Dong-Dai Lin

From MaRDI portal
Revision as of 19:42, 9 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Dong-Dai Lin to Dong-Dai Lin: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:1568232

Available identifiers

zbMath Open lin.dongdaiMaRDI QIDQ1568232

List of research outcomes





PublicationDate of PublicationType
Generalized cycle joining method and its application to the construction of long-period Galois NFSRs2024-12-11Paper
A three-stage MITM attack on LowMC from a single plaintext-ciphertext pair2024-10-16Paper
On prefer-one sequences2024-10-14Paper
Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers2024-08-29Paper
Proofs of conjectures on extremal weight de Bruijn sequences2024-07-18Paper
The equivalence between Galois and Fibonacci NFSRs2024-06-04Paper
A multi-group signature scheme from lattices2024-04-19Paper
Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences2024-03-14Paper
Cube Cryptanalysis of Round-Reduced ACORN2024-03-14Paper
Moving a step of ChaCha in syncopated rhythm2024-02-02Paper
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls2023-12-08Paper
Amortizing division and exponentiation2023-08-21Paper
Generalized boomerang connectivity table and improved cryptanalysis of GIFT2023-08-21Paper
Cryptanalysis of Ciminion2023-08-21Paper
Higher-order masking scheme for Trivium hardware implementation2023-08-21Paper
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP2023-06-30Paper
Conditional Cube Searching and Applications on Trivium-Variant Ciphers2023-06-30Paper
Properties of the cycles that contain all vectors of weight \(\le k\)2023-01-18Paper
Two new families of quantum synchronizable codes2022-12-23Paper
A two-round honest-verifier zero-knowledge protocol2022-10-28Paper
Bayesian mechanism for rational secret sharing scheme2022-10-28Paper
Generic Constructions of Revocable Identity-Based Encryption2022-10-14Paper
Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT2022-07-01Paper
Isomorphism and equivalence of Galois nonlinear feedback shift registers2022-07-01Paper
Binary sequences derived from monomial permutation polynomials over \(\mathrm{GF}(2^p)\)2022-07-01Paper
Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey2022-06-08Paper
Differential-linear cryptanalysis from an algebraic perspective2022-04-22Paper
Determining deep hole trees of generalized Reed-Solomon codes and an application2022-03-21Paper
The Adjacency Graphs of FSRs With Affine Characteristic Functions2022-02-17Paper
Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees2022-02-17Paper
On the \(k\)-error linear complexities of De Bruijn sequences2021-12-08Paper
On Galois NFSRs equivalent to Fibonacci ones2021-12-08Paper
Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems2021-11-11Paper
Analyzing Boolean functions via solving parametric polynomial systems2021-04-08Paper
Hierarchical group signatures with verifier-local revocation2021-01-18Paper
On the efficiency of solving Boolean polynomial systems with the characteristic set method2020-11-13Paper
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks2020-07-16Paper
Longest subsequences shared by two de Bruijn sequences2020-07-15Paper
A new upper bound on the order of affine sub-families of NFSRs2020-05-13Paper
Refined analysis to the extended tower number field sieve2020-03-12Paper
Composition of Boolean functions: an application to the secondary constructions of bent functions2020-01-22Paper
Distribution properties of binary sequences derived from primitive sequences modulo square-free odd integers2019-10-31Paper
A note on rotation symmetric S-boxes2019-10-22Paper
Faster scalar multiplication on the \(x\)-line: three-dimensional GLV method with three-dimensional differential addition chains2019-10-14Paper
A new construction of zero-difference balanced functions and two applications2019-09-12Paper
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach2019-07-19Paper
Further results on complete permutation monomials over finite fields2019-06-18Paper
A recursive construction of permutation polynomials over \(\mathbb F_{q^2}\) with odd characteristic related to Rédei functions2019-06-06Paper
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity2019-05-17Paper
Multi-identity IBFHE and multi-attribute ABFHE in the standard model2019-03-29Paper
Speeding up the GVW algorithm via a substituting method2019-03-06Paper
