Dengguo Feng

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
New methods for bounding the length of impossible differentials of SPN block ciphers
IEEE Transactions on Information Theory
2025-01-23Paper
NEV: faster and smaller NTRU encryption using vector decoding
 
2024-08-30Paper
Fast blind rotation for bootstrapping FHEs
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
New method for combining Matsui's bounding conditions with sequential encoding method
Designs, Codes and Cryptography
2023-11-07Paper
Security model and modular design of fair authentication key exchange protocols
Science China Information Sciences
2022-10-28Paper
A property-based attestation protocol for TCM
Science China Information Sciences
2022-10-28Paper
On constant-round zero-knowledge proofs of knowledge for NP-relations
Science China Information Sciences
2022-10-28Paper
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V
Designs, Codes and Cryptography
2022-09-22Paper
FAN: a lightweight authenticated cryptographic algorithm
 
2021-12-20Paper
Formal analysis of a TTP-free blacklistable anonymous credentials system
Information and Communications Security
2020-07-20Paper
Practical cryptanalysis of Bluetooth encryption with condition masking
Journal of Cryptology
2018-05-28Paper
Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme
 
2018-04-20Paper
New Results on Periodic Sequences With Large $k$-Error Linear Complexity
IEEE Transactions on Information Theory
2017-08-08Paper
The Weight Enumerator of a Class of Cyclic Codes
IEEE Transactions on Information Theory
2017-07-27Paper
Improved fault analysis on the block cipher SPECK by injecting faults in the same round
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
Boolean functions and their applications in cryptography
Advances in Computer Science and Technology
2016-12-02Paper
Design and formal analysis of TCM key migration protocols
 
2016-08-10Paper
Autocorrelation values of new generalized cyclotomic sequences of order six over \(\mathbb Z_{pq}\)
Information Security and Cryptology
2015-12-02Paper
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP
Science China Information Sciences
2015-11-20Paper
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
Lecture Notes in Computer Science
2015-11-03Paper
Near collision attack on the Grain v1 stream cipher
Fast Software Encryption
2015-09-18Paper
A clustering approach for privacy-preserving in social networks
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Linear cryptanalysis of FASER128/256 and TriviA-ck
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function
Cryptography and Communications
2014-10-08Paper
ExBLACR: extending BLACR system
Information Security and Privacy
2014-07-24Paper
On the nonexistence of nontrivial small cycles of the \(\mu\) function in \(3x+1\) conjecture
Journal of Systems Science and Complexity
2014-01-27Paper
Cube attack on grain
Journal of Software
2013-11-19Paper
Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Round-optimal zero-knowledge proofs of knowledge for NP
Science China Information Sciences
2013-08-20Paper
Improved multi-pass fast correlation attacks with applications
Science China Information Sciences
2013-07-03Paper
Cryptanalysis of helix and phelix revisited
Information Security and Privacy
2013-06-28Paper
Improved key recovery attacks on reduced-round Salsa20 and ChaCha
Lecture Notes in Computer Science
2013-06-04Paper
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
(Pseudo) preimage attack on round-reduced Grøstl hash function and others
Fast Software Encryption
2013-01-08Paper
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion
Information Security and Cryptology
2013-01-07Paper
On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3
Information Security and Cryptology
2013-01-07Paper
Combined public-key schemes: the case of ABE and ABS
Provable Security
2012-11-06Paper
Fully secure doubly-spatial encryption under simple assumptions
Provable Security
2012-11-06Paper
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers
Applied Cryptography and Network Security
2012-09-10Paper
Black-box testing based on colorful taint analysis
Science China Information Sciences
2012-08-17Paper
Comments on the SM2 key exchange protocol
Cryptology and Network Security
2012-07-20Paper
Resettable cryptography in constant rounds -- the case of zero knowledge
Lecture Notes in Computer Science
2011-12-02Paper
On guess and determine analysis of Rabbit
International Journal of Foundations of Computer Science
2011-10-10Paper
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
Provable Security
2011-09-16Paper
Hyper-Sbox view of AES-like permutations: a generalized distinguisher
Information Security and Cryptology
2011-07-29Paper
Loiss: A Byte-Oriented Stream Cipher
Lecture Notes in Computer Science
2011-06-08Paper
How to characterize side-channel leakages more accurately?
Information Security Practice and Experience
2011-05-19Paper
A byte-based guess and determine attack on SOSEMANUK
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network
Information Security and Cryptology
2010-11-23Paper
Some results on cryptanalysis of SMS4 block cipher
International Journal of Applied Cryptography
2010-09-22Paper
Cryptanalysis of the LANE hash function
Selected Areas in Cryptography
2009-12-09Paper
An Improved Fast Correlation Attack on Stream Ciphers
Selected Areas in Cryptography
2009-11-03Paper
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model
Computer Science - Theory and Applications
2009-08-18Paper
A New Client-to-Client Password-Authenticated Key Agreement Protocol
Lecture Notes in Computer Science
2009-07-23Paper
Security of Truncated MACs
Information Security and Cryptology
2009-04-29Paper
Correlation functions of multioutput \(m\)-valued logical functions and relation between correlation functions and spectra
 
2009-03-06Paper
Spectral characteristics of the best affine approach of multi-output m-valued logical functions
Wuhan University Journal of Natural Sciences
2009-03-06Paper
Fuzzy decision tree based inference techniques for network forensic analysis
 
2009-03-06Paper
Global timestamp serialization in multi-level multi-version DBMS
 
2009-03-06Paper
scientific article; zbMATH DE number 5525620 (Why is no real title available?)
 
