Search Results - "Lin, DongDai"

Refine Results
  1. 1

    On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure by Zhong, Jianghua, Lin, Dongdai

    Published in IEEE transactions on information theory (01-09-2018)
    “…Grain is one of three hardware-oriented finalists of the eSTREAM Project. A nonlinear feedback shift register (NFSR) in Grain-like structure is a cascade…”
    Get full text
    Journal Article
  2. 2

    Driven Stability of Nonlinear Feedback Shift Registers With Inputs by Zhong, Jianghua, Lin, Dongdai

    Published in IEEE transactions on communications (01-06-2016)
    “…Driven stable nonlinear feedback shift registers (NFSRs) with inputs are not only able to limit error propagations in convolutional decoders, but also helpful…”
    Get full text
    Journal Article
  3. 3

    Properties of the cycles that contain all vectors of weight ≤k by Li, Ming, Jiang, Yupeng, Lin, Dongdai

    Published in Designs, codes, and cryptography (2023)
    “…We study the sequences whose one period contains all the n -binary vectors of Hamming weight ≤ k exactly once. It is well known that such sequences exist for…”
    Get full text
    Journal Article
  4. 4

    RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms by Zhang, WenTao, Bao, ZhenZhen, Lin, DongDai, Rijmen, Vincent, Yang, BoHan, Verbauwhede, Ingrid

    Published in Science China. Information sciences (01-12-2015)
    “…In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast…”
    Get full text
    Journal Article
  5. 5

    The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials by Li, Ming, Lin, Dongdai

    Published in IEEE transactions on information theory (01-02-2017)
    “…We consider the adjacency graphs of the linear feedback shift registers (LFSRs) with characteristic polynomials of the form l(x)p(x), where l(x) is a…”
    Get full text
    Journal Article
  6. 6

    On prefer-one sequences by Jiang, Yupeng, Li, Ming, Gao, Ying, Lin, Dongdai

    Published in Designs, codes, and cryptography (01-10-2024)
    “…We study the sequences generated by prefer-one rule with different initial vectors. Firstly, we give upper bounds of their periods and for initial vectors with…”
    Get full text
    Journal Article
  7. 7

    Robust Face Clustering Via Tensor Decomposition by Cao, Xiaochun, Wei, Xingxing, Han, Yahong, Lin, Dongdai

    Published in IEEE transactions on cybernetics (01-11-2015)
    “…Face clustering is a key component either in image managements or video analysis. Wild human faces vary with the poses, expressions, and illumination changes…”
    Get full text
    Journal Article
  8. 8

    Generalized Hamming Weights of Irreducible Cyclic Codes by Yang, Minghui, Li, Jin, Feng, Keqin, Lin, Dongdai

    Published in IEEE transactions on information theory (01-09-2015)
    “…The generalized Hamming weights d r (C) of a linear code C are a natural generalization of the minimum Hamming distance d(C)[=d 1 (C)] and have become an…”
    Get full text
    Journal Article
  9. 9

    Longest subsequences shared by two de Bruijn sequences by Jiang, Yupeng, Lin, Dongdai

    Published in Designs, codes, and cryptography (01-07-2020)
    “…An order n binary de Bruijn sequence is a periodic sequence of bits with period 2 n in which each n -tuple of bits occurs exactly once. We consider the longest…”
    Get full text
    Journal Article
  10. 10

    Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers by Li, Zhengnan, Wu, Baofeng, Lin, Dongdai

    Published in Journal of systems science and complexity (01-12-2023)
    “…Motivated by applications in advanced cryptographic protocols, research on arithmetization-oriented symmetric primitives has been rising in the field of…”
    Get full text
    Journal Article
  11. 11

    Analyzing Boolean Functions via Solving Parametric Polynomial Systems by Huang, Zhenyu, Sun, Yao, Lin, Dongdai

    Published in Journal of systems science and complexity (01-04-2021)
    “…In this paper, a new method to analyze Boolean functions is proposed. By this method, one can analyze the balancedness, the nonlinearity, and the input-output…”
    Get full text
    Journal Article
  12. 12

    Stability of nonlinear feedback shift registers by Zhong, Jianghua, Lin, Dongdai

    Published in Science China. Information sciences (01-01-2016)
    “…Convolutional codes have been widely used in many applications such as digital video, radio, and mobile communication. Nonlinear feedback shift registers…”
    Get full text
    Journal Article
  13. 13

    Survey on cyberspace security by Zhang, HuanGuo, Han, WenBao, Lai, XueJia, Lin, DongDai, Ma, JianFeng, Li, JianHua

    Published in Science China. Information sciences (01-11-2015)
    “…Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and…”
    Get full text
    Journal Article
  14. 14

    Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions by Liu, Meicheng, Lin, Dongdai, Pei, Dingyi

    Published in IEEE transactions on information theory (01-07-2011)
    “…In this correspondence, first we give a decomposition of symmetric Boolean functions, then we show that almost all symmetric Boolean functions, including these…”
    Get full text
    Journal Article
  15. 15

    A New Upper Bound on the Order of Affine Sub-families of NFSRs by Liu, Junying, Zheng, Qunxiong, Lin, Dongdai

    Published in Journal of systems science and complexity (01-02-2020)
    “…Nonlinear feedback shift registers (NFSRs) are widely used as building blocks in the design of stream ciphers. Let NFSR( f ) be an NFSR with the characteristic…”
    Get full text
    Journal Article
  16. 16

    Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate by Xu, Luyao, Dai, Zhengyi, Wu, Baofeng, Lin, Dongdai

    “…Lattice reduction algorithms have been proved to be one of the most powerful and versatile tools in public key cryptanalysis. In this work, we primarily…”
    Get full text
    Journal Article
  17. 17

    A new construction of zero-difference balanced functions and two applications by Liu, Junying, Jiang, Yupeng, Zheng, Qunxiong, Lin, Dongdai

    Published in Designs, codes, and cryptography (01-10-2019)
    “…Zero-difference balanced (ZDB) functions are a generalization of perfect nonlinear functions, and have received a lot of attention due to their important…”
    Get full text
    Journal Article
  18. 18

    Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers by Wang, Xuzi, Wu, Baofeng, Hou, Lin, Lin, Dongdai

    Published in Cybersecurity (Singapore) (02-06-2021)
    “…In this paper, we greatly increase the number of impossible differentials for SIMON and SIMECK by eliminating the 1-bit constraint in input/output difference,…”
    Get full text
    Journal Article
  19. 19

    Generic constructions of integrated PKE and PEKS by Chen, Yu, Zhang, Jiang, Lin, Dongdai, Zhang, Zhenfeng

    Published in Designs, codes, and cryptography (01-02-2016)
    “…In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes (PKE–PEKS as…”
    Get full text
    Journal Article
  20. 20

    Improved conditional differential attacks on lightweight hash family QUARK by Lu, Xiaojuan, Li, Bohan, Liu, Meicheng, Lin, Dongdai

    Published in Cybersecurity (Singapore) (02-06-2022)
    “…Nonlinear feedback shift register (NFSR) is one of the most important cryptographic primitives in lightweight cryptography. At ASIACRYPT 2010, Knellwolf et al…”
    Get full text
    Journal Article