Dengguo Feng

From MaRDI portal
Person:244676

Available identifiers

zbMath Open feng.dengguoMaRDI QIDQ244676

List of research outcomes





PublicationDate of PublicationType
New methods for bounding the length of impossible differentials of SPN block ciphers2025-01-23Paper
NEV: faster and smaller NTRU encryption using vector decoding2024-08-30Paper
Fast blind rotation for bootstrapping FHEs2024-02-06Paper
New method for combining Matsui's bounding conditions with sequential encoding method2023-11-07Paper
Security model and modular design of fair authentication key exchange protocols2022-10-28Paper
A property-based attestation protocol for TCM2022-10-28Paper
On constant-round zero-knowledge proofs of knowledge for NP-relations2022-10-28Paper
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V2022-09-22Paper
FAN: a lightweight authenticated cryptographic algorithm2021-12-20Paper
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System2020-07-20Paper
Practical cryptanalysis of Bluetooth encryption with condition masking2018-05-28Paper
Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme2018-04-20Paper
New Results on Periodic Sequences With Large $k$-Error Linear Complexity2017-08-08Paper
The Weight Enumerator of a Class of Cyclic Codes2017-07-27Paper
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round2017-05-19Paper
Boolean functions and their applications in cryptography2016-12-02Paper
https://portal.mardi4nfdi.de/entity/Q29932602016-08-10Paper
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$2015-12-02Paper
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP2015-11-20Paper
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication2015-11-03Paper
Near Collision Attack on the Grain v1 Stream Cipher2015-09-18Paper
A Clustering Approach for Privacy-Preserving in Social Networks2015-09-11Paper
Linear Cryptanalysis of FASER128/256 and TriviA-ck2015-09-10Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function2014-10-08Paper
ExBLACR: Extending BLACR System2014-07-24Paper
On the nonexistence of nontrivial small cycles of the \(\mu\) function in \(3x+1\) conjecture2014-01-27Paper
Cube attack on grain2013-11-19Paper
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking2013-09-02Paper
Round-optimal zero-knowledge proofs of knowledge for NP2013-08-20Paper
Improved multi-pass fast correlation attacks with applications2013-07-03Paper
Cryptanalysis of Helix and Phelix Revisited2013-06-28Paper
Improved key recovery attacks on reduced-round Salsa20 and ChaCha2013-06-04Paper
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures2013-03-18Paper
(Pseudo) preimage attack on round-reduced Grøstl hash function and others2013-01-08Paper
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion2013-01-07Paper
On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v32013-01-07Paper
Combined public-key schemes: the case of ABE and ABS2012-11-06Paper
Fully secure doubly-spatial encryption under simple assumptions2012-11-06Paper
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks2012-11-01Paper
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers2012-09-10Paper
Black-box testing based on colorful taint analysis2012-08-17Paper
Comments on the SM2 key exchange protocol2012-07-20Paper
Resettable cryptography in constant rounds -- the case of zero knowledge2011-12-02Paper
On guess and determine analysis of Rabbit2011-10-10Paper
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost2011-09-16Paper
Hyper-Sbox view of AES-like permutations: a generalized distinguisher2011-07-29Paper
Loiss: A Byte-Oriented Stream Cipher2011-06-08Paper
How to characterize side-channel leakages more accurately?2011-05-19Paper
A byte-based guess and determine attack on SOSEMANUK2010-12-07Paper
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network2010-11-23Paper
Some results on cryptanalysis of SMS4 block cipher2010-09-22Paper
Cryptanalysis of the LANE hash function2009-12-09Paper
An Improved Fast Correlation Attack on Stream Ciphers2009-11-03Paper
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model2009-08-18Paper
A New Client-to-Client Password-Authenticated Key Agreement Protocol2009-07-23Paper
Security of Truncated MACs2009-04-29Paper
Correlation functions of multioutput \(m\)-valued logical functions and relation between correlation functions and spectra2009-03-06Paper
Spectral characteristics of the best affine approach of multi-output m-valued logical functions2009-03-06Paper
Fuzzy decision tree based inference techniques for network forensic analysis2009-03-06Paper
Global timestamp serialization in multi-level multi-version DBMS2009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36109712009-03-06Paper
