiang, Dongdai Lin:
On affine sub-families of Grain-like structures. Des. Codes Cryptogr. 82(3): 531-542 (2017) - [j67]Ming Li, Yupeng Jiang, Dongdai Lin:
The adjacency graphs of some feedback shift registers. Des. Codes Cryptogr. 82(3): 695-713 (2017) - [j66]Qiuyan Wang, Fei Li, Kelan Ding, Dongdai Lin:
Complete weight enumerators of two classes of linear codes. Discret. Math. 340(3): 467-480 (2017) - [j65]Ming Li, Yupeng Jiang, Dongdai Lin, Qiuyan Wang:
Transition Mappings between De Bruijn Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(5): 1254-1256 (2017) - [j64]YaWei Ren, Feng Liu, Teng Guo, Rongquan Feng, Dongdai Lin:
Cheating prevention visual cryptography scheme using Latin square. IET Inf. Secur. 11(4): 211-219 (2017) - [j63]Meicheng Liu, Dongdai Lin:
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks. Inf. Sci. 421: 181-203 (2017) - [j62]Haiyan Wang, Jianghua Zhong, Dongdai Lin:
Linearization of multi-valued nonlinear feedback shift registers. J. Syst. Sci. Complex. 30(2): 494-509 (2017) - [j61]Xiaojuan Zhang, Xiutao Feng, Dongdai Lin:
Fault Attack on the Authenticated Cipher ACORN v2. Secur. Commun. Networks 2017: 3834685:1-3834685:16 (2017) - [j60]Zhenyu Huang, Dongdai Lin:
Solving polynomial systems with noise over F2: Revisited. Theor. Comput. Sci. 676: 52-68 (2017) - [j59]Ming Li, Dongdai Lin:
The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials. IEEE Trans. Inf. Theory 63(2): 1325-1335 (2017) - [j58]Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin:
Direct Construction of Optimal Rotational-XOR Diffusion Primitives. IACR Trans. Symmetric Cryptol. 2017(4): 169-187 (2017) - 2016
- [j57]Mingxing Wang, Yupeng Jiang, Dongdai Lin:
Further results on the nonlinearity of maximum-length NFSR feedbacks. Cryptogr. Commun. 8(1): 1-6 (2016) - [j56]Qiuyan Wang, Yupeng Jiang, Dongdai Lin:
Linear complexity of Ding-Helleseth sequences of order 2 over GF(l). Cryptogr. Commun. 8(1): 33-49 (2016) - [j55]Qiuyan Wang, Dongdai Lin:
Generalized cyclotomic numbers of order two and their applications. Cryptogr. Commun. 8(4): 605-616 (2016) - [j54]Jianghua Zhong, Dongdai Lin:
Stability of nonlinear feedback shift registers. Sci. China Inf. Sci. 59(1): 1-12 (2016) - [j53]Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang:
Generic constructions of integrated PKE and PEKS. Des. Codes Cryptogr. 78(2): 493-526 (2016) - [j52]Chun Guo, Dongdai Lin:
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour. Des. Codes Cryptogr. 81(1): 109-129 (2016) - [j51]Yao Sun, Zhenyu Huang, Dingkang Wang, Dongdai Lin:
An improvement over the GVW algorithm for inhomogeneous polynomial systems. Finite Fields Their Appl. 41: 174-192 (2016) - [j50]Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin:
Classifying and generating exact coset representatives of PGL2(Fq) in PGL2(Fq2). Finite Fields Their Appl. 42: 118-127 (2016) - [j49]Jianghua Zhong, Dongdai Lin:
Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers. J. Complex. 35: 29-45 (2016) - [j48]Yao Sun, Zhenyu Huang, Dongdai Lin, Dingkang Wang:
On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra. J. Syst. Sci. Complex. 29(3): 789-804 (2016) - [j47]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (identity-based) hash proof system and its applications. Secur. Commun. Networks 9(12): 1698-1716 (2016) - [j46]Jianghua Zhong, Dongdai Lin:
Driven Stability of Nonlinear Feedback Shift Registers With Inputs. IEEE Trans. Commun. 64(6): 2274-2284 (2016) - 2015
- [j45]Yao Sun, Dongdai Lin, Dingkang Wang:
On implementing signature-based Gröbner basis algorithms using linear algebraic routines from M4RI. ACM Commun. Comput. Algebra 49(2): 63-64 (2015) - [j44]Chun Guo, Dongdai Lin:
Improved domain extender for the ideal cipher. Cryptogr. Commun. 7(4): 509-533 (2015) - [j43]Youliang Tian, Changgen Peng, Dongdai Lin, Jianfeng Ma, Qi Jiang, Wenjiang Ji:
Bayesian mechanism for rational secret sharing scheme. Sci. China Inf. Sci. 58(5): 1-13 (2015) - [j42]Huanguo Zhang, Wenbao Han, Xuejia Lai, Dongdai Lin, Jianfeng Ma, Jianhua Li:
Survey on cyberspace security. Sci. China Inf. Sci. 58(11): 1-43 (2015) - [j41]Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede:
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12): 1-15 (2015) - [j40]Baofeng Wu, Dongdai Lin:
On constructing complete permutation polynomials over finite fields of even characteristic. Discret. Appl. Math. 184: 213-222 (2015) - [j39]Xiaochun Cao, Meili Ma, Xiaojie Guo, Ling Du, Dongdai Lin:
A new encryption scheme for surveillance videos. Frontiers Comput. Sci. 9(5): 765-777 (2015) - [j38]Zhiqiang Lin, Lishan Ke, Dongdai Lin, Jian Gao:
On the LFSRization of a Class of FCSR Automata. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 434-440 (2015) - [j37]Qiuyan Wang, Yupeng Jiang, Dongdai Lin:
Linear complexity of binary generalized cyclotomic sequences over GF(q). J. Complex. 31(5): 731-740 (2015) - [j36]Kai Chen, Weifeng Chen, Zhen Xu, Dongdai Lin, Yazhe Wang:
VFA: A Variable-Factor Authentication Framework for Mobile Users. J. Commun. 10(6): 366-379 (2015) - [j35]Jianghua Zhong, Dongdai Lin:
A new linearization method for nonlinear feedback shift registers. J. Comput. Syst. Sci. 81(4): 783-796 (2015) - [j34]Chengliang Tian, Wei Wei, Dongdai Lin:
Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle. J. Comput. Sci. Technol. 30(6): 1370-1377 (2015) - [j33]Xiaochun Cao, Xingxing Wei, Yahong Han, Dongdai Lin:
