Lin Ding

Orcid: 0000-0003-1482-1750

Affiliations:
  • Zhengzhou Information Science and Technology Institute, China


According to our database1, Lin Ding authored at least 33 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Breaking the DECT Standard Cipher With Lower Time Cost.
IEEE Trans. Computers, May, 2024

Quantum Guess and Determine Attack on Stream Ciphers.
Comput. J., January, 2024

New Practical Attacks on GEA-1 Based on a New-Found Weakness.
IET Inf. Secur., 2024

Breaking GEA-Like Stream Ciphers with Lower Time Cost.
Proceedings of the Information Security Practice and Experience, 2024

2023
A General Correlation Evaluation Model on LFSR-Based Stream Ciphers.
IEEE Trans. Inf. Theory, October, 2023

2022
New Attacks on the GPRS Encryption Algorithms GEA-1 and GEA-2.
IEEE Trans. Inf. Forensics Secur., 2022

(Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher.
Symmetry, 2022

A Correlation Attack on Full SNOW-V and SNOW-Vi.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks.
J. Inf. Secur. Appl., 2021

A Correlation Attack on Full SNOW-V and SNOW-Vi.
IACR Cryptol. ePrint Arch., 2021

Improved Guess and Determine attack on the MASHA stream cipher.
Sci. China Inf. Sci., 2021

New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
A New General Method of Searching for Cubes in Cube Attacks.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes.
IACR Trans. Symmetric Cryptol., 2019

Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping.
Secur. Commun. Networks, 2019

Improved Related-Cipher Attack on Salsa20 Stream Cipher.
IEEE Access, 2019

Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

New Key Recovery Attack on the MICKEY Family of Stream Ciphers.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2018
On Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSR.
Int. J. Found. Comput. Sci., 2018

2015
Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting.
Pervasive Mob. Comput., 2015

Cryptanalysis of WG Family of Stream Ciphers.
Comput. J., 2015

New Related Key Attacks on the RAKAPOSHI Stream Cipher.
Proceedings of the Information Security Practice and Experience, 2015

2014
Cryptanalysis of Lightweight WG-8 Stream Cipher.
IEEE Trans. Inf. Forensics Secur., 2014

Cryptanalysis of Loiss Stream Cipher-Revisited.
J. Appl. Math., 2014

New Treatment of the BSW Sampling and Its Applications to Stream Ciphers.
IACR Cryptol. ePrint Arch., 2014

2013
Related Key Chosen IV Attack on Grain-128a Stream Cipher.
IEEE Trans. Inf. Forensics Secur., 2013

Cryptanalysis of MICKEY family of stream ciphers.
Secur. Commun. Networks, 2013

2012
Related key chosen IV attacks on Decim v2 and Decim-128.
Math. Comput. Model., 2012

New Results of Related-key Attacks on All Py-Family of Stream Ciphers.
J. Univers. Comput. Sci., 2012

Real Time Related Key Attack on Hummingbird-2.
KSII Trans. Internet Inf. Syst., 2012

Cryptanalysis of RAKAPOSHI Stream Cipher.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of Loiss Stream Cipher.
Comput. J., 2012

2009
Guess and Determine Attack on SOSEMANUK.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...