Dengguo Feng

From MaRDI portal
(Redirected from Person:244676)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
New methods for bounding the length of impossible differentials of SPN block ciphers
IEEE Transactions on Information Theory
2025-01-23Paper
NEV: faster and smaller NTRU encryption using vector decoding
 
2024-08-30Paper
Fast blind rotation for bootstrapping FHEs
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
New method for combining Matsui's bounding conditions with sequential encoding method
Designs, Codes and Cryptography
2023-11-07Paper
Security model and modular design of fair authentication key exchange protocols
Science China Information Sciences
2022-10-28Paper
A property-based attestation protocol for TCM
Science China Information Sciences
2022-10-28Paper
On constant-round zero-knowledge proofs of knowledge for NP-relations
Science China Information Sciences
2022-10-28Paper
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V
Designs, Codes and Cryptography
2022-09-22Paper
FAN: a lightweight authenticated cryptographic algorithm
 
2021-12-20Paper
Formal analysis of a TTP-free blacklistable anonymous credentials system
Information and Communications Security
2020-07-20Paper
Practical cryptanalysis of Bluetooth encryption with condition masking
Journal of Cryptology
2018-05-28Paper
Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme
 
2018-04-20Paper
New Results on Periodic Sequences With Large $k$-Error Linear Complexity
IEEE Transactions on Information Theory
2017-08-08Paper
The Weight Enumerator of a Class of Cyclic Codes
IEEE Transactions on Information Theory
2017-07-27Paper
Improved fault analysis on the block cipher SPECK by injecting faults in the same round
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
Boolean functions and their applications in cryptography
Advances in Computer Science and Technology
2016-12-02Paper
Design and formal analysis of TCM key migration protocols
 
2016-08-10Paper
Autocorrelation values of new generalized cyclotomic sequences of order six over \(\mathbb Z_{pq}\)
Information Security and Cryptology
2015-12-02Paper
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP
Science China Information Sciences
2015-11-20Paper
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
Lecture Notes in Computer Science
2015-11-03Paper
Near collision attack on the Grain v1 stream cipher
Fast Software Encryption
2015-09-18Paper
A clustering approach for privacy-preserving in social networks
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Linear cryptanalysis of FASER128/256 and TriviA-ck
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Computing Walsh coefficients from the algebraic normal form of a Boolean function
Cryptography and Communications
2014-10-08Paper
ExBLACR: extending BLACR system
Information Security and Privacy
2014-07-24Paper
On the nonexistence of nontrivial small cycles of the \(\mu\) function in \(3x+1\) conjecture
Journal of Systems Science and Complexity
2014-01-27Paper
Cube attack on grain
Journal of Software
2013-11-19Paper
Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Round-optimal zero-knowledge proofs of knowledge for NP
Science China Information Sciences
2013-08-20Paper
Improved multi-pass fast correlation attacks with applications
Science China Information Sciences
2013-07-03Paper
Cryptanalysis of helix and phelix revisited
Information Security and Privacy
2013-06-28Paper
Improved key recovery attacks on reduced-round Salsa20 and ChaCha
Lecture Notes in Computer Science
2013-06-04Paper
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
(Pseudo) preimage attack on round-reduced Grøstl hash function and others
Fast Software Encryption
2013-01-08Paper
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion
Information Security and Cryptology
2013-01-07Paper
On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3
Information Security and Cryptology
2013-01-07Paper
Combined public-key schemes: the case of ABE and ABS
Provable Security
2012-11-06Paper
Fully secure doubly-spatial encryption under simple assumptions
Provable Security
2012-11-06Paper
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers
Applied Cryptography and Network Security
2012-09-10Paper
Black-box testing based on colorful taint analysis
Science China Information Sciences
2012-08-17Paper
Comments on the SM2 key exchange protocol
Cryptology and Network Security
2012-07-20Paper
Resettable cryptography in constant rounds -- the case of zero knowledge
Lecture Notes in Computer Science
2011-12-02Paper
On guess and determine analysis of Rabbit
International Journal of Foundations of Computer Science
2011-10-10Paper
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
Provable Security
2011-09-16Paper
Hyper-Sbox view of AES-like permutations: a generalized distinguisher
Information Security and Cryptology
2011-07-29Paper
Loiss: A Byte-Oriented Stream Cipher
Lecture Notes in Computer Science
2011-06-08Paper
How to characterize side-channel leakages more accurately?
Information Security Practice and Experience
2011-05-19Paper
A byte-based guess and determine attack on SOSEMANUK
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network
Information Security and Cryptology
2010-11-23Paper
Some results on cryptanalysis of SMS4 block cipher
International Journal of Applied Cryptography
2010-09-22Paper
Cryptanalysis of the LANE hash function
Selected Areas in Cryptography
2009-12-09Paper
An Improved Fast Correlation Attack on Stream Ciphers
Selected Areas in Cryptography
2009-11-03Paper
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model
Computer Science - Theory and Applications
2009-08-18Paper
A New Client-to-Client Password-Authenticated Key Agreement Protocol
Lecture Notes in Computer Science
2009-07-23Paper
Security of Truncated MACs
Information Security and Cryptology
2009-04-29Paper
Correlation functions of multioutput \(m\)-valued logical functions and relation between correlation functions and spectra
 
2009-03-06Paper
Spectral characteristics of the best affine approach of multi-output m-valued logical functions
Wuhan University Journal of Natural Sciences
2009-03-06Paper
Fuzzy decision tree based inference techniques for network forensic analysis
 
2009-03-06Paper
Global timestamp serialization in multi-level multi-version DBMS
 
2009-03-06Paper
scientific article; zbMATH DE number 5525620 (Why is no real title available?)
 