Robust Face Clustering Via Tensor Decomposition. IEEE Trans. Cybern. 45(11): 2546-2557 (2015) - [j32]Minghui Yang, Jin Li, Keqin Feng, Dongdai Lin:
Generalized Hamming Weights of Irreducible Cyclic Codes. IEEE Trans. Inf. Theory 61(9): 4905-4913 (2015) - 2014
- [j31]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System. Comput. J. 57(10): 1537-1556 (2014) - [j30]Yin Zhang, Meicheng Liu, Dongdai Lin:
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks. Discret. Appl. Math. 162: 17-27 (2014) - [j29]Qiuyan Wang, Dongdai Lin, Xuan Guang:
On the Linear Complexity of Legendre Sequences Over Fq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(7): 1627-1630 (2014) - [j28]Minghui Yang, Dongdai Lin, Xuan Guang:
Generalized Fourier Transform and the Joint N-Adic Complexity of a Multisequence. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(9): 1982-1986 (2014) - [j27]Qiuyan Wang, Yupeng Jiang, Dongdai Lin, Xuan Guang:
On the Linear Complexity of New Modified Jacobi Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2263-2266 (2014) - [j26]Minghui Yang, Dongdai Lin, Minjia Shi:
Minimum Linear Complexity Approximation of Sequences with Period qn-1 over Fq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(12): 2667-2670 (2014) - [j25]Shaoyu Du, Meicheng Liu, Yin Zhang, Dongdai Lin:
On the Nonlinearity and Correlation Immunity of Two Classes of Boolean Functions. Int. J. Softw. Informatics 8(2): 177-192 (2014) - [j24]Huazhu Fu, Xiaochun Cao, Zhuowen Tu, Dongdai Lin:
Symmetry Constraint for Foreground Extraction. IEEE Trans. Cybern. 44(5): 644-654 (2014) - [j23]Yupeng Jiang, Dongdai Lin:
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers. IEEE Trans. Inf. Theory 60(10): 6602-6608 (2014) - 2013
- [j22]Yao Lu, Rui Zhang, Dongdai Lin:
Improved bounds for the implicit factorization problem. Adv. Math. Commun. 7(3): 243-251 (2013) - [j21]Tianze Wang, Dongdai Lin:
A method for counting the number of polynomial equivalence classes. J. Math. Cryptol. 7(1): 69-95 (2013) - 2012
- [j20]Dongdai Lin, Jean-Charles Faugère, Ludovic Perret, Tianze Wang:
On enumeration of polynomial equivalence classes and their application to MPKC. Finite Fields Their Appl. 18(2): 283-302 (2012) - [j19]Dongdai Lin, Tao Shi, Zifeng Yang:
Ergodic theory over F2[[T]]. Finite Fields Their Appl. 18(3): 473-491 (2012) - 2011
- [j18]Yin Zhang, Meicheng Liu, Dongdai Lin:
On the nonexistence of Bent Functions. Int. J. Found. Comput. Sci. 22(6): 1431-1438 (2011) - [j17]Meicheng Liu, Dongdai Lin, Dingyi Pei:
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. IEEE Trans. Inf. Theory 57(7): 4817-4821 (2011) - 2010
- [j16]Hanwu Liu, Dongdai Lin:
A two-round honest-verifier zero-knowledge protocol. Sci. China Inf. Sci. 53(5): 954-963 (2010) - 2008
- [j15]Yi Deng, Dongdai Lin:
Novel Omega-protocols for NP. Sci. China Ser. F Inf. Sci. 51(1): 40-52 (2008) - [j14]Christophe Tartary, Sujing Zhou, Dongdai Lin, Huaxiong Wang, Josef Pieprzyk:
Analysis of bilinear pairing-based accumulator for identity escrowing. IET Inf. Secur. 2(4): 99-107 (2008) - [j13]Zaiqiang Liu, Dongdai Lin, Fengdeng Guo:
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine. Int. J. Netw. Secur. 6(3): 301-308 (2008) - 2007
- [j12]ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng:
Constructing parallel long-message signcryption scheme from trapdoor permutation. Sci. China Ser. F Inf. Sci. 50(1): 82-98 (2007) - [j11]Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin:
Distributed Cryptographic Computing on Grid. Int. J. Netw. Secur. 4(2): 179-186 (2007) - [j10]Dayin Wang, Dongdai Lin, Wenling Wu:
Related-Mode Attacks on CTR Encryption Mode. Int. J. Netw. Secur. 4(3): 282-287 (2007) - [j9]Dayin Wang, Dongdai Lin, Wenling Wu:
Another Look at PMAC. Int. J. Netw. Secur. 5(1): 16-20 (2007) - 2006
- [j8]Tianjie Cao, Dongdai Lin:
Cryptanalysis of two password authenticated key exchange protocols based on RSA. IEEE Commun. Lett. 10(8): 623-625 (2006) - [j7]Tianjie Cao, Dongdai Lin, Rui Xue:
Security Analysis of Some Batch Verifying Signatures from Pairings. Int. J. Netw. Secur. 3(2): 138-143 (2006) - [j6]Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. Int. J. Netw. Secur. 3(3): 215-224 (2006) - 2005
- [j5]Tianjie Cao, Dongdai Lin, Rui Xue:
A randomized RSA-based partially blind signature scheme for electronic cash. Comput. Secur. 24(1): 44-49 (2005) - 2004
- [j4]Paul S. Wang, Simon Gray, Norbert Kajler, Dongdai Lin, Weidong Liao, Xiao Zou:
The Internet accessible mathematical computation framework. Sci. China Ser. F Inf. Sci. 47(1): 75-88 (2004) - 1999
- [j3]Dongdai Lin, Zhuojun Liu:
Object-oriented analysis of ELIMINO. J. Comput. Sci. Technol. 14(5): 487-494 (1999) - 1993
- [j2]Dongdai Lin, Mulan Liu:
The Equivalence Classes of LR Arrays. Discret. Appl. Math. 43(1): 47-61 (1993) - [j1]Dongdai Lin, Mulan Liu:
Structure and properties of linear recurring m-arrays. IEEE Trans. Inf. Theory 39(5): 1758-1762 (1993)
Conference and Workshop Papers
- 2023
- [c134]Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Moving a Step of ChaCha in Syncopated Rhythm. CRYPTO (3) 2023: 273-304 - [c133]Chun Guo, Lei Wang, Dongdai Lin:
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls. EUROCRYPT (4) 2023: 408-439 - [c132]Shuaishuai Li, Cong Zhang, Dongdai Lin:
Oblivious Transfer from Rerandomizable PKE. ICICS 2023: 128-145 - [c131]Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin:
Efficient Private Multiset ID Protocols. ICICS 2023: 351-369 - [c130]Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin:
Linear Private Set Union from Multi-Query Reverse Private Membership Test. USENIX Security Symposium 2023: 337-354 - 2022
- [c129]Cong Zhang, Shuaishuai Li, Dongdai Lin:
Amortizing Division and Exponentiation. Inscrypt 2022: 192-210 - [c128]Chenmeng Li, Baofeng Wu, Dongdai Lin:
Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT. Inscrypt 2022: 213-233 - [c127]Lulu Zhang, Meicheng Liu, Shuaishuai Li, Dongdai Lin:
Cryptanalysis of Ciminion. Inscrypt 2022: 234-251 - [c126]Bohan Li, Hailong Zhang, Dongdai Lin:
Higher-Order Masking Scheme for Trivium Hardware Implementation. Inscrypt 2022: 337-356 - [c125]Yingyin Pan, Jianghua Zhong, Dongdai Lin:
Nonsingularity of Galois Nonlinear Feedback Shift Registers. ISIT 2022: 366-371 - [c124]Minghui Yang, Shiyuan Qiang, Xiaoyan Jing, Keqin Feng, Dongdai Lin:
The 4-Adic Complexity of Quaternary Sequences of Even Period With Ideal Autocorrelation. ISIT 2022: 528-531 - [c123]Lulu Zhang, Meicheng Liu, Dongdai Lin:
A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair. SAC 2022: 306-327 - 2021
- [c122]Shichang Wang, Shiqi Hou, Meicheng Liu, Dongdai Lin:
Differential-Linear Cryptanalysis of the Lightweight Crytographic Algorithm KNOT. Inscrypt 2021: 171-190 - [c121]Wenhui Kong, Jianghua Zhong, Dongdai Lin:
Isomorphism and Equivalence of Galois Nonlinear Feedback Shift Registers. Inscrypt 2021: 301-315 - [c120]Qun-Xiong Zheng, Yupeng Jiang, Dongdai Lin, Wen-Feng Qi:
Binary Sequences Derived from Monomial Permutation Polynomials over GF(2p). Inscrypt 2021: 371-383 - [c119]Meicheng Liu, Xiaojuan Lu, Dongdai Lin:
Differential-Linear Cryptanalysis from an Algebraic Perspective. CRYPTO (3) 2021: 247-277 - [c118]Yaqi Xu, Baofeng Wu, Dongdai Lin:
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX Ciphers with Applications to Chaskey. ICICS (2) 2021: 192-209 - [c117]Ming Li, Yupeng Jiang, Dongdai Lin:
Construction of De Bruijn Sequences from l-sequences. ISIT 2021: 1522-1527 - [c116]Minghui Yang, Shiyuan Qiang, Keqin Feng, Dongdai Lin:
On the 4-Adic Complexity of Quaternary Sequences of Period $2p$ with Ideal Autocorrelation. ISIT 2021: 1812-1816 - [c115]Yingyin Pan, Jianghua Zhong, Dongdai Lin:
On Galois NFSRs with Terminal Bits. ISIT 2021: 3062-3067 - [c114]Xiaojuan Lu, Bohan Li, Shichang Wang, Dongdai Lin:
Conditional Differential Cryptanalysis on Bagua. SecITC 2021: 178-189 - 2020
- [c113]Ming Li, Yupeng Jiang, Dongdai Lin:
On the k-Error Linear Complexities of De Bruijn Sequences. Inscrypt 2020: 344-356 - [c112]Jianghua Zhong, Yingyin Pan, Dongdai Lin:
On Galois NFSRs Equivalent to Fibonacci Ones. Inscrypt 2020: 433-449 - [c111]Ming Li, Yupeng Jiang, Dongdai Lin:
The Numbers of De Bruijn Sequences in Extremal Weight Classes. ISIT 2020: 2909-2914 - 2019
- [c110]Hairong Yi, Guiwen Luo, Dongdai Lin:
Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains. C2SI 2019: 236-253 - [c109]Xuecheng Ma, Dongdai Lin:
Generic Constructions of Revocable Identity-Based Encryption. Inscrypt 2019: 381-396 - [c108]Tian Qiu, Lin Hou, Dongdai Lin:
A Multi-Group Signature Scheme from Lattices. ICICS 2019: 359-377 - [c107]Jingchun Yang, Meicheng Liu, Dongdai Lin:
Cube Cryptanalysis of Round-Reduced ACORN. ISC 2019: 44-64 - 2018
- [c106]Xuecheng Ma, Xin Wang, Dongdai Lin:
Anonymous Identity-Based Encryption with Identity Recovery. ACISP 2018: 360-375 - [c105]Qun-Xiong Zheng, Dongdai Lin, Wen-Feng Qi:
Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers. Inscrypt 2018: 568-585 - [c104]Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin:
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. EUROCRYPT (2) 2018: 715-744 - [c103]Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin:
Hierarchical Group Signatures with Verifier-Local Revocation. ICICS 2018: 271-286 - [c102]Xuecheng Ma, Dongdai Lin:
Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model. ICISC 2018: 69-84 - [c101]Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin:
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP. ISC 2018: 116-131 - [c100]Xiaojuan Zhang, Meicheng Liu, Dongdai Lin:
Conditional Cube Searching and Applications on Trivium-Variant Ciphers. ISC 2018: 151-168 - [c99]Jingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang:
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. IWSEC 2018: 244-261 - [c98]Guoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin:
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. IEEE Symposium on Security and Privacy 2018: 178-194 - [c97]Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao:
A Lightweight FourQ Primitive on ARM Cortex-M0. TrustCom/BigDataSE 2018: 699-704 - [c96]Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao, Cong Chen:
A Lightweight Multi-precision Squaring on Embedded Processors for ECC. TrustCom/BigDataSE 2018: 1014-1019 - [c95]Zheng He, Shiran Pan, Dongdai Lin:
PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid. TrustCom/BigDataSE 2018: 1107-1114 - 2017
- [c94]Cong Chen, Dongdai Lin, Wei Zhang, Xiaojun Zhou:
A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs. Inscrypt 2017: 321-341 - [c93]Xiaojuan Zhang, Dongdai Lin:
Cryptanalysis of Acorn in Nonce-Reuse Setting. Inscrypt 2017: 342-361 - [c92]Yang Zhang, Renzhang Liu, Dongdai Lin:
Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme. ICISC 2017: 93-111 - [c91]Anyu Wang, Zhifang Zhang, Dongdai Lin:
Bounds and constructions for linear locally repairable codes over binary fields. ISIT 2017: 2033-2037 - [c90]Hairong Yi, Yuqing Zhu, Dongdai Lin:
Refinement of the Four-Dimensional GLV Method on Elliptic Curves. SAC 2017: 23-42 - [c89]Wei Zhang, Dongdai Lin, Hailong Zhang, Cong Chen, Xiaojun Zhou:
A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC. TrustCom/BigDataSE/ICESS 2017: 170-176 - 2016
- [c88]Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. ASIACRYPT (1) 2016: 648-678 - [c87]Wentan Yi, Baofeng Wu, Shaozhen Chen, Dongdai Lin:
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher. Inscrypt 2016: 33-46 - [c86]Cong Chen, Dongdai Lin:
Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework. Inscrypt 2016: 431-450 - [c85]Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. ICICS 2016: 107-123 - [c84]Haiyan Wang, Jianghua Zhong, Dongdai Lin:
Stability of multi-valued nonlinear feedback shift registers. ICIA 2016: 1764-1769 - [c83]Xiaojie Guo, Dongdai Lin:
Robust face image alignment using structural priors. ICME 2016: 1-6 - [c82]Anyu Wang, Zhifang Zhang, Dongdai Lin:
Two classes of (r, t)-locally repairable codes. ISIT 2016: 445-449 - [c81]Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. ISPEC 2016: 13-36 - [c80]Zejun Xiang, Wentao Zhang, Dongdai Lin:
On the Division Property of Simon48 and Simon64. IWSEC 2016: 147-163 - 2015
- [c79]Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin:
Solving Linear Equations Modulo Unknown Divisors: Revisited. ASIACRYPT (1) 2015: 189-213 - [c78]Chun Guo, Dongdai Lin:
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers. ASIACRYPT (2) 2015: 389-410 - [c77]Zhenzhen Bao, Peng Luo, Dongdai Lin:
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. ICICS 2015: 18-36 - [c76]Jun Yan, Jian Weng, Dongdai Lin, Yujuan Quan:
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract). ISAAC 2015: 555-565 - [c75]Tianze Wang, Meicheng Liu, Shangwei Zhao, Dongdai Lin:
Construction of cubic rotation symmetric bent functions in power-of-two variables. ISIT 2015: 486-490 - [c74]Baofeng Wu, Jia Zheng, Dongdai Lin:
Constructing Boolean functions with (potentially) optimal algebraic immunity based on multiplicative decompositions of finite fields. ISIT 2015: 491-495 - [c73]Meicheng Liu, Dongdai Lin, Wenhao Wang:
Searching cubes for testing Boolean functions and its application to Trivium. ISIT 2015: 496-500 - [c72]Baofeng Wu, Dongdai Lin:
On the dual of generalized Boolean bent functions over ℤ4. ISIT 2015: 506-510 - [c71]Shaoyu Du, Bin Zhang, Zhenqi Li, Dongdai Lin:
Fault Attacks on Stream Cipher Scream. ISPEC 2015: 50-64 - [c70]Chun Guo, Hailong Zhang, Dongdai Lin:
Estimating Differential-Linear Distinguishers and Applications to CTC2. ISPEC 2015: 220-234 - [c69]Shaoyu Du, Zhenqi Li, Bin Zhang, Dongdai Lin:
Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI. ISPEC 2015: 235-249 - [c68]YaWei Ren, Feng Liu, Dongdai Lin, Rongquan Feng, Wen Wang:
A New Construction of Tagged Visual Cryptography Scheme. IWDW 2015: 433-445 - [c67]Yao Lu, Liqiang Peng, Rui Zhang, Lei Hu, Dongdai Lin:
Towards Optimal Bounds for Implicit Factorization Problem. SAC 2015: 462-476 - [c66]Chun Guo, Dongdai Lin:
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation. TCC (1) 2015: 110-133 - 2014
- [c65]Yao Lu, Rui Zhang, Dongdai Lin:
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. ACNS 2014: 151-162 - [c64]Zhenzhen Bao, Wentao Zhang, Dongdai Lin:
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails. Inscrypt 2014: 259-285 - [c63]Chi Chen, Chaogang Wang, Tengfei Yang, Dongdai Lin, Song Wang, Jiankun Hu:
Optional multi-biometric cryptosystem based on fuzzy extractor. FSKD 2014: 989-994 - [c62]Jianghua Zhong, Dongdai Lin:
Stability of nonlinear feedback shift registers. ICIA 2014: 671-676 - [c61]Baofeng Wu, Qingfang Jin, Zhuojun Liu, Dongdai Lin:
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract). ISIT 2014: 1361-1365 - [c60]Meicheng Liu, Dongdai Lin:
Almost perfect algebraic immune functions with good nonlinearity. ISIT 2014: 1837-1841 - [c59]Duohe Ma, Zhen Xu, Dongdai Lin:
Defending Blind DDoS Attack on SDN Based on Moving Target Defense. SecureComm (1) 2014: 463-480 - 2013
- [c58]Yao Lu, Rui Zhang, Dongdai Lin:
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. ACISP 2013: 57-71 - [c57]Shan Chen, Kunpeng Wang, Dongdai Lin, Tao Wang:
Omega Pairing on Hyperelliptic Curves. Inscrypt 2013: 167-184 - [c56]Kai Chen, Dongdai Lin, Li Yan, Xin Sun:
Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions. Inscrypt 2013: 361-376 - [c55]Bin Zhang, Zhenqi Li, Dengguo Feng, Dongdai Lin:
Near Collision Attack on the Grain v1 Stream Cipher. FSE 2013: 518-538 - [c54]Wenhao Wang, Dongdai Lin:
Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited. ICICS 2013: 288-301 - [c53]Xiaochun Cao, Xingxing Wei, Yahong Han, Yi Yang, Dongdai Lin:
Robust Tensor Clustering with Non-Greedy Maximization. IJCAI 2013: 1254-1259 - [c52]Yao Lu, Rui Zhang, Dongdai Lin:
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. NSS 2013: 393-404 - [c51]Jing Lv, Bin Zhang, Dongdai Lin:
Some New Weaknesses in the RC4 Stream Cipher. WISA 2013: 28-38 - 2012