On the $2$-Adic Complexity and the $k$-Error $2$-Adic Complexity of Periodic Binary Sequences2009-02-24Paper
On Quadratic Bent Functions in Polynomial Forms2008-12-21Paper
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields2008-12-21Paper
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/2008-12-21Paper
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences2008-11-27Paper
On the Unprovable Security of 2-Key XCBC2008-07-08Paper
Cryptanalysis of the Hash Functions MD4 and RIPEMD2008-05-06Paper
New Results on Impossible Differential Cryptanalysis of Reduced AES2008-05-06Paper
New Guess-and-Determine Attack on the Self-Shrinking Generator2008-04-24Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation2008-04-11Paper
Related-Key Differential-Linear Attacks on Reduced AES-1922008-04-11Paper
Short Threshold Signature Schemes Without Random Oracles2008-03-17Paper
On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences2008-03-14Paper
Applied Cryptography and Network Security2008-02-19Paper
Multi-pass Fast Correlation Attack on Stream Ciphers2007-11-29Paper
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-1922007-11-29Paper
Survey of information security2007-10-12Paper
Modular approach to the design and analysis of password-based security protocols2007-10-12Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation2007-08-31Paper
Spectral characteristics of multi-output \(m\)-valued logical functions2007-05-11Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Applied Cryptography and Network Security2007-05-02Paper
Theory and Applications of Models of Computation2007-04-30Paper
An attack on hash function HAVAL-1282007-02-20Paper
Linear cryptanalysis of NUSH block cipher2007-02-20Paper
Cryptanalysis of AW digital signature scheme based on error-correcting codes2007-02-20Paper
Collision attack on reduced-round Camellia2007-02-20Paper
Cryptology and Network Security2006-11-14Paper
Information Security and Cryptology2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
Security analysis of a new stream cipher2006-10-11Paper
An Arbitrated Quantum Message Signature Scheme2006-10-10Paper
Pairwise key agreement protocols based on the Weil pairing2006-10-10Paper
Analysis and improvement of a security-provable mutually authenticated key agreement2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Quantum secure direct communication using quantum Calderbank-Shor-Steane error correcting codes2006-07-12Paper
Ownership proofs of digital works based on secure multiparty computation2006-05-19Paper
Cryptanalysis of the TAE mode and its improvement2006-05-19Paper
https://portal.mardi4nfdi.de/entity/Q57189042006-01-16Paper
https://portal.mardi4nfdi.de/entity/Q57189072006-01-16Paper
https://portal.mardi4nfdi.de/entity/Q57189012006-01-16Paper
https://portal.mardi4nfdi.de/entity/Q57158312006-01-05Paper
https://portal.mardi4nfdi.de/entity/Q57145322006-01-03Paper
https://portal.mardi4nfdi.de/entity/Q57145352006-01-03Paper
https://portal.mardi4nfdi.de/entity/Q57145292006-01-03Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Cryptanalysis of some signature schemes with message recovery2005-11-14Paper
https://portal.mardi4nfdi.de/entity/Q57010012005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009932005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009832005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q56994322005-10-26Paper
https://portal.mardi4nfdi.de/entity/Q53157522005-09-09Paper
https://portal.mardi4nfdi.de/entity/Q53144222005-09-05Paper
https://portal.mardi4nfdi.de/entity/Q53144262005-09-05Paper
Information and Communications Security2005-08-19Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q46739912005-05-09Paper
On Lin-Bose problem2004-11-18Paper
https://portal.mardi4nfdi.de/entity/Q48239292004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48238432004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48239092004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q44709062004-06-18Paper
https://portal.mardi4nfdi.de/entity/Q44668282004-06-08Paper
https://portal.mardi4nfdi.de/entity/Q44506582004-02-15Paper
https://portal.mardi4nfdi.de/entity/Q44506612004-02-15Paper
Study on strand space model theory2003-11-06Paper
Three characterizations of correlation-immune functions over the rings \(Z_N\)2000-08-23Paper
Maximum correlation analysis of nonlinear combining functions1998-08-20Paper
Judging of the orthogonal system over rings \(\mathbb{Z}_ N\)1998-06-11Paper
A sufficient and necessary condition of judging the independence of Boolean functions system1996-09-16Paper
Spectral representation of correspondence of multi-valued logical functions1995-11-28Paper

Research outcomes over time

This page was built for person: Dengguo Feng