Dengguo Feng

From MaRDI portal
Person:244676

Available identifiers

zbMath Open feng.dengguoMaRDI QIDQ244676

List of research outcomes

PublicationDate of PublicationType
Fast blind rotation for bootstrapping FHEs2024-02-06Paper
New method for combining Matsui's bounding conditions with sequential encoding method2023-11-07Paper
Security model and modular design of fair authentication key exchange protocols2022-10-28Paper
A property-based attestation protocol for TCM2022-10-28Paper
On constant-round zero-knowledge proofs of knowledge for NP-relations2022-10-28Paper
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V2022-09-22Paper
FAN: a lightweight authenticated cryptographic algorithm2021-12-20Paper
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System2020-07-20Paper
Practical cryptanalysis of Bluetooth encryption with condition masking2018-05-28Paper
Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme2018-04-20Paper
New Results on Periodic Sequences With Large $k$-Error Linear Complexity2017-08-08Paper
The Weight Enumerator of a Class of Cyclic Codes2017-07-27Paper
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round2017-05-19Paper
Boolean functions and their applications in cryptography2016-12-02Paper
https://portal.mardi4nfdi.de/entity/Q29932602016-08-10Paper
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$2015-12-02Paper
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP2015-11-20Paper
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication2015-11-03Paper
Near Collision Attack on the Grain v1 Stream Cipher2015-09-18Paper
A Clustering Approach for Privacy-Preserving in Social Networks2015-09-11Paper
Linear Cryptanalysis of FASER128/256 and TriviA-ck2015-09-10Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function2014-10-08Paper
ExBLACR: Extending BLACR System2014-07-24Paper
On the nonexistence of nontrivial small cycles of the \(\mu\) function in \(3x+1\) conjecture2014-01-27Paper
Cube Attack on Grain2013-11-19Paper
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking2013-09-02Paper
Round-optimal zero-knowledge proofs of knowledge for NP2013-08-20Paper
Improved multi-pass fast correlation attacks with applications2013-07-03Paper
Cryptanalysis of Helix and Phelix Revisited2013-06-28Paper
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha2013-06-04Paper
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures2013-03-18Paper
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others2013-01-08Paper
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion2013-01-07Paper
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v32013-01-07Paper
Combined Public-Key Schemes: The Case of ABE and ABS2012-11-06Paper
Fully Secure Doubly-Spatial Encryption under Simple Assumptions2012-11-06Paper
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks2012-11-01Paper
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers2012-09-10Paper
Black-box testing based on colorful taint analysis2012-08-17Paper
Comments on the SM2 Key Exchange Protocol2012-07-20Paper
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge2011-12-02Paper
ON GUESS AND DETERMINE ANALYSIS OF RABBIT2011-10-10Paper
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost2011-09-16Paper
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher2011-07-29Paper
Loiss: A Byte-Oriented Stream Cipher2011-06-08Paper
How to Characterize Side-Channel Leakages More Accurately?2011-05-19Paper
A Byte-Based Guess and Determine Attack on SOSEMANUK2010-12-07Paper
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network2010-11-23Paper
Some results on cryptanalysis of SMS4 block cipher2010-09-22Paper
Cryptanalysis of the LANE Hash Function2009-12-09Paper
An Improved Fast Correlation Attack on Stream Ciphers2009-11-03Paper
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model2009-08-18Paper
A New Client-to-Client Password-Authenticated Key Agreement Protocol2009-07-23Paper
Security of Truncated MACs2009-04-29Paper
https://portal.mardi4nfdi.de/entity/Q36103302009-03-06Paper
Spectral characteristics of the best affine approach of multi-output m-valued logical functions2009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36109262009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36109562009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36109712009-03-06Paper
On the $2$-Adic Complexity and the $k$-Error $2$-Adic Complexity of Periodic Binary Sequences2009-02-24Paper
