Search the dblp DataBase
Dongdai Lin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dayin Wang , Dongdai Lin , Wenling Wu An Improved Poly1305 MAC. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:284-292 [Conf ] Tianjie Cao , Dongdai Lin , Rui Xue An Efficient ID-Based Deniable Authentication Protocol from Pairings. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:388-391 [Conf ] Tianjie Cao , Dongdai Lin , Rui Xue ID-Based Ring Authenticated Encryption. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:591-596 [Conf ] Tianjie Cao , Dongdai Lin , Rui Xue Security Analysis of User Efficient Blind Signatures. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:167-172 [Conf ] Tianjie Cao , Dongdai Lin , Rui Xue Improved Privacy-Protecting Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:208-213 [Conf ] Sujing Zhou , Dongdai Lin Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] CANS, 2006, pp:126-143 [Conf ] Tianjie Cao , Dongdai Lin , Rui Xue Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:1036-1041 [Conf ] Dayin Wang , Dongdai Lin , Wenling Wu A Variant of Poly1305 MAC and Its Security Proof. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:375-380 [Conf ] Sujing Zhou , Dongdai Lin On Anonymity of Group Signatures. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:131-136 [Conf ] Tianjie Cao , Dongdai Lin Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:233-241 [Conf ] Dayin Wang , Dongdai Lin , Wenling Wu OPMAC: One-Key Poly1305 MAC. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:78-87 [Conf ] Dongdai Lin , Mulan Liu Linear Recurring m-Arrays. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:351-357 [Conf ] Yongwei Wu , Guangwen Yang , Weimin Zheng , Dongdai Lin DisCAS: A Distributed-Parallel Computer Algebra System. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:295-302 [Conf ] Jianfang Xiao , Dongdai Lin Survey of Security in Grid Services. [Citation Graph (0, 0)][DBLP ] ICEB, 2004, pp:1241-1245 [Conf ] Haipeng Qu , Purui Su , Dongdai Lin , Dengguo Feng A Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:964-971 [Conf ] Tianjie Cao , Xianping Mao , Dongdai Lin Security Analysis of a Server-Aided RSA Key Generation Protocol. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:314-320 [Conf ] Zhonghua Jiang , Dongdai Lin , Lin Xu , Lei Lin Integrating Grid with Cryptographic Computing. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:321-331 [Conf ] Dongdai Lin , Zhuojun Liu Some Results on Theorem Proving in Geometry over Finite Fields. [Citation Graph (0, 0)][DBLP ] ISSAC, 1993, pp:292-300 [Conf ] Paul S. Wang , Simon Gray , Norbert Kajler , Dongdai Lin , Weidong Liao , Xiao Zou IAMC architecture and prototyping: a progress report. [Citation Graph (0, 0)][DBLP ] ISSAC, 2001, pp:337-344 [Conf ] Zhonghua Jiang , Lin Xu , Lei Lin , Dayin Wang , Dongdai Lin A Distributed Cryptographic Computing System. [Citation Graph (0, 0)][DBLP ] SKG, 2005, pp:115- [Conf ] Tianjie Cao , Dongdai Lin , Rui Xue A randomized RSA-based partially blind signature scheme for electronic cash. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:1, pp:44-49 [Journal ] Dongdai Lin , Mulan Liu The Equivalence Classes of LR Arrays. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1993, v:43, n:1, pp:47-61 [Journal ] Dongdai Lin , Mulan Liu Structure and properties of linear recurring m-arrays. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1993, v:39, n:5, pp:1758-0 [Journal ] Yi Deng , Dongdai Lin Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:148-168 [Conf ] Yi Deng , Giovanni Di Crescenzo , Dongdai Lin Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Yi Deng , Dongdai Lin Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. [Citation Graph (, )][DBLP ] Unlinkable Randomizable Signature and Its Application in Group Signature. [Citation Graph (, )][DBLP ] Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. [Citation Graph (, )][DBLP ] Refinement of Miller's Algorithm Over Edwards Curves. [Citation Graph (, )][DBLP ] Accelerating Inverse of GF (2n ) with Precomputation. [Citation Graph (, )][DBLP ] Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge. [Citation Graph (, )][DBLP ] A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. [Citation Graph (, )][DBLP ] Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.301secs