- [c50]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Identity-Based Extractable Hash Proofs and Their Applications. ACNS 2012: 153-170 - [c49]Meicheng Liu, Yin Zhang, Dongdai Lin:
Perfect Algebraic Immune Functions. ASIACRYPT 2012: 172-189 - [c48]Tao Shi, Vladimir Anashin, Dongdai Lin:
Fast Evaluation of T-Functions via Time-Memory Trade-Offs. Inscrypt 2012: 263-275 - [c47]Tianze Wang, Meicheng Liu, Dongdai Lin:
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks. Inscrypt 2012: 276-293 - [c46]Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin:
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack. ICICS 2012: 311-320 - [c45]Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, Dongdai Lin:
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack. ICICS 2012: 321-330 - [c44]Zhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin:
Cube Cryptanalysis of LBlock with Noisy Leakage. ICISC 2012: 141-155 - [c43]Xusheng Zhang, Dongdai Lin:
Analysis of Optimum Pairing Products at High Security Levels. INDOCRYPT 2012: 412-430 - [c42]Xusheng Zhang, Kunpeng Wang, Dongdai Lin:
On Efficient Pairings on Elliptic Curves over Extension Fields. Pairing 2012: 1-18 - [c41]Shan Chen, Kunpeng Wang, Dongdai Lin:
An Improved Twisted Ate Pairing over KSS Curves with k = 18. Pairing 2012: 35-45 - [c40]Yao Lu, Rui Zhang, Dongdai Lin:
Stronger Security Model for Public-Key Encryption with Equality Test. Pairing 2012: 65-82 - [c39]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Anonymous Identity-Based Hash Proof System and Its Applications. ProvSec 2012: 143-160 - [c38]Zhenyu Huang, Dongdai Lin:
A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery. Selected Areas in Cryptography 2012: 16-33 - [c37]Tao Shi, Vladimir Anashin, Dongdai Lin:
Linear Weaknesses in T-functions. SETA 2012: 279-290 - 2011
- [c36]Meicheng Liu, Dongdai Lin, Dingyi Pei:
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. ACISP 2011: 34-46 - [c35]Zhenyu Huang, Dongdai Lin:
Attacking Bivium and Trivium with the Characteristic Set Method. AFRICACRYPT 2011: 77-91 - [c34]Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. ASIACRYPT 2011: 390-406 - [c33]Chunfang Zhou, Xiutao Feng, Dongdai Lin:
The Initialization Stage Analysis of ZUC v1.5. CANS 2011: 40-53 - [c32]Xusheng Zhang, Shan Chen, Dongdai Lin:
Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves. Inscrypt 2011: 210-226 - [c31]Wenhao Wang, Dongdai Lin, Zhenqi Li, Tianze Wang:
Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications. ICICS 2011: 282-296 - [c30]Jing Zou, Dongdai Lin, Guo-Cui Mi:
A universal distributed model for password cracking. ICMLC 2011: 955-960 - [c29]Xusheng Zhang, Dongdai Lin:
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2. IMACC 2011: 309-326 - 2010
- [c28]Lei Xu, Dongdai Lin:
Refinement of Miller's Algorithm Over Edwards Curves. CT-RSA 2010: 106-118 - [c27]Lei Xu, Dongdai Lin:
Accelerating Inverse of GF(2n) with Precomputation. ISPEC 2010: 85-95 - [c26]Lin Xu, Dongdai Lin, Xin Li:
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. ISPEC 2010: 123-137 - 2009
- [c25]Yi Deng, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng:
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. CSR 2009: 80-91 - [c24]Guifang Huang, Dongdai Lin, Yanshuo Zhang:
Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge. ISPEC 2009: 93-101 - 2007
- [c23]Yi Deng, Dongdai Lin:
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. Inscrypt 2007: 123-137 - [c22]Sujing Zhou, Dongdai Lin:
Unlinkable Randomizable Signature and Its Application in Group Signature. Inscrypt 2007: 328-342 - [c21]Yi Deng, Dongdai Lin:
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. EUROCRYPT 2007: 148-168 - 2006
- [c20]Dayin Wang, Dongdai Lin, Wenling Wu:
An Improved Poly1305 MAC. ACNS 2006: 284-292 - [c19]Sujing Zhou, Dongdai Lin:
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. CANS 2006: 126-143 - [c18]Dayin Wang, Dongdai Lin, Wenling Wu:
OPMAC: One-Key Poly1305 MAC. Inscrypt 2006: 78-87 - [c17]Tianjie Cao, Xianping Mao, Dongdai Lin:
Security Analysis of a Server-Aided RSA Key Generation Protocol. ISPEC 2006: 314-320 - [c16]Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin:
Integrating Grid with Cryptographic Computing. ISPEC 2006: 321-331 - 2005
- [c15]Tianjie Cao, Dongdai Lin, Rui Xue:
An Efficient ID-Based Deniable Authentication Protocol from Pairings. AINA 2005: 388-391 - [c14]Tianjie Cao, Dongdai Lin, Rui Xue:
ID-Based Ring Authenticated Encryption. AINA 2005: 591-596 - [c13]Sujing Zhou, Dongdai Lin:
On Anonymity of Group Signatures. CIS (2) 2005: 131-136 - [c12]Dayin Wang, Dongdai Lin, Wenling Wu:
A Variant of Poly1305 MAC and Its Security Proof. CIS (2) 2005: 375-380 - [c11]Tianjie Cao, Dongdai Lin, Rui Xue:
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. CIS (2) 2005: 1036-1041 - [c10]Tianjie Cao, Dongdai Lin:
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. CISC 2005: 233-241 - [c9]Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng:
A Packet Marking Scheme for IP Traceback. ICN (2) 2005: 964-971 - [c8]Zhonghua Jiang, Lin Xu, Lei Lin, Dayin Wang, Dongdai Lin:
A Distributed Cryptographic Computing System. SKG 2005: 115 - 2004
- [c7]Tianjie Cao, Dongdai Lin, Rui Xue:
Security Analysis of User Efficient Blind Signatures. AWCC 2004: 167-172 - [c6]Tianjie Cao, Dongdai Lin, Rui Xue:
Improved Privacy-Protecting Proxy Signature Scheme. AWCC 2004: 208-213 - [c5]Yongwei Wu, Guangwen Yang, Weimin Zheng, Dongdai Lin:
DisCAS: A Distributed-Parallel Computer Algebra System. International Conference on Computational Science 2004: 295-302 - [c4]Jianfang Xiao, Dongdai Lin:
Survey of Security in Grid Services. ICEB 2004: 1241-1245 - 2001
- [c3]Paul S. Wang, Simon Gray, Norbert Kajler, Dongdai Lin, Weidong Liao, Xiao Zou:
IAMC architecture and prototyping: a progress report. ISSAC 2001: 337-344 - 1993
- [c2]Dongdai Lin, Zhuojun Liu:
Some Results on Theorem Proving in Geometry over Finite Fields. ISSAC 1993: 292-300 - 1988
- [c1]Dongdai Lin, Mulan Liu:
Linear Recurring m-Arrays. EUROCRYPT 1988: 351-357
Editorship
- 2022
- [e19]Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13791, Springer 2022, ISBN 978-3-031-22962-6 [contents] - [e18]Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13792, Springer 2022, ISBN 978-3-031-22965-7 [contents] - [e17]Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13793, Springer 2022, ISBN 978-3-031-22968-8 [contents] - [e16]Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV. Lecture Notes in Computer Science 13794, Springer 2022, ISBN 978-3-031-22971-8 [contents] - 2019
- [e15]Dongdai Lin, Kazue Sako:
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11442, Springer 2019, ISBN 978-3-030-17252-7 [contents] - [e14]Dongdai Lin, Kazue Sako:
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11443, Springer 2019, ISBN 978-3-030-17258-9 [contents] - 2018
- [e13]Xiaofeng Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10726, Springer 2018, ISBN 978-3-319-75159-7 [contents] - 2017
- [e12]Kefei Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10143, Springer 2017, ISBN 978-3-319-54704-6 [contents] - 2016
- [e11]Dongdai Lin, XiaoFeng Wang, Moti Yung:
Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9589, Springer 2016, ISBN 978-3-319-38897-7 [contents] - 2015
- [e10]Dongdai Lin, Moti Yung, Jianying Zhou:
Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8957, Springer 2015, ISBN 978-3-319-16744-2 [contents] - 2014
- [e9]Dongdai Lin, Shouhuai Xu, Moti Yung:
Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8567, Springer 2014, ISBN 978-3-319-12086-7 [contents] - 2012
- [e8]Chuankun Wu, Moti Yung, Dongdai Lin:
Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7537, Springer 2012, ISBN 978-3-642-34703-0 [contents] - 2011
- [e7]Dongdai Lin, Gene Tsudik, Xiaoyun Wang:
Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings. Lecture Notes in Computer Science 7092, Springer 2011, ISBN 978-3-642-25512-0 [contents] - [e6]Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing:
Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6151, Springer 2011, ISBN 978-3-642-16341-8 [contents] - [e5]Xuejia Lai, Moti Yung, Dongdai Lin:
Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6584, Springer 2011, ISBN 978-3-642-21517-9 [contents] - 2009
- [e4]Moti Yung, Peng Liu, Dongdai Lin:
Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5487, Springer 2009, ISBN 978-3-642-01439-0 [contents] - 2008
- [e3]Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu:
Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4990, Springer 2008, ISBN 978-3-540-79498-1 [contents] - 2006
- [e2]Helger Lipmaa, Moti Yung, Dongdai Lin:
Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings. Lecture Notes in Computer Science 4318, Springer 2006, ISBN 3-540-49608-4 [contents] - 2005
- [e1]Dengguo Feng, Dongdai Lin, Moti Yung:
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings. Lecture Notes in Computer Science 3822, Springer 2005, ISBN 3-540-30855-5 [contents]
Informal and Other Publications
- 2024
- [i86]Benshan Mei, Saisai Xia, Wenhao Wang, Dongdai Lin:
Cabin: Confining Untrusted Programs within Confidential VMs. CoRR abs/2407.12334 (2024) - [i85]Shuaishuai Li, Cong Zhang, Dongdai Lin:
Secure Multiparty Computation with Lazy Sharing. IACR Cryptol. ePrint Arch. 2024: 1347 (2024) - 2023
- [i84]Chun Guo, Lei Wang, Dongdai Lin:
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls. IACR Cryptol. ePrint Arch. 2023: 226 (2023) - [i83]Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin:
Efficient Private Multiset ID Protocols. IACR Cryptol. ePrint Arch. 2023: 986 (2023) - [i82]Shuaishuai Li, Cong Zhang, Dongdai Lin:
Oblivious Transfer from Rerandomizable PKE. IACR Cryptol. ePrint Arch. 2023: 1002 (2023) - [i81]Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Moving a Step of ChaCha in Syncopated Rhythm. IACR Cryptol. ePrint Arch. 2023: 1087 (2023) - [i80]Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, Yuan Hong:
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage. IACR Cryptol. ePrint Arch. 2023: 1619 (2023) - [i79]Xianghan Wang, Jianghua Zhong, Dongdai Lin:
Cycle Structure and Observability of Two Types of Galois NFSRs. IACR Cryptol. ePrint Arch. 2023: 1847 (2023) - 2022
- [i78]Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin:
Optimal Private Set Union from Multi-Query Reverse Private Membership Test. IACR Cryptol. ePrint Arch. 2022: 358 (2022) - 2021
- [i77]Minghui Yang, Shiyuan Qiang, Xiaoyan Jing, Keqin Feng, Dongdai Lin:
On the 4-Adic Complexity of Quaternary Sequences with Ideal Autocorrelation. CoRR abs/2107.03574 (2021) - [i76]Jianghua Zhong, Yingyin Pan, Wenhui Kong, Dongdai Lin:
Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium. IACR Cryptol. ePrint Arch. 2021: 928 (2021) - [i75]Yingyin Pan, Jianghua Zhong, Dongdai Lin:
On the Nonsingularity and Equivalence of NFSRs. IACR Cryptol. ePrint Arch. 2021: 1062 (2021) - [i74]Yaqi Xu, Baofeng Wu, Dongdai Lin:
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey. IACR Cryptol. ePrint Arch. 2021: 1690 (2021) - 2019
- [i73]Lan Luo, Zhi Ma, Dongdai Lin:
Two New Families of Quantum Synchronizable Codes. CoRR abs/1904.03902 (2019) - [i72]Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, Xiaofeng Wang, Haixu Tang, Kai Chen, Kristin E. Lauter, Dongdai Lin:
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. CoRR abs/1905.07766 (2019) - [i71]Xuecheng Ma, Dongdai Lin:
A Generic Construction of Revocable Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2019: 299 (2019) - [i70]Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma:
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. IACR Cryptol. ePrint Arch. 2019: 763 (2019) - [i69]Xuecheng Ma, Dongdai Lin:
Generic Constructions of RIBE via Subset Difference Method. IACR Cryptol. ePrint Arch. 2019: 1376 (2019) - 2018
- [i68]Xuecheng Ma, Xin Wang, Dongdai Lin:
Anonymous Identity-Based Encryption with Identity Recovery. CoRR abs/1806.05943 (2018) - [i67]Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin:
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. IACR Cryptol. ePrint Arch. 2018: 158 (2018) - 2017
- [i66]Anyu Wang, Zhifang Zhang, Dongdai Lin:
Bounds and Constructions for Linear Locally Repairable Codes over Binary Fields. CoRR abs/1701.05989 (2017) - [i65]Yang Zhang, Renzhang Liu, Dongdai Lin:
Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme. CoRR abs/1709.06724 (2017) - [i64]Shihui Fu, Xiutao Feng, Dongdai Lin, Qiang Wang:
A Recursive Construction of Permutation Polynomials over Fq2 with Odd Characteristic from Rédei Functions. CoRR abs/1712.07890 (2017) - [i63]Xiaojuan Zhang, Xiutao Feng, Dongdai Lin:
Fault Attack on ACORN v3. IACR Cryptol. ePrint Arch. 2017: 855 (2017) - 2016
- [i62]Ming Li, Dongdai Lin:
The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials. IACR Cryptol. ePrint Arch. 2016: 269 (2016) - [i61]Ming Li, Dongdai Lin:
Adjacency Graphs, Irreducible Polynomials and Cyclotomy. IACR Cryptol. ePrint Arch. 2016: 393 (2016) - [i60]Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin:
Improvements on the Individual Logarithm Step in exTNFS. IACR Cryptol. ePrint Arch. 2016: 727 (2016) - [i59]Chun Guo, Dongdai Lin, Meicheng Liu:
Cascade Ciphers Revisited: Indifferentiability Analysis. IACR Cryptol. ePrint Arch. 2016: 825 (2016) - [i58]Zejun Xiang, Wentao Zhang, Dongdai Lin:
On the Division Property of SIMON48 and SIMON64. IACR Cryptol. ePrint Arch. 2016: 839 (2016) - [i57]Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2016: 857 (2016) - [i56]Chun Guo, Dongdai Lin:
Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation. IACR Cryptol. ePrint Arch. 2016: 894 (2016) - [i55]Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
An Algorithm for Counting the Number of 2n-Periodic Binary Sequences with Fixed k-Error Linear Complexity. IACR Cryptol. ePrint Arch. 2016: 1025 (2016) - [i54]Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin:
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers. IACR Cryptol. ePrint Arch. 2016: 1036 (2016) - 2015
- [i53]Fei Li, Qiuyan Wang, Dongdai Lin:
A class of three-weight and five-weight linear codes. CoRR abs/1509.06242 (2015) - [i52]Qiuyan Wang, Fei Li, Dongdai Lin:
A Class of Linear Codes With Three Weights. CoRR abs/1512.03866 (2015) - [i51]Qiuyan Wang, Fei Li, Kelan Ding, Dongdai Lin:
Complete weight enumerators of two classes of linear codes. CoRR abs/1512.07341 (2015) - [i50]Haiyan Wang, Jianghua Zhong, Dongdai Lin:
Linearization of Multi-valued Nonlinear Feedback Shift Registers. IACR Cryptol. ePrint Arch. 2015: 252 (2015) - [i49]Haiyan Wang, Dongdai Lin:
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers. IACR Cryptol. ePrint Arch. 2015: 253 (2015) - [i48]Ming Li, Yupeng Jiang, Dongdai Lin:
A Group-theory Method to The Cycle Structures of Feedback Shift Registers. IACR Cryptol. ePrint Arch. 2015: 357 (2015) - [i47]Ming Li, Dongdai Lin:
De Bruijn Sequences from Nonlinear Feedback Shift Registers. IACR Cryptol. ePrint Arch. 2015: 667 (2015) - [i46]Chun Guo, Dongdai Lin:
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers. IACR Cryptol. ePrint Arch. 2015: 861 (2015) - [i45]Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 911 (2015) - [i44]Ming Li, Mingxing Wang, Dongdai Lin:
De Bruijn Sequences from Symmetric Shift Registers. IACR Cryptol. ePrint Arch. 2015: 1079 (2015) - [i43]Zhenzhen Bao, Peng Luo, Dongdai Lin:
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers. IACR Cryptol. ePrint Arch. 2015: 1118 (2015) - [i42]Zhiqiang Lin, Dingyi Pei, Dongdai Lin:
Construction of Transition Matrices for Binary FCSRs. IACR Cryptol. ePrint Arch. 2015: 1181 (2015) - 2014
- [i41]Yupeng Jiang, Dongdai Lin:
Distribution properties of compressing sequences derived from primitive sequences modulo odd prime powers. CoRR abs/1401.5874 (2014) - [i40]Baofeng Wu, Qingfang Jin, Zhuojun Liu, Dongdai Lin:
Constructing Boolean Functions With Potential Optimal Algebraic Immunity Based on Additive Decompositions of Finite Fields. CoRR abs/1401.6604 (2014) - [i39]Yupeng Jiang, Dongdai Lin:
