基本信息

林东岱 男 研究员 博导 信息工程研究所
信息安全国家重点实验室 主任
       
电子邮件:ddlin@iie.ac.cn
通信地址:北京市海淀区闵庄路甲89号中国科学院信息工程研究所
邮政编码:100093

研究领域

密码学、安全协议、网络与系统安全、分布式密码计算

招生信息

愿招基础良好、热爱信息安全事业,不怕吃苦、勤奋好学的本科生和硕士生攻读博士学位

招生专业
083900-网络空间安全
招生方向
密码学与安全协议
网络与系统安全

教育背景

1987-09--1990-06 中科院系统所 博士
1984-09--1987-07 中科院系统所 硕士
1980-09--1984-07 山东大学数学系 学士

工作经历

   
工作简历
2011-12--今 中国科学院信息工程研究所 研究员
2001-04--2011-11 中科院软件所 研究员
1990-07--2001-04 中科院系统所 助研/副研/研究员
社会兼职
2018-12-18-今,中国电子学会理事,
2018-12-01-今,《电子与信息学报》编委,
2018-08-01-今,中国保密协会常务理事,
2018-06-01-今,Cybersecurity杂志, 副主编
2017-10-01-今,中国密码学会数学专业委员会主任委员,
2016-01-01-今,《信息安全学报》编委,
2015-10-01-今,中国保密协会隐私保护专业委员会主任委员,
2015-01-01-今,《信息安全研究》编委,
2015-01-01-今,《信息网络安全》编委,
2014-07-01-今,《计算机研究与发展》编委,
2013-10-01-今,《密码学报》领域编委,
2013-01-01-今,《保密科学技术》编委,
2012-12-31-今,《Science China》编委,
2012-11-01-今,中国密码学会常务理事, 常务理事
2012-09-01-今,中国电子学会学家术工作委员会委员,
2012-04-30-2017-07-01,中国密码学会学术工作委员会副主任委员,

教授课程

应用密码学
代数学基础与有限域
代数基础与有限域

专利与奖励

   
奖励信息
(1) 中国科学院优秀研究生指导教师,部委级,2014
(2) 国家科技进步奖,二等奖,国家级,2011
(3) 朱李月华优秀教师奖,部委级,2008
(4) 密码科技进步奖,一等奖,部委级,2006

出版信息

主要从事信息安全、密码理论、安全协议等方面的研究工作,在IEEE Trans. IT、Discrete Applied Mathematics、Finite Fields and Their Applications、中国科学、欧洲密码学年会EUROCRYPT和亚洲密码学年会ASIACRYPT等国内外学术刊物和学术会议上发表学术论文200余篇,出版著作10部。先后参加或承担八五攀登计划、九五攀登预选项目,国家973项目、国家863项目、国家自然科学基金以及中科院先导专项等。曾获2006年国家密码科技进步一等奖,2009年中科院"朱李月华优秀教师"奖,2011年国家科技进步二等奖。1993年起享受政府特殊津贴。          

