Dong-Dai Lin

From MaRDI portal
Person:1568232

Available identifiers

zbMath Open lin.dongdaiMaRDI QIDQ1568232

List of research outcomes

PublicationDate of PublicationType
Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences2024-03-14Paper
Moving a step of ChaCha in syncopated rhythm2024-02-02Paper
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls2023-12-08Paper
Amortizing division and exponentiation2023-08-21Paper
Generalized boomerang connectivity table and improved cryptanalysis of GIFT2023-08-21Paper
Cryptanalysis of Ciminion2023-08-21Paper
Higher-order masking scheme for Trivium hardware implementation2023-08-21Paper
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP2023-06-30Paper
Conditional Cube Searching and Applications on Trivium-Variant Ciphers2023-06-30Paper
Properties of the cycles that contain all vectors of weight \(\le k\)2023-01-18Paper
Two new families of quantum synchronizable codes2022-12-23Paper
A two-round honest-verifier zero-knowledge protocol2022-10-28Paper
Bayesian mechanism for rational secret sharing scheme2022-10-28Paper
Generic Constructions of Revocable Identity-Based Encryption2022-10-14Paper
Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT2022-07-01Paper
Isomorphism and equivalence of Galois nonlinear feedback shift registers2022-07-01Paper
Binary sequences derived from monomial permutation polynomials over \(\mathrm{GF}(2^p)\)2022-07-01Paper
Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey2022-06-08Paper
Differential-linear cryptanalysis from an algebraic perspective2022-04-22Paper
Determining deep hole trees of generalized Reed-Solomon codes and an application2022-03-21Paper
The Adjacency Graphs of FSRs With Affine Characteristic Functions2022-02-17Paper
Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees2022-02-17Paper
On the \(k\)-error linear complexities of De Bruijn sequences2021-12-08Paper
On Galois NFSRs equivalent to Fibonacci ones2021-12-08Paper
Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems2021-11-11Paper
Analyzing Boolean functions via solving parametric polynomial systems2021-04-08Paper
Hierarchical group signatures with verifier-local revocation2021-01-18Paper
On the efficiency of solving Boolean polynomial systems with the characteristic set method2020-11-13Paper
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks2020-07-16Paper
Longest subsequences shared by two de Bruijn sequences2020-07-15Paper
A new upper bound on the order of affine sub-families of NFSRs2020-05-13Paper
Refined analysis to the extended tower number field sieve2020-03-12Paper
Composition of Boolean functions: an application to the secondary constructions of bent functions2020-01-22Paper
Distribution properties of binary sequences derived from primitive sequences modulo square-free odd integers2019-10-31Paper
A note on rotation symmetric S-boxes2019-10-22Paper
Faster scalar multiplication on the \(x\)-line: three-dimensional GLV method with three-dimensional differential addition chains2019-10-14Paper
A new construction of zero-difference balanced functions and two applications2019-09-12Paper
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach2019-07-19Paper
Further results on complete permutation monomials over finite fields2019-06-18Paper
A recursive construction of permutation polynomials over \(\mathbb F_{q^2}\) with odd characteristic related to Rédei functions2019-06-06Paper
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity2019-05-17Paper
Multi-identity IBFHE and multi-attribute ABFHE in the standard model2019-03-29Paper
Speeding up the GVW algorithm via a substituting method2019-03-06Paper
The distribution of \(2^n\)-periodic binary sequences with fixed \(k\)-error linear complexity2018-12-07Paper
Fault attacks on stream cipher Scream2018-12-07Paper
Estimating differential-linear distinguishers and applications to CTC22018-12-07Paper
Combined cache timing attacks and template attacks on stream cipher MUGI2018-12-07Paper
The linear complexity and 2-error linear complexity distribution of \(2^n\)-periodic binary sequences with fixed Hamming weight2018-10-26Paper
On the division property of \textsc{Simon}48 and \textsc{Simon}642018-10-24Paper
Symbolic-like computation and conditional differential cryptanalysis of QUARK2018-10-24Paper
Anonymous identity-based encryption with identity recovery2018-09-26Paper
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure2018-09-19Paper
Lower and Upper Bounds on the Density of Irreducible NFSRs2018-09-14Paper
Correlation cube attacks: from weak-key distinguisher to key recovery2018-07-09Paper
https://portal.mardi4nfdi.de/entity/Q45708612018-07-09Paper
Improved key generation algorithm for Gentry's fully homomorphic encryption scheme2018-06-15Paper
Refinement of the four-dimensional GLV method on elliptic curves2018-04-26Paper
A game-based framework towards cyber-attacks on state estimation in ICSS2018-04-20Paper
Cryptanalysis of Acorn in nonce-reuse setting2018-04-20Paper
A class of three-weight and five-weight linear codes2018-04-10Paper
Complete weight enumerators of a class of three-weight linear codes2017-11-10Paper
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions2017-07-12Paper
The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials2017-06-08Paper
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers2017-05-16Paper
Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited2017-05-11Paper
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher2017-05-05Paper
Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework2017-05-05Paper
Generalized Hamming Weights of Irreducible Cyclic Codes2017-04-28Paper
Complete weight enumerators of two classes of linear codes2017-04-03Paper
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications2017-03-27Paper
On affine sub-families of Grain-like structures2017-02-17Paper
The adjacency graphs of some feedback shift registers2017-02-17Paper
A kind of three-weight linear codes2017-02-09Paper
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers2017-02-01Paper
Complete weight enumerators of two classes of linear codes2016-12-22Paper
