The SCEAS System
Navigation Menu

Search the dblp DataBase


Dongdai Lin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dayin Wang, Dongdai Lin, Wenling Wu
    An Improved Poly1305 MAC. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:284-292 [Conf]
  2. Tianjie Cao, Dongdai Lin, Rui Xue
    An Efficient ID-Based Deniable Authentication Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:388-391 [Conf]
  3. Tianjie Cao, Dongdai Lin, Rui Xue
    ID-Based Ring Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:591-596 [Conf]
  4. Tianjie Cao, Dongdai Lin, Rui Xue
    Security Analysis of User Efficient Blind Signatures. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:167-172 [Conf]
  5. Tianjie Cao, Dongdai Lin, Rui Xue
    Improved Privacy-Protecting Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:208-213 [Conf]
  6. Sujing Zhou, Dongdai Lin
    Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:126-143 [Conf]
  7. Tianjie Cao, Dongdai Lin, Rui Xue
    Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1036-1041 [Conf]
  8. Dayin Wang, Dongdai Lin, Wenling Wu
    A Variant of Poly1305 MAC and Its Security Proof. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:375-380 [Conf]
  9. Sujing Zhou, Dongdai Lin
    On Anonymity of Group Signatures. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:131-136 [Conf]
  10. Tianjie Cao, Dongdai Lin
    Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:233-241 [Conf]
  11. Dayin Wang, Dongdai Lin, Wenling Wu
    OPMAC: One-Key Poly1305 MAC. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:78-87 [Conf]
  12. Dongdai Lin, Mulan Liu
    Linear Recurring m-Arrays. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:351-357 [Conf]
  13. Yongwei Wu, Guangwen Yang, Weimin Zheng, Dongdai Lin
    DisCAS: A Distributed-Parallel Computer Algebra System. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:295-302 [Conf]
  14. Jianfang Xiao, Dongdai Lin
    Survey of Security in Grid Services. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:1241-1245 [Conf]
  15. Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng
    A Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:964-971 [Conf]
  16. Tianjie Cao, Xianping Mao, Dongdai Lin
    Security Analysis of a Server-Aided RSA Key Generation Protocol. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:314-320 [Conf]
  17. Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
    Integrating Grid with Cryptographic Computing. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:321-331 [Conf]
  18. Dongdai Lin, Zhuojun Liu
    Some Results on Theorem Proving in Geometry over Finite Fields. [Citation Graph (0, 0)][DBLP]
    ISSAC, 1993, pp:292-300 [Conf]
  19. Paul S. Wang, Simon Gray, Norbert Kajler, Dongdai Lin, Weidong Liao, Xiao Zou
    IAMC architecture and prototyping: a progress report. [Citation Graph (0, 0)][DBLP]
    ISSAC, 2001, pp:337-344 [Conf]
  20. Zhonghua Jiang, Lin Xu, Lei Lin, Dayin Wang, Dongdai Lin
    A Distributed Cryptographic Computing System. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:115- [Conf]
  21. Tianjie Cao, Dongdai Lin, Rui Xue
    A randomized RSA-based partially blind signature scheme for electronic cash. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:44-49 [Journal]
  22. Dongdai Lin, Mulan Liu
    The Equivalence Classes of LR Arrays. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1993, v:43, n:1, pp:47-61 [Journal]
  23. Dongdai Lin, Mulan Liu
    Structure and properties of linear recurring m-arrays. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:5, pp:1758-0 [Journal]
  24. Yi Deng, Dongdai Lin
    Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:148-168 [Conf]
  25. Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
    Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  26. Yi Deng, Dongdai Lin
    Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  27. Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. [Citation Graph (, )][DBLP]

  28. Unlinkable Randomizable Signature and Its Application in Group Signature. [Citation Graph (, )][DBLP]

  29. Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. [Citation Graph (, )][DBLP]

  30. Refinement of Miller's Algorithm Over Edwards Curves. [Citation Graph (, )][DBLP]

  31. Accelerating Inverse of GF(2n) with Precomputation. [Citation Graph (, )][DBLP]

  32. Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge. [Citation Graph (, )][DBLP]

  33. A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. [Citation Graph (, )][DBLP]

  34. Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions [Citation Graph (, )][DBLP]

Search in 0.015secs, Finished in 0.016secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002