发表论文
[1] 李明, 林东岱. The Adjacency Graphs of FSRs with Affine Characteristic Functions. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2022, 68(1): 649-658, https://ieeexplore.ieee.org/document/9576698.
[2] Xu, Yaqi, Wu, Baofeng, Lin, Dongdai. New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey. The Computer Journal[J]. 2022, [3] Hou, Lin, Lin, Dongdai, Liu, Renzhang. Hierarchical group signature with verifier-local revocation revisited. SCIENCE CHINA-INFORMATION SCIENCESnull. 2022, 65(8): [4] Xu, Yaqi, Wu, Baofeng, Lin, Dongdai. Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX Ciphers with Applications to Chaskey. ICICS 2021null. 2021, [5] 王文浩, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Hongliang Tian, 林东岱. Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. IEEE Transactions on Dependable and Secure Computing (TDSC)[J]. 2021, [6] 王旭姿, 吴保峰, 侯林, 林东岱. SIMON算法相关密钥不可能差分特征搜索. 密码学报[J]. 2021, [7] Junying, Liu, Yupeng, Jiang, Qunxiong, Zheng, Dongdai, Lin. Nonsingularity of Feedback Shift Registers of Degree at Most Three over a Finite Field. CHINESE JOURNAL OF ELECTRONICS[J]. 2021, 30(2): 232-237, http://dx.doi.org/10.1049/cje.2021.01.009.
[8] Huang, Zhenyu, Sun, Yao, Lin, Dongdai. On the efficiency of solving Boolean polynomial systems with the characteristic set method. JOURNAL OF SYMBOLIC COMPUTATION[J]. 2021, 103: 66-94, http://dx.doi.org/10.1016/j.jsc.2019.11.001.
[9] Dongdai Lin. Differential-Linear Cryptanalysis of the Lightweight Crytographic Algorithm KNOT. Inscrypt 2021. 2021, [10] 李明, 林东岱. Construction of De Bruijn Sequences from l-sequences. 2021 IEEE International Symposium on Information Theorynull. 2021, [11] Dongdai Lin. Binary Sequences Derived from Monomial Permutation Polynomials over GF(2p). Inscrypt 2021. 2021, [12] Dongdai Lin. On the 4-Adic Complexity of Quaternary Sequences of Period $2p$ with Ideal Autocorrelation.. ISIT 2021. 2021, [13] Dongdai Lin. On Galois NFSRs with Terminal Bits. ISIT 2021. 2021, [14] Wang, Xuzi, Wu, Baofeng, Hou, Lin, Lin, Dongdai. Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers. Cybersecurity[J]. 2021, [15] Dongdai Lin. Differential-Linear Cryptanalysis from an Algebraic Perspective. CRYPTO 2021. 2021, [16] Li, Ming, Lin, Dongdai. Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2021, 67(10): 6940-6951, [17] Gao, Guangpu, Lin, Dongdai, Liu, Wenfen, Wang, Yongjuan. Composition of Boolean functions: An application to the secondary constructions of bent functions. DISCRETE MATHEMATICS[J]. 2020, 343(3): http://dx.doi.org/10.1016/j.disc.2019.111711.
[18] Jiang, Yupeng, Lin, Dongdai. Longest subsequences shared by two de Bruijn sequences. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2020, 88(7): 1463-1475, https://www.webofscience.com/wos/woscc/full-record/WOS:000528111600001.
[19] Liu, Junying, Zheng, Qunxiong, Lin, Dongdai. A New Upper Bound on the Order of Affine Sub-families of NFSRs. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2020, 33(1): 196-214, https://www.webofscience.com/wos/woscc/full-record/WOS:000520177000013.
[20] 李明, 林东岱. The Numbers of De Bruijn Sequences in Extremal Weight Classes. 2020 IEEE International Symposium on Information Theorynull. 2020, [21] Zhu, Yuqing, Wen, Jiejing, Zhuang, Jincheng, Lv, Chang, Lin, Dongdai. Refined analysis to the extended tower number field sieve. THEORETICAL COMPUTER SCIENCE[J]. 2020, 814: 49-68, http://dx.doi.org/10.1016/j.tcs.2020.01.010.
[22] Li, Bohan, Liu, Meicheng, Lin, Dongdai. FPGA implementations of Grain v1, Mickey 2.0, Trivium, Lizard and Plantlet. MICROPROCESSORS AND MICROSYSTEMS[J]. 2020, 78: http://dx.doi.org/10.1016/j.micpro.2020.103210.