On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra2016-10-20Paper
Classifying and generating exact coset representatives of \(\operatorname{PGL}_2(\mathbb{F}_q)\) in \(\operatorname{PGL}_2(\mathbb{F}_{q^2})\)2016-10-10Paper
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour2016-08-31Paper
An improvement over the GVW algorithm for inhomogeneous polynomial systems2016-07-29Paper
Generalized cyclotomic numbers of order two and their applications2016-07-01Paper
Solving Linear Equations Modulo Unknown Divisors: Revisited2016-06-10Paper
Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers2016-06-03Paper
Towards Optimal Bounds for Implicit Factorization Problem2016-05-19Paper
Further results on the nonlinearity of maximum-length NFSR feedbacks2016-04-11Paper
Linear complexity of Ding-Helleseth sequences of order 2 over \(\mathrm{GF}(l)\)2016-04-11Paper
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers2016-03-23Paper
Generic constructions of integrated PKE and PEKS2016-02-19Paper
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)2016-01-11Paper
A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery2015-12-04Paper
Omega Pairing on Hyperelliptic Curves2015-12-02Paper
Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions2015-12-02Paper
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails2015-11-25Paper
Improved domain extender for the ideal cipher2015-11-19Paper
Near Collision Attack on the Grain v1 Stream Cipher2015-09-18Paper
Linear complexity of binary generalized cyclotomic sequences over \(\mathrm{GF}(q)\)2015-08-24Paper
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation2015-07-06Paper
On constructing complete permutation polynomials over finite fields of even characteristic2015-04-28Paper
A new linearization method for nonlinear feedback shift registers2015-02-20Paper
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks2014-09-12Paper
Analysis of Optimum Pairing Products at High Security Levels2014-08-20Paper
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents2014-07-07Paper
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme2014-03-05Paper
Complete permutation polynomials induced from complete permutations of subfields2013-12-19Paper
A method for counting the number of polynomial equivalence classes2013-09-04Paper
New constructions of quaternary bent functions2013-09-01Paper
On enumeration of polynomial equivalence classes2013-08-05Paper
Improved bounds for the implicit factorization problem2013-07-31Paper
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits2013-06-28Paper
Fast Evaluation of T-Functions via Time-Memory Trade-Offs2013-05-28Paper
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks2013-05-28Paper
On Efficient Pairings on Elliptic Curves over Extension Fields2013-04-04Paper
An Improved Twisted Ate Pairing over KSS Curves with k = 182013-04-04Paper
Stronger Security Model for Public-Key Encryption with Equality Test2013-04-04Paper
Perfect Algebraic Immune Functions2013-03-19Paper
Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves2013-01-07Paper
Vladimir Sergeevich Anashin2012-11-13Paper
Anonymous Identity-Based Hash Proof System and Its Applications2012-11-06Paper
Identity-Based Extractable Hash Proofs and Their Applications2012-09-10Paper
Linear Weaknesses in T-functions2012-09-07Paper
The Initialization Stage Analysis of ZUC v1.52012-07-20Paper
Ergodic theory over \(\mathbb F_2 T\)2012-05-07Paper
On enumeration of polynomial equivalence classes and their application to MPKC2012-03-22Paper
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 22011-12-16Paper
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge2011-12-02Paper
ON THE NONEXISTENCE of BENT FUNCTIONS2011-10-10Paper
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks2011-07-07Paper
Attacking Bivium and Trivium with the Characteristic Set Method2011-06-29Paper
On designated-weight Boolean functions with highest algebraic immunity2011-02-25Paper
https://portal.mardi4nfdi.de/entity/Q30623762011-01-03Paper
Refinement of Miller’s Algorithm Over Edwards Curves2010-03-16Paper
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model2009-08-18Paper
https://portal.mardi4nfdi.de/entity/Q36109262009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110022009-03-06Paper
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption2009-02-10Paper
Unlinkable Randomizable Signature and Its Application in Group Signature2009-02-10Paper
OPMAC: One-Key Poly1305 MAC2009-01-15Paper
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps2009-01-09Paper
Novel \(\Omega\)-protocols for NP2008-03-31Paper
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability2007-11-29Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation2007-08-31Paper
Applied Cryptography and Network Security2007-05-02Paper
The internet accessible mathematical computation framework2007-02-20Paper
https://portal.mardi4nfdi.de/entity/Q34116522006-12-11Paper
Information Security and Cryptology2006-11-14Paper
https://portal.mardi4nfdi.de/entity/Q33656912006-01-23Paper
Computational Science - ICCS 20042005-12-23Paper
https://portal.mardi4nfdi.de/entity/Q46756282005-05-06Paper
https://portal.mardi4nfdi.de/entity/Q47904832003-06-01Paper
https://portal.mardi4nfdi.de/entity/Q45507922003-02-10Paper
https://portal.mardi4nfdi.de/entity/Q47904742003-01-28Paper
https://portal.mardi4nfdi.de/entity/Q27259512002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q27474002002-07-28Paper
A class of generalized cyclic codes2002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q47055481999-12-20Paper
https://portal.mardi4nfdi.de/entity/Q47055991999-12-20Paper
https://portal.mardi4nfdi.de/entity/Q42342101999-03-16Paper
Well-behaved basis and LR arrays1996-07-08Paper
Structure and properties of linear recurring m-arrays1994-10-03Paper
https://portal.mardi4nfdi.de/entity/Q42790231994-09-26Paper
The equivalence classes of LR arrays1994-01-27Paper
https://portal.mardi4nfdi.de/entity/Q52888861993-09-02Paper
https://portal.mardi4nfdi.de/entity/Q40255751993-02-18Paper
Linear Recurring m-Arrays1988-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Dong-Dai Lin