On the distinctness of binary sequences derived from $2$-adic expansion of m-sequences over finite prime fields. CoRR abs/1402.4590 (2014) - [i38]Yao Sun, Dongdai Lin, Dingkang Wang:
An Improvement over the GVW Algorithm for Inhomogeneous Polynomial Systems. CoRR abs/1404.1428 (2014) - [i37]Zhenyu Huang, Yao Sun, Dongdai Lin:
On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method. CoRR abs/1405.4596 (2014) - [i36]Yao Sun, Dingkang Wang, Zhenyu Huang, Dongdai Lin:
A Monomial-Oriented GVW for Computing Gröbner Bases. CoRR abs/1410.0105 (2014) - [i35]Minghui Yang, Jin Li, Keqin Feng, Dongdai Lin:
Generalized Hamming Weights of Irreducible Cyclic Codes. CoRR abs/1410.2702 (2014) - [i34]Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede:
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms. IACR Cryptol. ePrint Arch. 2014: 84 (2014) - [i33]Yao Lu, Rui Zhang, Dongdai Lin:
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications. IACR Cryptol. ePrint Arch. 2014: 343 (2014) - [i32]Chengliang Tian, Wei Wei, Dongdai Lin:
Solving closest vector instances using an approximate shortest independent vectors oracle. IACR Cryptol. ePrint Arch. 2014: 545 (2014) - [i31]Ming Li, Dongdai Lin:
A Class of FSRs and Their Adjacency Graphs. IACR Cryptol. ePrint Arch. 2014: 658 (2014) - [i30]Chun Guo, Dongdai Lin:
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation. IACR Cryptol. ePrint Arch. 2014: 786 (2014) - [i29]Dongdai Lin, Yujuan Quan, Jian Weng, Jun Yan:
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof. IACR Cryptol. ePrint Arch. 2014: 791 (2014) - [i28]Zhenyu Huang, Dongdai Lin:
Solving Polynomial Systems with Noise over F2: Revisited. IACR Cryptol. ePrint Arch. 2014: 962 (2014) - 2013
- [i27]Baofeng Wu, Dongdai Lin:
New constructions of quaternary bent functions. CoRR abs/1309.0199 (2013) - [i26]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (Identity-Based) Hash Proof System and Its Applications. IACR Cryptol. ePrint Arch. 2013: 2 (2013) - [i25]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems. IACR Cryptol. ePrint Arch. 2013: 33 (2013) - [i24]Jing Lv, Bin Zhang, Dongdai Lin:
Distinguishing Attacks on RC4 and A New Improvement of the Cipher. IACR Cryptol. ePrint Arch. 2013: 176 (2013) - [i23]Jing Lv, Dongdai Lin:
L-P States of RC4 Stream Cipher. IACR Cryptol. ePrint Arch. 2013: 266 (2013) - 2012
- [i22]Yin Zhang, Meicheng Liu, Dongdai Lin:
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks. IACR Cryptol. ePrint Arch. 2012: 111 (2012) - [i21]Meicheng Liu, Yin Zhang, Dongdai Lin:
Perfect Algebraic Immune Functions. IACR Cryptol. ePrint Arch. 2012: 212 (2012) - [i20]Xusheng Zhang, Kunpeng Wang, Dongdai Lin:
On Efficient Pairings on Elliptic Curves over Extension Fields. IACR Cryptol. ePrint Arch. 2012: 247 (2012) - [i19]Meicheng Liu, Yin Zhang, Dongdai Lin:
On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation. IACR Cryptol. ePrint Arch. 2012: 498 (2012) - [i18]Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin:
Integrated PKE and PEKS - Stronger Security Notions and New Constructions. IACR Cryptol. ePrint Arch. 2012: 692 (2012) - 2011
- [i17]Tao Shi, Vladimir Anashin, Dongdai Lin:
Linear Relation on General Ergodic T-Function. CoRR abs/1111.4635 (2011) - [i16]Dongdai Lin, Jean-Charles Faugère, Ludovic Perret, Tianze Wang:
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC. IACR Cryptol. ePrint Arch. 2011: 55 (2011) - [i15]Dongdai Lin, Tao Shi, Zifeng Yang:
Ergodic Theory Over F2[[T]]. IACR Cryptol. ePrint Arch. 2011: 130 (2011) - [i14]Lei Xu, Dongdai Lin, Jing Zou:
ECDLP on GPU. IACR Cryptol. ePrint Arch. 2011: 146 (2011) - [i13]Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge. IACR Cryptol. ePrint Arch. 2011: 408 (2011) - 2009
- [i12]Meicheng Liu, Dongdai Lin:
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. CoRR abs/0910.4632 (2009) - 2007
- [i11]Sujing Zhou, Dongdai Lin:
An Interesting Member ID-based Group Signature. IACR Cryptol. ePrint Arch. 2007: 126 (2007) - [i10]Sujing Zhou, Dongdai Lin:
Unlinkable Randomizable Signature and Its Application in Group Signature. IACR Cryptol. ePrint Arch. 2007: 213 (2007) - 2006
- [i9]Yi Deng, Dongdai Lin:
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption. CoRR abs/cs/0607035 (2006) - [i8]Yi Deng, Giovanni Di Crescenzo, Dongdai Lin:
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model. CoRR abs/cs/0609057 (2006) - [i7]Sujing Zhou, Dongdai Lin:
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability. IACR Cryptol. ePrint Arch. 2006: 100 (2006) - [i6]Yi Deng, Dongdai Lin:
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption. IACR Cryptol. ePrint Arch. 2006: 239 (2006) - [i5]Sujing Zhou, Dongdai Lin:
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps. IACR Cryptol. ePrint Arch. 2006: 286 (2006) - [i4]Yi Deng, Giovanni Di Crescenzo, Dongdai Lin:
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model. IACR Cryptol. ePrint Arch. 2006: 314 (2006) - 2005
- [i3]Sujing Zhou, Dongdai Lin:
Analyzing Unlinkability of Some Group Signatures. IACR Cryptol. ePrint Arch. 2005: 178 (2005) - [i2]Sujing Zhou, Dongdai Lin:
On Anonymity of Group Signatures. IACR Cryptol. ePrint Arch. 2005: 422 (2005) - 2004
- [i1]Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. IACR Cryptol. ePrint Arch. 2004: 337 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint