Dongdai Lin

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Generalized cycle joining method and its application to the construction of long-period Galois NFSRs
Designs, Codes and Cryptography
2024-12-11Paper
A three-stage MITM attack on LowMC from a single plaintext-ciphertext pair
 
2024-10-16Paper
On prefer-one sequences
Designs, Codes and Cryptography
2024-10-14Paper
Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers
Journal of Systems Science and Complexity
2024-08-29Paper
Proofs of conjectures on extremal weight de Bruijn sequences
IEEE Transactions on Information Theory
2024-07-18Paper
The equivalence between Galois and Fibonacci NFSRs
Theoretical Computer Science
2024-06-04Paper
A multi-group signature scheme from lattices
 
2024-04-19Paper
Cube Cryptanalysis of Round-Reduced ACORN
 
2024-03-14Paper
Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences
IEEE Transactions on Information Theory
2024-03-14Paper
Moving a step of ChaCha in syncopated rhythm
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Higher-order masking scheme for Trivium hardware implementation
Information Security and Cryptology
2023-08-21Paper
Amortizing division and exponentiation
Information Security and Cryptology
2023-08-21Paper
Generalized boomerang connectivity table and improved cryptanalysis of GIFT
Information Security and Cryptology
2023-08-21Paper
Cryptanalysis of Ciminion
Information Security and Cryptology
2023-08-21Paper
Conditional Cube Searching and Applications on Trivium-Variant Ciphers
Developments in Language Theory
2023-06-30Paper
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP
Developments in Language Theory
2023-06-30Paper
Properties of the cycles that contain all vectors of weight \(\le k\)
Designs, Codes and Cryptography
2023-01-18Paper
Two new families of quantum synchronizable codes
Quantum Information Processing
2022-12-23Paper
Bayesian mechanism for rational secret sharing scheme
Science China Information Sciences
2022-10-28Paper
A two-round honest-verifier zero-knowledge protocol
Science China Information Sciences
2022-10-28Paper
Generic constructions of revocable identity-based encryption
Information Security and Cryptology
2022-10-14Paper
Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT
 
2022-07-01Paper
Isomorphism and equivalence of Galois nonlinear feedback shift registers
 
2022-07-01Paper
Binary sequences derived from monomial permutation polynomials over \(\mathrm{GF}(2^p)\)
 
2022-07-01Paper
Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
 
2022-06-08Paper
Differential-linear cryptanalysis from an algebraic perspective
 
2022-04-22Paper
Determining deep hole trees of generalized Reed-Solomon codes and an application
SCIENTIA SINICA Mathematica
2022-03-21Paper
The Adjacency Graphs of FSRs With Affine Characteristic Functions
IEEE Transactions on Information Theory
2022-02-17Paper
Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees
IEEE Transactions on Information Theory
2022-02-17Paper
On the \(k\)-error linear complexities of De Bruijn sequences
 
2021-12-08Paper
On Galois NFSRs equivalent to Fibonacci ones
 
2021-12-08Paper
Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems
Applied Mathematics and Computation
2021-11-11Paper
Analyzing Boolean functions via solving parametric polynomial systems
Journal of Systems Science and Complexity
2021-04-08Paper
Hierarchical group signatures with verifier-local revocation
 
2021-01-18Paper
On the efficiency of solving Boolean polynomial systems with the characteristic set method
Journal of Symbolic Computation
2020-11-13Paper
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks
Information Sciences
2020-07-16Paper
Longest subsequences shared by two de Bruijn sequences
Designs, Codes and Cryptography
2020-07-15Paper
A new upper bound on the order of affine sub-families of NFSRs
Journal of Systems Science and Complexity
2020-05-13Paper
Refined analysis to the extended tower number field sieve
Theoretical Computer Science
2020-03-12Paper
Composition of Boolean functions: an application to the secondary constructions of bent functions
Discrete Mathematics
2020-01-22Paper
Distribution properties of binary sequences derived from primitive sequences modulo square-free odd integers
 