2009-03-06Paper
On the $2$-Adic Complexity and the $k$-Error $2$-Adic Complexity of Periodic Binary Sequences
IEEE Transactions on Information Theory
2009-02-24Paper
On Quadratic Bent Functions in Polynomial Forms
IEEE Transactions on Information Theory
2008-12-21Paper
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields
IEEE Transactions on Information Theory
2008-12-21Paper
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/
IEEE Transactions on Information Theory
2008-12-21Paper
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences
Sequences and Their Applications – SETA 2006
2008-11-27Paper
On the Unprovable Security of 2-Key XCBC
Information Security and Privacy
2008-07-08Paper
Cryptanalysis of the Hash Functions MD4 and RIPEMD
Lecture Notes in Computer Science
2008-05-06Paper
New Results on Impossible Differential Cryptanalysis of Reduced AES
Lecture Notes in Computer Science
2008-05-06Paper
New Guess-and-Determine Attack on the Self-Shrinking Generator
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Related-Key Differential-Linear Attacks on Reduced AES-192
Lecture Notes in Computer Science
2008-04-11Paper
Short Threshold Signature Schemes Without Random Oracles
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences
Sequences and Their Applications - SETA 2004
2008-03-14Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Multi-pass Fast Correlation Attack on Stream Ciphers
Selected Areas in Cryptography
2007-11-29Paper
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
Selected Areas in Cryptography
2007-11-29Paper
Survey of information security
Science in China. Series F
2007-10-12Paper
Modular approach to the design and analysis of password-based security protocols
Science in China. Series F
2007-10-12Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation
Science in China. Series F
2007-08-31Paper
Spectral characteristics of multi-output \(m\)-valued logical functions
 
2007-05-11Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Theory and Applications of Models of Computation
Lecture Notes in Computer Science
2007-04-30Paper
An attack on hash function HAVAL-128
Science in China. Series F
2007-02-20Paper
Linear cryptanalysis of NUSH block cipher
Science in China. Series F
2007-02-20Paper
Cryptanalysis of AW digital signature scheme based on error-correcting codes
Science in China. Series F
2007-02-20Paper
Collision attack on reduced-round Camellia
Science in China. Series F
2007-02-20Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Security analysis of a new stream cipher
Science in China. Series F
2006-10-11Paper
An Arbitrated Quantum Message Signature Scheme
Computational and Information Science
2006-10-10Paper
Pairwise key agreement protocols based on the Weil pairing
 
2006-10-10Paper
Analysis and improvement of a security-provable mutually authenticated key agreement
 
2006-10-10Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Quantum secure direct communication using quantum Calderbank-Shor-Steane error correcting codes
 
2006-07-12Paper
Ownership proofs of digital works based on secure multiparty computation
 
2006-05-19Paper
Cryptanalysis of the TAE mode and its improvement
 
2006-05-19Paper
scientific article; zbMATH DE number 2247715 (Why is no real title available?)
 
2006-01-16Paper
scientific article; zbMATH DE number 2247718 (Why is no real title available?)
 
2006-01-16Paper
scientific article; zbMATH DE number 2247712 (Why is no real title available?)
 
2006-01-16Paper
scientific article; zbMATH DE number 2243635 (Why is no real title available?)
 
2006-01-05Paper
scientific article; zbMATH DE number 2242701 (Why is no real title available?)
 
2006-01-03Paper
scientific article; zbMATH DE number 2242707 (Why is no real title available?)
 
2006-01-03Paper
scientific article; zbMATH DE number 2242698 (Why is no real title available?)
 
2006-01-03Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Cryptanalysis of some signature schemes with message recovery
Applied Mathematics and Computation
2005-11-14Paper
scientific article; zbMATH DE number 2222203 (Why is no real title available?)
 
2005-11-02Paper
scientific article; zbMATH DE number 2222197 (Why is no real title available?)
 
2005-11-02Paper
scientific article; zbMATH DE number 2222190 (Why is no real title available?)
 
2005-11-02Paper
scientific article; zbMATH DE number 2217663 (Why is no real title available?)
 
2005-10-26Paper
scientific article; zbMATH DE number 2204038 (Why is no real title available?)
 
2005-09-09Paper
scientific article; zbMATH DE number 2202209 (Why is no real title available?)
 
2005-09-05Paper
scientific article; zbMATH DE number 2202215 (Why is no real title available?)
 
2005-09-05Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2166730 (Why is no real title available?)
 
2005-05-09Paper
On Lin-Bose problem
Linear Algebra and its Applications
2004-11-18Paper
scientific article; zbMATH DE number 2112427 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2112354 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2112409 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2075857 (Why is no real title available?)
 
2004-06-18Paper
scientific article; zbMATH DE number 2070573 (Why is no real title available?)
 
2004-06-08Paper
scientific article; zbMATH DE number 2042806 (Why is no real title available?)
 
2004-02-15Paper
scientific article; zbMATH DE number 2042808 (Why is no real title available?)
 
2004-02-15Paper
Study on strand space model theory
Journal of Computer Science and Technology
2003-11-06Paper
Three characterizations of correlation-immune functions over the rings \(Z_N\)
Theoretical Computer Science
2000-08-23Paper
Maximum correlation analysis of nonlinear combining functions
Science in China. Series E
1998-08-20Paper
Judging of the orthogonal system over rings \(\mathbb{Z}_ N\)
Chinese Science Bulletin
1998-06-11Paper
A sufficient and necessary condition of judging the independence of Boolean functions system
Chinese Science Bulletin
1996-09-16Paper
Spectral representation of correspondence of multi-valued logical functions
Chinese Science Bulletin
1995-11-28Paper


Research outcomes over time


This page was built for person: Dengguo Feng