Search Results - "Lin, DongDai"
-
1
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure
Published in IEEE transactions on information theory (01-09-2018)“…Grain is one of three hardware-oriented finalists of the eSTREAM Project. A nonlinear feedback shift register (NFSR) in Grain-like structure is a cascade…”
Get full text
Journal Article -
2
Driven Stability of Nonlinear Feedback Shift Registers With Inputs
Published in IEEE transactions on communications (01-06-2016)“…Driven stable nonlinear feedback shift registers (NFSRs) with inputs are not only able to limit error propagations in convolutional decoders, but also helpful…”
Get full text
Journal Article -
3
Properties of the cycles that contain all vectors of weight ≤k
Published in Designs, codes, and cryptography (2023)“…We study the sequences whose one period contains all the n -binary vectors of Hamming weight ≤ k exactly once. It is well known that such sequences exist for…”
Get full text
Journal Article -
4
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
Published in Science China. Information sciences (01-12-2015)“…In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast…”
Get full text
Journal Article -
5
The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials
Published in IEEE transactions on information theory (01-02-2017)“…We consider the adjacency graphs of the linear feedback shift registers (LFSRs) with characteristic polynomials of the form l(x)p(x), where l(x) is a…”
Get full text
Journal Article -
6
On prefer-one sequences
Published in Designs, codes, and cryptography (01-10-2024)“…We study the sequences generated by prefer-one rule with different initial vectors. Firstly, we give upper bounds of their periods and for initial vectors with…”
Get full text
Journal Article -
7
Robust Face Clustering Via Tensor Decomposition
Published in IEEE transactions on cybernetics (01-11-2015)“…Face clustering is a key component either in image managements or video analysis. Wild human faces vary with the poses, expressions, and illumination changes…”
Get full text
Journal Article -
8
Generalized Hamming Weights of Irreducible Cyclic Codes
Published in IEEE transactions on information theory (01-09-2015)“…The generalized Hamming weights d r (C) of a linear code C are a natural generalization of the minimum Hamming distance d(C)[=d 1 (C)] and have become an…”
Get full text
Journal Article -
9
Longest subsequences shared by two de Bruijn sequences
Published in Designs, codes, and cryptography (01-07-2020)“…An order n binary de Bruijn sequence is a periodic sequence of bits with period 2 n in which each n -tuple of bits occurs exactly once. We consider the longest…”
Get full text
Journal Article -
10
Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers
Published in Journal of systems science and complexity (01-12-2023)“…Motivated by applications in advanced cryptographic protocols, research on arithmetization-oriented symmetric primitives has been rising in the field of…”
Get full text
Journal Article -
11
Analyzing Boolean Functions via Solving Parametric Polynomial Systems
Published in Journal of systems science and complexity (01-04-2021)“…In this paper, a new method to analyze Boolean functions is proposed. By this method, one can analyze the balancedness, the nonlinearity, and the input-output…”
Get full text
Journal Article -
12
Stability of nonlinear feedback shift registers
Published in Science China. Information sciences (01-01-2016)“…Convolutional codes have been widely used in many applications such as digital video, radio, and mobile communication. Nonlinear feedback shift registers…”
Get full text
Journal Article -
13
Survey on cyberspace security
Published in Science China. Information sciences (01-11-2015)“…Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and…”
Get full text
Journal Article -
14
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
Published in IEEE transactions on information theory (01-07-2011)“…In this correspondence, first we give a decomposition of symmetric Boolean functions, then we show that almost all symmetric Boolean functions, including these…”
Get full text
Journal Article -
15
A New Upper Bound on the Order of Affine Sub-families of NFSRs
Published in Journal of systems science and complexity (01-02-2020)“…Nonlinear feedback shift registers (NFSRs) are widely used as building blocks in the design of stream ciphers. Let NFSR( f ) be an NFSR with the characteristic…”
Get full text
Journal Article -
16
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate
Published in IACR transactions on cryptographic hardware and embedded systems (06-03-2023)“…Lattice reduction algorithms have been proved to be one of the most powerful and versatile tools in public key cryptanalysis. In this work, we primarily…”
Get full text
Journal Article -
17
A new construction of zero-difference balanced functions and two applications
Published in Designs, codes, and cryptography (01-10-2019)“…Zero-difference balanced (ZDB) functions are a generalization of perfect nonlinear functions, and have received a lot of attention due to their important…”
Get full text
Journal Article -
18
Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
Published in Cybersecurity (Singapore) (02-06-2021)“…In this paper, we greatly increase the number of impossible differentials for SIMON and SIMECK by eliminating the 1-bit constraint in input/output difference,…”
Get full text
Journal Article -
19
Generic constructions of integrated PKE and PEKS
Published in Designs, codes, and cryptography (01-02-2016)“…In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes (PKE–PEKS as…”
Get full text
Journal Article -
20
Improved conditional differential attacks on lightweight hash family QUARK
Published in Cybersecurity (Singapore) (02-06-2022)“…Nonlinear feedback shift register (NFSR) is one of the most important cryptographic primitives in lightweight cryptography. At ASIACRYPT 2010, Knellwolf et al…”
Get full text
Journal Article