[23] 李明, 林东岱. On the k-Error Linear Complexities of De Bruijn Sequences. INSCRYPT 2020: International Conference on Information Security and Cryptologynull. 2020, https://link.springer.com/chapter/10.1007/978-3-030-71852-7_23.
[24] Ma, Xuecheng, Lin, Dongdai. Server-aided Revocable IBE with Identity Reuse. COMPUTER JOURNAL[J]. 2020, 63(4): 620-632, https://www.webofscience.com/wos/woscc/full-record/WOS:000537437500009.
[25] 张国双, 陈晓, 林东岱, 刘凤梅. 基于Nonce重用的ACORN v3状态恢复攻击. 通信学报[J]. 2020, 41(8): 11-21, http://lib.cqvip.com/Qikan/Article/Detail?id=7102614030.
[26] Fu, Shihui, Feng, Xiutao, Lin, Dongdai, Wang, Qiang. A recursive construction of permutation polynomials over F-q2 with odd characteristic related to Redei functions. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2019, 87(7): 1481-1498, http://ir.amss.ac.cn/handle/2S8OKBNM/34795, http://www.irgrid.ac.cn/handle/1471x/6869775, http://ir.amss.ac.cn/handle/2S8OKBNM/34796, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000469019000002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=3a85505900f77cc629623c3f2907beab.
[27] Jianghua Zhong, Dongdai Lin. Decomposition of nonlinear feedback shift registers based on Boolean networks. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2019, 62(3): http://lib.cqvip.com/Qikan/Article/Detail?id=7001689522.
[28] Ma, Xuecheng, Lin, Dongdai, Lee, K. Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018)null. 2019, 11396: 69-84, [29] Haiyan Wang, Qiuzhen Lin, Jianyong Chen, Jianqiang Li, Jianghua Zhong, Dongdai Lin, Jia Wang, Lijia Ma. On stability of multi-valued nonlinear feedback shift registers. Complexity[J]. 2019, https://doaj.org/article/daf66cc2006841a38f21c436927f6983.
[30] Zhu, Yuqing, Zhuang, Jincheng, Yi, Hairong, Lv, Chang, Lin, Dongdai. A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2019, 87(5): 971-986, [31] Jianghua Zhong, Dongdai Lin. On equivalence of cascade connections of two nonlinear feedback shift registers. COMPUTER JOURNAL[J]. 2019, 62(12): 1793-1804, https://www.webofscience.com/wos/woscc/full-record/WOS:000506812400006.
[32] Wang, Anyu, Zhang, Zhifang, Lin, Dongdai. Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2019, 65(7): 4167-4179, http://ir.amss.ac.cn/handle/2S8OKBNM/35017, http://www.irgrid.ac.cn/handle/1471x/6869787, http://ir.amss.ac.cn/handle/2S8OKBNM/35018, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000472186800014&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=3a85505900f77cc629623c3f2907beab.
[33] Yang, Jingchun, Liu, Meicheng, Lin, Dongdai, Lin, Z, Papamanthou, C, Polychronakis, M. Cube Cryptanalysis of Round-Reduced ACORN. INFORMATION SECURITY, ISC 2019null. 2019, 11723: 44-64, [34] 贺铮, 张伟, 林东岱. 智能电网中无需可信第三方的隐私保护数据聚合方案. 信息安全研究. 2019, 5(12): 1059-1067, http://lib.cqvip.com/Qikan/Article/Detail?id=7100481268.
[35] Zhong Jianghua, Lin Dongdai. Decomposition of nonlinear feedback shift registers based on Boolean networks. Science China. Information Science[J]. 2019, 62(3): http://lib.cqvip.com/Qikan/Article/Detail?id=7001689522.
[36] Gao Guangpu, Lin Dongdai, Liu Wenfen. A Note on Rotation Symmetric S-boxes. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2019, 32(5): 1460-1472, http://lib.cqvip.com/Qikan/Article/Detail?id=88848987504849574853484952.
[37] Liu, Junying, Jiang, Yupeng, Zheng, Qunxiong, Lin, Dongdai. A new construction of zero-difference balanced functions and two applications. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2019, 87(10): 2251-2265, https://www.webofscience.com/wos/woscc/full-record/WOS:000484905900005.
