Dongdai Lin
Orcid: 0000-0002-3951-7889
According to our database1,
Dongdai Lin
authored at least 302 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros.
Comput. J., 2024
IACR Commun. Cryptol., 2024
2023
Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers.
J. Syst. Sci. Complex., December, 2023
Comput. J., September, 2023
IEEE Trans. Inf. Theory, August, 2023
On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80.
Comput. J., June, 2023
Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences.
IEEE Trans. Inf. Theory, 2023
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.
IEEE Trans. Dependable Secur. Comput., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage.
IACR Cryptol. ePrint Arch., 2023
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls.
IACR Cryptol. ePrint Arch., 2023
Des. Codes Cryptogr., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
IEEE Trans. Inf. Theory, 2022
IACR Cryptol. ePrint Arch., 2022
Cybersecur., 2022
Sci. China Inf. Sci., 2022
Sci. China Inf. Sci., 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
The 4-Adic Complexity of Quaternary Sequences of Even Period With Ideal Autocorrelation.
Proceedings of the IEEE International Symposium on Information Theory, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees.
IEEE Trans. Inf. Theory, 2021
On the efficiency of solving Boolean polynomial systems with the characteristic set method.
J. Symb. Comput., 2021
J. Syst. Sci. Complex., 2021
Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium.
IACR Cryptol. ePrint Arch., 2021
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey.
IACR Cryptol. ePrint Arch., 2021
Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers.
Cybersecur., 2021
CoRR, 2021
Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems.
Appl. Math. Comput., 2021
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021
On the 4-Adic Complexity of Quaternary Sequences of Period $2p$ with Ideal Autocorrelation.
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Binary Sequences Derived from Monomial Permutation Polynomials over GF(2<sup>p</sup>).
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
Microprocess. Microsystems, 2020
J. Syst. Sci. Complex., 2020
Composition of Boolean functions: An application to the secondary constructions of bent functions.
Discret. Math., 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
IEEE Trans. Inf. Theory, 2019
J. Syst. Sci. Complex., 2019
On the Linear Complexity of Binary Generalized Cyclotomic Sequences of Period 2<i>p</i><sup><i>m</i>+1</sup><i>q</i><sup><i>n</i>+1</sup>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Finite Fields Their Appl., 2019
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity.
Des. Codes Cryptogr., 2019
Des. Codes Cryptogr., 2019
A recursive construction of permutation polynomials over F<sub>q<sup>2</sup></sub> with odd characteristic related to Rédei functions.
Des. Codes Cryptogr., 2019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019
Comput. J., 2019
Sci. China Inf. Sci., 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains.
Proceedings of the Codes, Cryptology and Information Security, 2019
2018
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
IET Inf. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
Des. Codes Cryptogr., 2018
Sci. China Inf. Sci., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Advances in Information and Computer Security, 2018
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP.
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IEEE Trans. Inf. Theory, 2017
Theor. Comput. Sci., 2017
J. Syst. Sci. Complex., 2017
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks.
Inf. Sci., 2017
IET Inf. Secur., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
A Recursive Construction of Permutation Polynomials over F<sub>q<sup>2</sup></sub> with Odd Characteristic from Rédei Functions.
CoRR, 2017
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers.
Sci. China Inf. Sci., 2017
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications.
Cryptogr. Commun., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
IEEE Trans. Commun., 2016
Secur. Commun. Networks, 2016
On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra.
J. Syst. Sci. Complex., 2016
Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers.
J. Complex., 2016
IACR Cryptol. ePrint Arch., 2016
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2016
An Algorithm for Counting the Number of 2<sup>n</sup>-Periodic Binary Sequences with Fixed k-Error Linear Complexity.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Classifying and generating exact coset representatives of PGL<sub>2</sub>(F<sub>q</sub>) in PGL<sub>2</sub>(F<sub>q<sup>2</sup></sub>).
Finite Fields Their Appl., 2016
Finite Fields Their Appl., 2016
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour.
Des. Codes Cryptogr., 2016
Cryptogr. Commun., 2016
Cryptogr. Commun., 2016
Cryptogr. Commun., 2016
The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity.
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the IEEE International Conference on Multimedia and Expo, 2016
Proceedings of the IEEE International Conference on Information and Automation, 2016
The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IEEE Trans. Inf. Theory, 2015
Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle.
J. Comput. Sci. Technol., 2015
J. Comput. Syst. Sci., 2015
J. Complex., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers.
IACR Cryptol. ePrint Arch., 2015
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers.
IACR Cryptol. ePrint Arch., 2015
On constructing complete permutation polynomials over finite fields of even characteristic.
Discret. Appl. Math., 2015
Sci. China Inf. Sci., 2015
On implementing signature-based Gröbner basis algorithms using linear algebraic routines from M4RI.
ACM Commun. Comput. Algebra, 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
Constructing Boolean functions with (potentially) optimal algebraic immunity based on multiplicative decompositions of finite fields.
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract).
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers.
IEEE Trans. Inf. Theory, 2014
Int. J. Softw. Informatics, 2014
Minimum Linear Complexity Approximation of Sequences with Period <i>q<sup>n</sup></i>-1 over F<sub><i>q</i></sub>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Generalized Fourier Transform and the Joint <i>N</i>-Adic Complexity of a Multisequence.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms.
IACR Cryptol. ePrint Arch., 2014
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation.
IACR Cryptol. ePrint Arch., 2014
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks.
Discret. Appl. Math., 2014
Constructing Boolean Functions With Potential Optimal Algebraic Immunity Based on Additive Decompositions of Finite Fields.
CoRR, 2014
CoRR, 2014
On the distinctness of binary sequences derived from $2$-adic expansion of m-sequences over finite prime fields.
CoRR, 2014
Comput. J., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract).
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
J. Math. Cryptol., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the IJCAI 2013, 2013
Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Finite Fields Their Appl., 2012
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
IEEE Trans. Inf. Theory, 2011
IACR Cryptol. ePrint Arch., 2011
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables.
Proceedings of the Information Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the Topics in Cryptology, 2010
2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Computer Science, 2009
2008
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine.
Int. J. Netw. Secur., 2008
IET Inf. Secur., 2008
2007
IACR Cryptol. ePrint Arch., 2007
Sci. China Ser. F Inf. Sci., 2007
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability.
Proceedings of the Advances in Cryptology, 2007
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Int. J. Netw. Secur., 2006
Int. J. Netw. Secur., 2006
IEEE Commun. Lett., 2006
IACR Cryptol. ePrint Arch., 2006
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Comput. Secur., 2005
Proceedings of the 2005 International Conference on Semantics, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Sci. China Ser. F Inf. Sci., 2004
Survey of Security in Grid Services.
Proceedings of the Fourth International Conference on Electronic Business, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
2001
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001
1999
1993
Proceedings of the 1993 International Symposium on Symbolic and Algebraic Computation, 1993
1988