2019-10-31Paper
A note on rotation symmetric S-boxes
Journal of Systems Science and Complexity
2019-10-22Paper
Faster scalar multiplication on the \(x\)-line: three-dimensional GLV method with three-dimensional differential addition chains
 
2019-10-14Paper
A new construction of zero-difference balanced functions and two applications
Designs, Codes and Cryptography
2019-09-12Paper
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach
IEEE Transactions on Information Theory
2019-07-19Paper
Further results on complete permutation monomials over finite fields
Finite Fields and their Applications
2019-06-18Paper
A recursive construction of permutation polynomials over \(\mathbb F_{q^2}\) with odd characteristic related to Rédei functions
Designs, Codes and Cryptography
2019-06-06Paper
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity
Designs, Codes and Cryptography
2019-05-17Paper
Multi-identity IBFHE and multi-attribute ABFHE in the standard model
 
2019-03-29Paper
Speeding up the GVW algorithm via a substituting method
Journal of Systems Science and Complexity
2019-03-06Paper
The distribution of \(2^n\)-periodic binary sequences with fixed \(k\)-error linear complexity
 
2018-12-07Paper
Fault attacks on stream cipher Scream
 
2018-12-07Paper
Estimating differential-linear distinguishers and applications to CTC2
 
2018-12-07Paper
Combined cache timing attacks and template attacks on stream cipher MUGI
 
2018-12-07Paper
The linear complexity and 2-error linear complexity distribution of \(2^n\)-periodic binary sequences with fixed Hamming weight
 
2018-10-26Paper
On the division property of \textsc{Simon}48 and \textsc{Simon}64
 
2018-10-24Paper
Symbolic-like computation and conditional differential cryptanalysis of QUARK
 
2018-10-24Paper
Anonymous identity-based encryption with identity recovery
 
2018-09-26Paper
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure
IEEE Transactions on Information Theory
2018-09-19Paper
Lower and Upper Bounds on the Density of Irreducible NFSRs
IEEE Transactions on Information Theory
2018-09-14Paper
scientific article; zbMATH DE number 6900646 (Why is no real title available?)
 
2018-07-09Paper
Correlation cube attacks: from weak-key distinguisher to key recovery
 
2018-07-09Paper
Improved key generation algorithm for Gentry's fully homomorphic encryption scheme
 
2018-06-15Paper
Refinement of the four-dimensional GLV method on elliptic curves
 
2018-04-26Paper
A game-based framework towards cyber-attacks on state estimation in ICSS
 