[38] Yang, Minghui, Lin, Dongdai, Wang, Qiuyan, Gao, Jian. On the Linear Complexity of Binary Generalized Cyclotomic Sequences of Period 2pm+1qn+1. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2019, E102A(4): 676-679, https://www.webofscience.com/wos/woscc/full-record/WOS:000464919900009.
[39] Li Ting, Sun Yao, Huang Zhenyu, Wang Dingkang, Lin Dongdai. Speeding Up the GVW Algorithm via a Substituting Method. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2019, 32(1): 205-233, http://lib.cqvip.com/Qikan/Article/Detail?id=6100292587.
[40] Ma, Xuecheng, Wang, Xin, Lin, Dongdai, Susilo, W, Yang, G. Anonymous Identity-Based Encryption with Identity Recovery. INFORMATION SECURITY AND PRIVACYnull. 2018, 10946: 360-375, [41] Wang, Libo, Wu, Baofeng, Liu, Zhuojun, Lin, Dongdai. Three new infinite families of bent functions. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2018, 61(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000417486900003.
[42] Lin, Zhiqiang, Pei, Dingyi, Lin, Dongdai, Zhang, Xiaolei. Fast construction of binary ring FCSRs for hardware stream ciphers. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2018, 86(4): 939-953, https://www.webofscience.com/wos/woscc/full-record/WOS:000426715000013.
[43] Li, Fei, Wang, Qiuyan, Lin, Dongdai. A class of three-weight and five-weight linear codes. DISCRETE APPLIED MATHEMATICS[J]. 2018, 241: 25-38, http://dx.doi.org/10.1016/j.dam.2016.11.005.
[44] 朱玉清, 庄金成, 于伟, 林东岱. 特征p椭圆曲线上p-群的离散对数问题. 密码学报[J]. 2018, 5(4): 368-375, http://lib.cqvip.com/Qikan/Article/Detail?id=676189955.
[45] Chen Guoxing, Wang Wenhao, Chen Tianyu, Chen Sanchuan, Zhang Yinqian, Wang XiaoFeng, Lai TenHwang, Lin Dongdai, IEEE. Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP)null. 2018, 178-194, [46] Zhang, Kai, Guan, Jie, Hu, Bin, Lin, Dongdai. Security evaluation on Simeck against zero-correlation linear cryptanalysis. IET INFORMATION SECURITY[J]. 2018, 12(1): 87-93, https://www.webofscience.com/wos/woscc/full-record/WOS:000423720900011.
[47] Zheng HE, Kunpeng BAI, Dongdai LIN, Chuankun WU. Unification of identifiers in the Sea-Cloud system. 中国计算机科学前沿:英文版. 2018, 12(4): 749-762, http://lib.cqvip.com/Qikan/Article/Detail?id=675485879.
[48] He, Zheng, Bai, Kunpeng, Lin, Dongdai, Wu, Chuankun. Unification of identifiers in the Sea-Cloud system. FRONTIERS OF COMPUTER SCIENCE[J]. 2018, 12(4): 749-762, http://lib.cqvip.com/Qikan/Article/Detail?id=675485879.
[49] Yang Jingchun, Liu Meicheng, Lin Dongdai, Wang Wenhao, Inomata A, Yasuda K. Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018null. 2018, 11049: 244-261, [50] Wang, Xuzi, Wu, Baofeng, Hou, Lin, Lin, Dongdai, Chen, L, Manulis, M, Schneider, S. Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP. INFORMATION SECURITY (ISC 2018)null. 2018, 11060: 116-131, [51] Jiang, Yupeng, Lin, Dongdai. Lower and Upper Bounds on the Density of Irreducible NFSRs. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2018, 64(5): 3944-3952, https://www.webofscience.com/wos/woscc/full-record/WOS:000430747100042.
[52] Zhang Wei, Lin Dongdai, Zhang Hailong, Zhou Xiaojun, Gao Yiwen, IEEE. A Lightweight FourQ primitive on ARM Cortex-M0. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 699-704, [53] Zhang Wei, Lin Dongdai, Zhang Hailong, Zhou Xiaojun, Gao Yiwen, Chen Cong, IEEE. A Lightweight Multi-Precision Squaring on Embedded Processors for ECC. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 1014-1019, [54] Bai Jian, Li Ting, Sun Yao, Wang Dingkang, Lin Dongdai. The lightest 4×4 MDS matrices over GL(4,F2). 中国科学:信息科学(英文版)[J]. 2018, 61(11): 119102-1, http://lib.cqvip.com/Qikan/Article/Detail?id=6100051696.
[55] Wang, Libo, Wu, Baofeng, Liu, Zhuojun, Lin, Dongdai. Three new infinite families of bent functions. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2018, 61(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000417486900003.
[56] Jianghua Zhong, Dongdai Lin. On minimum period of nonlinear feedback shift registers in Grain-like structure. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2018, 64(9): 6429-6442, https://www.webofscience.com/wos/woscc/full-record/WOS:000442350500030.
[57] 马多贺, 李琼, 林东岱. 基于POF的网络窃听攻击移动目标防御方法. 通信学报[J]. 2018, 39(2): 73-87, http://lib.cqvip.com/Qikan/Article/Detail?id=674606823.
[58] Bai, Jian, Li, Ting, Sun, Yao, Wang, Dingkang, Lin, Dongdai. The lightest 4 x 4 MDS matrices over GL(4, F-2). SCIENCE CHINA-INFORMATION SCIENCES[J]. 2018, 61(11): https://www.webofscience.com/wos/woscc/full-record/WOS:000444841700001.
[59] He Zheng, Pan Shiran, Lin Dongdai, IEEE. PMDA: Privacy-Preserving Multi-Functional Data Aggregation without TTP in Smart Grid. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 1107-1114, [60] Li, Ming, Lin, Dongdai. De Bruijn Sequences, Adjacency Graphs, and Cyclotomy. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2018, 64(4): 2941-2952, https://www.webofscience.com/wos/woscc/full-record/WOS:000427858200013.
[61] Liu Meicheng, Yang Jingchun, Wang Wenhao, Lin Dongdai, Nielsen JB, Rijmen V. Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT IInull. 2018, 10821: 715-744, [62] Dongdai Lin. Hierarchical Group Signatures with Verifier-Local Revocation. ICICS 2018. 2018, [63] Zhang, Xiaojuan, Liu, Meicheng, Lin, Dongdai, Chen, L, Manulis, M, Schneider, S. Conditional Cube Searching and Applications on Trivium-Variant Ciphers. INFORMATION SECURITY (ISC 2018)null. 2018, 11060: 151-168, [64] Zhang, Xiaojuan, Feng, Xiutao, Lin, Dongdai. Fault Attack on ACORN v3. COMPUTER JOURNAL[J]. 2018, 61(8): 1166-1179, https://www.webofscience.com/wos/woscc/full-record/WOS:000441240300006.
[65] Liu, Meicheng, Lin, Dongdai. Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks. INFORMATION SCIENCES[J]. 2017, 421: 181-203, http://dx.doi.org/10.1016/j.ins.2017.08.097.
[66] Dongdai Lin. Solving polynomial systems with noise over F2. Theoretical Computer Sciences. 2017, [67] Jiang, Yupeng, Zheng, QunXiong, Lin, Dongdai. On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 60(5): https://www.webofscience.com/wos/woscc/full-record/WOS:000394528800007.
[68] Ren, Yawei, Liu, Feng, Guo, Teng, Feng, Rongquan, Lin, Dongdai. Cheating prevention visual cryptography scheme using Latin square. IET INFORMATION SECURITY[J]. 2017, 11(4): 211-219, https://www.webofscience.com/wos/woscc/full-record/WOS:000404112600006.
[69] Wang Anyu, Zhang Zhifang, Lin Dongdai, IEEE. Bounds and Constructions for Linear Locally Repairable Codes over Binary Fields. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)null. 2017, 2033-2037, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000430345202020.
[70] Wang, Qiuyan, Li, Fei, Ding, Kelan, Lin, Dongdai. Complete weight enumerators of two classes of linear codes. DISCRETE MATHEMATICS[J]. 2017, 340(3): 467-480, http://dx.doi.org/10.1016/j.disc.2016.09.003.
[71] Li, Ming, Jiang, Yupeng, Lin, Dongdai, Wang, Qiuyan. Transition Mappings between De Bruijn Sequences. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2017, E100A(5): 1254-1256, https://www.webofscience.com/wos/woscc/full-record/WOS:000400680400020.