The distribution of \(2^n\)-periodic binary sequences with fixed \(k\)-error linear complexity2018-12-07Paper
Fault attacks on stream cipher Scream2018-12-07Paper
Estimating differential-linear distinguishers and applications to CTC22018-12-07Paper
Combined cache timing attacks and template attacks on stream cipher MUGI2018-12-07Paper
The linear complexity and 2-error linear complexity distribution of \(2^n\)-periodic binary sequences with fixed Hamming weight2018-10-26Paper
On the division property of \textsc{Simon}48 and \textsc{Simon}642018-10-24Paper
Symbolic-like computation and conditional differential cryptanalysis of QUARK2018-10-24Paper
Anonymous identity-based encryption with identity recovery2018-09-26Paper
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure2018-09-19Paper
Lower and Upper Bounds on the Density of Irreducible NFSRs2018-09-14Paper
https://portal.mardi4nfdi.de/entity/Q45708612018-07-09Paper
Correlation cube attacks: from weak-key distinguisher to key recovery2018-07-09Paper
Improved key generation algorithm for Gentry's fully homomorphic encryption scheme2018-06-15Paper
Refinement of the four-dimensional GLV method on elliptic curves2018-04-26Paper
A game-based framework towards cyber-attacks on state estimation in ICSS2018-04-20Paper
Cryptanalysis of Acorn in nonce-reuse setting2018-04-20Paper
A class of three-weight and five-weight linear codes2018-04-10Paper
Complete weight enumerators of a class of three-weight linear codes2017-11-10Paper
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions2017-07-12Paper
The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials2017-06-08Paper
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers2017-05-16Paper
Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited2017-05-11Paper
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher2017-05-05Paper
Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework2017-05-05Paper
Generalized Hamming Weights of Irreducible Cyclic Codes2017-04-28Paper
Complete weight enumerators of two classes of linear codes2017-04-03Paper
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications2017-03-27Paper
On affine sub-families of Grain-like structures2017-02-17Paper
The adjacency graphs of some feedback shift registers2017-02-17Paper
A kind of three-weight linear codes2017-02-09Paper
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers2017-02-01Paper
Complete weight enumerators of two classes of linear codes2016-12-22Paper
On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra2016-10-20Paper
Classifying and generating exact coset representatives of \(\operatorname{PGL}_2(\mathbb{F}_q)\) in \(\operatorname{PGL}_2(\mathbb{F}_{q^2})\)2016-10-10Paper
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour2016-08-31Paper
An improvement over the GVW algorithm for inhomogeneous polynomial systems2016-07-29Paper
Generalized cyclotomic numbers of order two and their applications2016-07-01Paper
Solving Linear Equations Modulo Unknown Divisors: Revisited2016-06-10Paper
Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers2016-06-03Paper
Towards Optimal Bounds for Implicit Factorization Problem2016-05-19Paper
Further results on the nonlinearity of maximum-length NFSR feedbacks2016-04-11Paper
Linear complexity of Ding-Helleseth sequences of order 2 over \(\mathrm{GF}(l)\)2016-04-11Paper
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers2016-03-23Paper
Generic constructions of integrated PKE and PEKS2016-02-19Paper
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)2016-01-11Paper
A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery2015-12-04Paper
Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions2015-12-02Paper
Omega Pairing on Hyperelliptic Curves2015-12-02Paper
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails2015-11-25Paper
Improved domain extender for the ideal cipher2015-11-19Paper
Near Collision Attack on the Grain v1 Stream Cipher2015-09-18Paper
Linear complexity of binary generalized cyclotomic sequences over \(\mathrm{GF}(q)\)2015-08-24Paper
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation2015-07-06Paper
On constructing complete permutation polynomials over finite fields of even characteristic2015-04-28Paper
A new linearization method for nonlinear feedback shift registers2015-02-20Paper