2018-04-20Paper
Cryptanalysis of Acorn in nonce-reuse setting
 
2018-04-20Paper
A class of three-weight and five-weight linear codes
Discrete Applied Mathematics
2018-04-10Paper
Complete weight enumerators of a class of three-weight linear codes
Journal of Applied Mathematics and Computing
2017-11-10Paper
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
IEEE Transactions on Information Theory
2017-07-12Paper
The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials
IEEE Transactions on Information Theory
2017-06-08Paper
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers
IEEE Transactions on Information Theory
2017-05-16Paper
Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited
Theoretical Computer Science
2017-05-11Paper
Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher
Information Security and Cryptology
2017-05-05Paper
Cyber-attacks on remote state estimation in industrial control system: a game-based framework
Information Security and Cryptology
2017-05-05Paper
Generalized Hamming Weights of Irreducible Cyclic Codes
IEEE Transactions on Information Theory
2017-04-28Paper
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications
Cryptography and Communications
2017-03-27Paper
On affine sub-families of Grain-like structures
Designs, Codes and Cryptography
2017-02-17Paper
The adjacency graphs of some feedback shift registers
Designs, Codes and Cryptography
2017-02-17Paper
A kind of three-weight linear codes
Cryptography and Communications
2017-02-09Paper
Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Complete weight enumerators of two classes of linear codes
Discrete Mathematics
2016-12-22Paper
On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra
Journal of Systems Science and Complexity
2016-10-20Paper
Classifying and generating exact coset representatives of \(\operatorname{PGL}_2(\mathbb{F}_q)\) in \(\operatorname{PGL}_2(\mathbb{F}_{q^2})\)
Finite Fields and their Applications
2016-10-10Paper
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
Designs, Codes and Cryptography
2016-08-31Paper
An improvement over the GVW algorithm for inhomogeneous polynomial systems
Finite Fields and their Applications
2016-07-29Paper
Generalized cyclotomic numbers of order two and their applications
Cryptography and Communications
2016-07-01Paper
Solving linear equations modulo unknown divisors: revisited
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers
Journal of Complexity
2016-06-03Paper
Towards optimal bounds for implicit factorization problem
Lecture Notes in Computer Science
2016-05-19Paper
Further results on the nonlinearity of maximum-length NFSR feedbacks
Cryptography and Communications
2016-04-11Paper
Linear complexity of Ding-Helleseth sequences of order 2 over \(\mathrm{GF}(l)\)
Cryptography and Communications
2016-04-11Paper
A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Generic constructions of integrated PKE and PEKS
Designs, Codes and Cryptography
2016-02-19Paper
Quantum bit commitment with application in quantum zero-knowledge proof (extended abstract)
Algorithms and Computation
2016-01-11Paper
A new method for solving polynomial systems with noise over \(\mathbb{F}_2\) and its applications in cold boot key recovery
Selected Areas in Cryptography
2015-12-04Paper
Environment-bound SAML assertions: a fresh approach to enhance the security of SAML assertions
Information Security and Cryptology
2015-12-02Paper
Omega pairing on hyperelliptic curves
Information Security and Cryptology
2015-12-02Paper
Speeding up the search algorithm for the best differential and best linear trails
Information Security and Cryptology
2015-11-25Paper
Improved domain extender for the ideal cipher
Cryptography and Communications
2015-11-19Paper
Near collision attack on the Grain v1 stream cipher
Fast Software Encryption
2015-09-18Paper
Linear complexity of binary generalized cyclotomic sequences over \(\mathrm{GF}(q)\)
Journal of Complexity
2015-08-24Paper
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Theory of Cryptography
2015-07-06Paper
On constructing complete permutation polynomials over finite fields of even characteristic
Discrete Applied Mathematics
2015-04-28Paper
A new linearization method for nonlinear feedback shift registers
Journal of Computer and System Sciences
2015-02-20Paper
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks
Discrete Applied Mathematics
2014-09-12Paper
Analysis of optimum pairing products at high security levels
Lecture Notes in Computer Science
2014-08-20Paper
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
Applied Cryptography and Network Security
2014-07-07Paper
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
Science China. Mathematics
2014-03-05Paper
Complete permutation polynomials induced from complete permutations of subfields
 
2013-12-19Paper
A method for counting the number of polynomial equivalence classes
Journal of Mathematical Cryptology
2013-09-04Paper
New constructions of quaternary bent functions
 
2013-09-01Paper
On enumeration of polynomial equivalence classes
Science China. Mathematics
2013-08-05Paper
Improved bounds for the implicit factorization problem
Advances in Mathematics of Communications
2013-07-31Paper
Factoring multi-power RSA modulus \(N = p^r q\) with partial known bits
Information Security and Privacy
2013-06-28Paper
Construction of resilient and nonlinear Boolean functions with almost perfect immunity to algebraic and fast algebraic attacks
Information Security and Cryptology
2013-05-28Paper
Fast evaluation of T-functions via time-memory trade-offs
Information Security and Cryptology
2013-05-28Paper
An improved twisted Ate pairing over KSS curves with \(k = 18\)
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
On efficient pairings on elliptic curves over extension fields
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Stronger Security Model for Public-Key Encryption with Equality Test
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Perfect algebraic immune functions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Fast Tate pairing computation on twisted Jacobi intersections curves
Information Security and Cryptology
2013-01-07Paper
Vladimir Sergeevich Anashin
\(p\)-Adic Numbers, Ultrametric Analysis, and Applications
2012-11-13Paper
Anonymous Identity-Based Hash Proof System and Its Applications
Provable Security
2012-11-06Paper
Identity-based extractable hash proofs and their applications
Applied Cryptography and Network Security
2012-09-10Paper
Linear weaknesses in \(T\)-functions
Lecture Notes in Computer Science
2012-09-07Paper
The initialization stage analysis of ZUC v1.5
Cryptology and Network Security
2012-07-20Paper
Ergodic theory over \(\mathbb F_2 T\)
Finite Fields and their Applications
2012-05-07Paper
On enumeration of polynomial equivalence classes and their application to MPKC
Finite Fields and their Applications
2012-03-22Paper
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2
Cryptography and Coding
2011-12-16Paper
Resettable cryptography in constant rounds -- the case of zero knowledge
Lecture Notes in Computer Science
2011-12-02Paper
On the nonexistence of bent functions
International Journal of Foundations of Computer Science
2011-10-10Paper
Results on the immunity of Boolean functions against probabilistic algebraic attacks
Information Security and Privacy
2011-07-07Paper
Attacking Bivium and Trivium with the characteristic set method
Lecture Notes in Computer Science
2011-06-29Paper
On designated-weight Boolean functions with highest algebraic immunity
Science China. Mathematics
2011-02-25Paper
An interesting member ID-based group signature
 