2009-03-06Paper
On the $2$-Adic Complexity and the $k$-Error $2$-Adic Complexity of Periodic Binary Sequences
IEEE Transactions on Information Theory
2009-02-24Paper
On Quadratic Bent Functions in Polynomial Forms
IEEE Transactions on Information Theory
2008-12-21Paper
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields
IEEE Transactions on Information Theory
2008-12-21Paper
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/
IEEE Transactions on Information Theory
2008-12-21Paper
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences
Sequences and Their Applications – SETA 2006
2008-11-27Paper
On the Unprovable Security of 2-Key XCBC
Information Security and Privacy
2008-07-08Paper
Cryptanalysis of the Hash Functions MD4 and RIPEMD
Lecture Notes in Computer Science
2008-05-06Paper
New Results on Impossible Differential Cryptanalysis of Reduced AES
Lecture Notes in Computer Science
2008-05-06Paper
New Guess-and-Determine Attack on the Self-Shrinking Generator
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Related-Key Differential-Linear Attacks on Reduced AES-192
Lecture Notes in Computer Science
2008-04-11Paper
Short Threshold Signature Schemes Without Random Oracles
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences
Sequences and Their Applications - SETA 2004
2008-03-14Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Multi-pass Fast Correlation Attack on Stream Ciphers
Selected Areas in Cryptography
2007-11-29Paper
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
Selected Areas in Cryptography
2007-11-29Paper
Survey of information security
Science in China. Series F
2007-10-12Paper
Modular approach to the design and analysis of password-based security protocols
Science in China. Series F
2007-10-12Paper
Constructing parallel long-message signcryption scheme from trapdoor permutation
Science in China. Series F
2007-08-31Paper
Spectral characteristics of multi-output \(m\)-valued logical functions
 
2007-05-11Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Theory and Applications of Models of Computation
Lecture Notes in Computer Science
2007-04-30Paper
An attack on hash function HAVAL-128
Science in China. Series F
2007-02-20Paper
Linear cryptanalysis of NUSH block cipher
Science in China. Series F
2007-02-20Paper
Cryptanalysis of AW digital signature scheme based on error-correcting codes
Science in China. Series F
2007-02-20Paper
Collision attack on reduced-round Camellia
Science in China. Series F
2007-02-20Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Security analysis of a new stream cipher
Science in China. Series F
2006-10-11Paper
An Arbitrated Quantum Message Signature Scheme
Computational and Information Science
2006-10-10Paper
Pairwise key agreement protocols based on the Weil pairing
 
2006-10-10Paper
Analysis and improvement of a security-provable mutually authenticated key agreement
 
2006-10-10Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Quantum secure direct communication using quantum Calderbank-Shor-Steane error correcting codes
 
2006-07-12Paper
Ownership proofs of digital works based on secure multiparty computation
 
2006-05-19Paper
Cryptanalysis of the TAE mode and its improvement
 
2006-05-19Paper
scientific article; zbMATH DE number 2247715 (Why is no real title available?)
 
2006-01-16Paper
scientific article; zbMATH DE number 2247718 (Why is no real title available?)
 
2006-01-16Paper
scientific article; zbMATH DE number 2247712 (Why is no real title available?)
 
2006-01-16Paper
scientific article; zbMATH DE number 2243635 (Why is no real title available?)
 
2006-01-05Paper
scientific article; zbMATH DE number 2242701 (Why is no real title available?)
 
2006-01-03Paper
scientific article; zbMATH DE number 2242707 (Why is no real title available?)
 
2006-01-03Paper
scientific article; zbMATH DE number 2242698 (Why is no real title available?)
 
2006-01-03Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Cryptanalysis of some signature schemes with message recovery
Applied Mathematics and Computation
2005-11-14Paper
scientific article; zbMATH DE number 2222203 (Why is no real title available?)
 
2005-11-02Paper
scientific article; zbMATH DE number 2222197 (Why is no real title available?)
 
2005-11-02Paper
scientific article; zbMATH DE number 2222190 (Why is no real title available?)
 
2005-11-02Paper
scientific article; zbMATH DE number 2217663 (Why is no real title available?)
 
2005-10-26Paper
scientific article; zbMATH DE number 2204038 (Why is no real title available?)
 
2005-09-09Paper
scientific article; zbMATH DE number 2202209 (Why is no real title available?)
 
2005-09-05Paper
scientific article; zbMATH DE number 2202215 (Why is no real title available?)
 
2005-09-05Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2166730 (Why is no real title available?)
 
2005-05-09Paper
On Lin-Bose problem
Linear Algebra and its Applications
2004-11-18Paper
scientific article; zbMATH DE number 2112427 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2112354 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2112409 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2075857 (Why is no real title available?)
 
2004-06-18Paper
scientific article; zbMATH DE number 2070573 (Why is no real title available?)
 
2004-06-08Paper
scientific article; zbMATH DE number 2042806 (Why is no real title available?)
 
2004-02-15Paper
scientific article; zbMATH DE number 2042808 (Why is no real title available?)
 
2004-02-15Paper
Study on strand space model theory
Journal of Computer Science and Technology
2003-11-06Paper
Three characterizations of correlation-immune functions over the rings \(Z_N\)
Theoretical Computer Science
2000-08-23Paper
Maximum correlation analysis of nonlinear combining functions
Science in China. Series E
1998-08-20Paper
Judging of the orthogonal system over rings \(\mathbb{Z}_ N\)
Chinese Science Bulletin
1998-06-11Paper
A sufficient and necessary condition of judging the independence of Boolean functions system
Chinese Science Bulletin
1996-09-16Paper
Spectral representation of correspondence of multi-valued logical functions
Chinese Science Bulletin
1995-11-28Paper


Research outcomes over time


This page was built for person: Dengguo Feng