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks2014-09-12Paper
Analysis of Optimum Pairing Products at High Security Levels2014-08-20Paper
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents2014-07-07Paper
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme2014-03-05Paper
Complete permutation polynomials induced from complete permutations of subfields2013-12-19Paper
A method for counting the number of polynomial equivalence classes2013-09-04Paper
New constructions of quaternary bent functions2013-09-01Paper
On enumeration of polynomial equivalence classes2013-08-05Paper
Improved bounds for the implicit factorization problem2013-07-31Paper
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits2013-06-28Paper
Fast Evaluation of T-Functions via Time-Memory Trade-Offs2013-05-28Paper
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks2013-05-28Paper
On Efficient Pairings on Elliptic Curves over Extension Fields2013-04-04Paper
An Improved Twisted Ate Pairing over KSS Curves with k = 182013-04-04Paper
Stronger Security Model for Public-Key Encryption with Equality Test2013-04-04Paper
Perfect Algebraic Immune Functions2013-03-19Paper
Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves2013-01-07Paper
Vladimir Sergeevich Anashin2012-11-13Paper
Anonymous Identity-Based Hash Proof System and Its Applications2012-11-06Paper
Identity-Based Extractable Hash Proofs and Their Applications2012-09-10Paper
Linear Weaknesses in T-functions2012-09-07Paper
The Initialization Stage Analysis of ZUC v1.52012-07-20Paper
Ergodic theory over \(\mathbb F_2 T\)2012-05-07Paper
On enumeration of polynomial equivalence classes and their application to MPKC2012-03-22Paper
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 22011-12-16Paper
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge2011-12-02Paper
ON THE NONEXISTENCE of BENT FUNCTIONS2011-10-10Paper
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks2011-07-07Paper
Attacking Bivium and Trivium with the Characteristic Set Method2011-06-29Paper
On designated-weight Boolean functions with highest algebraic immunity2011-02-25Paper
https://portal.mardi4nfdi.de/entity/Q30623762011-01-03Paper
Refinement of Miller’s Algorithm Over Edwards Curves2010-03-16Paper
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model2009-08-18Paper
https://portal.mardi4nfdi.de/entity/Q36109262009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110022009-03-06Paper
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption2009-02-10Paper
Unlinkable Randomizable Signature and Its Application in Group Signature2009-02-10Paper
OPMAC: One-Key Poly1305 MAC2009-01-15Paper
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps2009-01-09Paper
Novel \(\Omega\)-protocols for NP2008-03-31Paper
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability2007-11-29Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation2007-08-31Paper
Applied Cryptography and Network Security2007-05-02Paper
The internet accessible mathematical computation framework2007-02-20Paper
https://portal.mardi4nfdi.de/entity/Q34116522006-12-11Paper
Information Security and Cryptology2006-11-14Paper
https://portal.mardi4nfdi.de/entity/Q33656912006-01-23Paper
Computational Science - ICCS 20042005-12-23Paper
https://portal.mardi4nfdi.de/entity/Q46756282005-05-06Paper
https://portal.mardi4nfdi.de/entity/Q47904832003-06-01Paper
https://portal.mardi4nfdi.de/entity/Q45507922003-02-10Paper
https://portal.mardi4nfdi.de/entity/Q47904742003-01-28Paper
https://portal.mardi4nfdi.de/entity/Q27259512002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q27474002002-07-28Paper
A class of generalized cyclic codes2002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q47055481999-12-20Paper
https://portal.mardi4nfdi.de/entity/Q47055991999-12-20Paper
https://portal.mardi4nfdi.de/entity/Q42342101999-03-16Paper
Well-behaved basis and LR arrays1996-07-08Paper
Structure and properties of linear recurring m-arrays1994-10-03Paper
https://portal.mardi4nfdi.de/entity/Q42790231994-09-26Paper
The equivalence classes of LR arrays1994-01-27Paper
https://portal.mardi4nfdi.de/entity/Q52888861993-09-02Paper
https://portal.mardi4nfdi.de/entity/Q40255751993-02-18Paper
Linear Recurring m-Arrays1988-01-01Paper

Research outcomes over time

This page was built for person: Dong-Dai Lin