2011-01-03Paper
Refinement of Miller's algorithm over Edwards curves
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model
Computer Science - Theory and Applications
2009-08-18Paper
Fuzzy decision tree based inference techniques for network forensic analysis
 
2009-03-06Paper
scientific article; zbMATH DE number 5525643 (Why is no real title available?)
 
2009-03-06Paper
Unlinkable Randomizable Signature and Its Application in Group Signature
Information Security and Cryptology
2009-02-10Paper
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption
Information Security and Cryptology
2009-02-10Paper
OPMAC: One-Key Poly1305 MAC
Information Security and Cryptology
2009-01-15Paper
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps
Cryptology and Network Security
2009-01-09Paper
Novel \(\Omega\)-protocols for NP
Science in China. Series F
2008-03-31Paper
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation
Science in China. Series F
2007-08-31Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
The internet accessible mathematical computation framework
Science in China. Series F
2007-02-20Paper
Security analysis of a signature scheme with message recovery
 
2006-12-11Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Protocol security analysis based on an ideal
 
2006-01-23Paper
Computational Science - ICCS 2004
Lecture Notes in Computer Science
2005-12-23Paper
scientific article; zbMATH DE number 2165698 (Why is no real title available?)
 
2005-05-06Paper
scientific article; zbMATH DE number 1860752 (Why is no real title available?)
 
2003-06-01Paper
scientific article; zbMATH DE number 1795742 (Why is no real title available?)
 
2003-02-10Paper
scientific article; zbMATH DE number 1860743 (Why is no real title available?)
 
2003-01-28Paper
Another attempt for parallel computation of characteristic sets
 
2002-11-04Paper
An approach towards the implementation of characteristic set method
Systems Science and Mathematical Sciences
2002-07-28Paper
A class of generalized cyclic codes
Acta Mathematicae Applicatae Sinica. English Series
2002-04-21Paper
scientific article; zbMATH DE number 1380842 (Why is no real title available?)
 
1999-12-20Paper
scientific article; zbMATH DE number 1380882 (Why is no real title available?)
 
1999-12-20Paper
scientific article; zbMATH DE number 1263332 (Why is no real title available?)
 
1999-03-16Paper
Well-behaved basis and LR arrays
Acta Mathematicae Applicatae Sinica. English Series
1996-07-08Paper
Structure and properties of linear recurring m-arrays
IEEE Transactions on Information Theory
1994-10-03Paper
scientific article; zbMATH DE number 500488 (Why is no real title available?)
 
1994-09-26Paper
The equivalence classes of LR arrays
Discrete Applied Mathematics
1994-01-27Paper
scientific article; zbMATH DE number 270250 (Why is no real title available?)
 
1993-09-02Paper
scientific article; zbMATH DE number 123902 (Why is no real title available?)
 
1993-02-18Paper
Linear Recurring m-Arrays
Lecture Notes in Computer Science
1988-01-01Paper


Research outcomes over time


This page was built for person: Dongdai Lin