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/2008-12-21Paper
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields2008-12-21Paper
On Quadratic Bent Functions in Polynomial Forms2008-12-21Paper
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences2008-11-27Paper
On the Unprovable Security of 2-Key XCBC2008-07-08Paper
New Results on Impossible Differential Cryptanalysis of Reduced AES2008-05-06Paper
Cryptanalysis of the Hash Functions MD4 and RIPEMD2008-05-06Paper
New Guess-and-Determine Attack on the Self-Shrinking Generator2008-04-24Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation2008-04-11Paper
Related-Key Differential-Linear Attacks on Reduced AES-1922008-04-11Paper
Short Threshold Signature Schemes Without Random Oracles2008-03-17Paper
On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences2008-03-14Paper
Applied Cryptography and Network Security2008-02-19Paper
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-1922007-11-29Paper
Multi-pass Fast Correlation Attack on Stream Ciphers2007-11-29Paper
Survey of information security2007-10-12Paper
Modular approach to the design and analysis of password-based security protocols2007-10-12Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation2007-08-31Paper
https://portal.mardi4nfdi.de/entity/Q34366632007-05-11Paper
Applied Cryptography and Network Security2007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Theory and Applications of Models of Computation2007-04-30Paper
Linear cryptanalysis of NUSH block cipher2007-02-20Paper
Cryptanalysis of AW digital signature scheme based on error-correcting codes2007-02-20Paper
Collision attack on reduced-round Camellia2007-02-20Paper
An attack on hash function HAVAL-1282007-02-20Paper
Information Security and Cryptology2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
Security analysis of a new stream cipher2006-10-11Paper
https://portal.mardi4nfdi.de/entity/Q54911952006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q54912002006-10-10Paper
An Arbitrated Quantum Message Signature Scheme2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q54782462006-07-12Paper
https://portal.mardi4nfdi.de/entity/Q54695372006-05-19Paper
https://portal.mardi4nfdi.de/entity/Q54695632006-05-19Paper
https://portal.mardi4nfdi.de/entity/Q57189012006-01-16Paper
https://portal.mardi4nfdi.de/entity/Q57189042006-01-16Paper
https://portal.mardi4nfdi.de/entity/Q57189072006-01-16Paper
https://portal.mardi4nfdi.de/entity/Q57158312006-01-05Paper
https://portal.mardi4nfdi.de/entity/Q57145292006-01-03Paper
https://portal.mardi4nfdi.de/entity/Q57145322006-01-03Paper
https://portal.mardi4nfdi.de/entity/Q57145352006-01-03Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Cryptanalysis of some signature schemes with message recovery2005-11-14Paper
https://portal.mardi4nfdi.de/entity/Q57009832005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009932005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57010012005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q56994322005-10-26Paper
https://portal.mardi4nfdi.de/entity/Q53157522005-09-09Paper
https://portal.mardi4nfdi.de/entity/Q53144222005-09-05Paper
https://portal.mardi4nfdi.de/entity/Q53144262005-09-05Paper
Information and Communications Security2005-08-19Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q46739912005-05-09Paper
On Lin-Bose problem2004-11-18Paper
https://portal.mardi4nfdi.de/entity/Q48238432004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48239092004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48239292004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q44709062004-06-18Paper
https://portal.mardi4nfdi.de/entity/Q44668282004-06-08Paper
https://portal.mardi4nfdi.de/entity/Q44506582004-02-15Paper
https://portal.mardi4nfdi.de/entity/Q44506612004-02-15Paper
Study on strand space model theory2003-11-06Paper
Three characterizations of correlation-immune functions over the rings \(Z_N\)2000-08-23Paper
Maximum correlation analysis of nonlinear combining functions1998-08-20Paper
Judging of the orthogonal system over rings \(\mathbb{Z}_ N\)1998-06-11Paper
A sufficient and necessary condition of judging the independence of Boolean functions system1996-09-16Paper
Spectral representation of correspondence of multi-valued logical functions1995-11-28Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Dengguo Feng