[72] Zhang, Xiaojuan, Feng, Xiutao, Lin, Dongdai. Fault Attack on the Authenticated Cipher ACORN v2. SECURITY AND COMMUNICATION NETWORKS[J]. 2017, https://doaj.org/article/ed77fb398ca44695a4df029611087291.
[73] Jiang, Yupeng, Lin, Dongdai. On affine sub-families of Grain-like structures. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 82(3): 531-542, https://www.webofscience.com/wos/woscc/full-record/WOS:000393757300002.
[74] Huang, Zhenyu, Lin, Dongdai. Solving polynomial systems with noise over F-2: Revisited. THEORETICAL COMPUTER SCIENCE[J]. 2017, 676: 52-68, https://www.webofscience.com/wos/woscc/full-record/WOS:000401399800005.
[75] Wang, Qiuyan, Ding, Kelan, Lin, Dongdai, Xue, Rui. A kind of three-weight linear codes. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2017, 9(3): 315-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000396435500001.
[76] Li, Ming, Jiang, Yupeng, Lin, Dongdai. The adjacency graphs of some feedback shift registers. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 82(3): 695-713, https://www.webofscience.com/wos/woscc/full-record/WOS:000393757300012.
[77] Jiang, Yupeng, Zheng, QunXiong, Lin, Dongdai. On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 60(5): https://www.webofscience.com/wos/woscc/full-record/WOS:000394528800007.
[78] Wang Haiyan, Zhong Jianghua, Lin Dongdai. Linearization of Multi-Valued Nonlinear Feedback Shift Registers. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2017, 30(2): 494-509, https://www.webofscience.com/wos/woscc/full-record/WOS:000397332200015.
[79] Zhenyu Huang, Dongdai Lin. Solving polynomial systems with noise over formula omitted: Revisited. Theoretical Computer Science. 2017, 676: 52-68, http://dx.doi.org/10.1016/j.tcs.2017.03.005.
[80] Li, Ming, Lin, Dongdai. The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2017, 63(2): 1325-1335, https://www.webofscience.com/wos/woscc/full-record/WOS:000394667700032.
[81] Zhang Wei, Lin Dongdai, Zhang Hailong, Chen Cong, Zhou Xiaojun, IEEE. A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMSnull. 2017, 170-176, [82] 庄金成, 林东岱, 吕昌. 确定广义Reed-Solomon码的深洞树及其应用. 中国科学:数学[J]. 2017, 47(11): 1615-1620, http://lib.cqvip.com/Qikan/Article/Detail?id=674009403.
[83] Yi Wentan, Wu Baofeng, Chen Shaozhen, Lin Dongdai. Improved Integral and Zero-correlation Linear Cryptanalysis of Clefia block cipher. Proceeding of 2016 International Conference on Information Security and Cryptology[J]. 2016, [84] 张焕国, 韩文报, 来学嘉, 林东岱, 马建峰, 李建华. 网络空间安全综述. 中国科学. 信息科学[J]. 2016, 46(2): 125-163, [85] Sun Yao, Huang Zhenyu, Lin Dongdai, Wang Dingkang. onimplementingthesymbolicpreprocessingfunctionoverbooleanpolynomialringsingrobnerbasisalgorithmsusinglinearalgebra. journalofsystemsscienceandcomplexity[J]. 2016, 29(3): 789-, http://ir.amss.ac.cn/handle/2S8OKBNM/40482, http://www.irgrid.ac.cn/handle/1471x/6870171, http://ir.amss.ac.cn/handle/2S8OKBNM/40483.
[86] Wang, Mingxing, Jiang, Yupeng, Lin, Dongdai. Further results on the nonlinearity of maximum-length NFSR feedbacks. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2016, 8(1): 1-6, https://www.webofscience.com/wos/woscc/full-record/WOS:000377604400001.
[87] Dongdai Lin. The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. ISPEC 2016. 2016, [88] Zhu, Yuqing, Zhuang, Jincheng, Lv, Chang, Lin, Dongdai. Classifying and generating exact coset representatives of PGL(2)(F-q) in PGL(2)(F-q2). FINITE FIELDS AND THEIR APPLICATIONS[J]. 2016, 42: 118-127, http://www.corc.org.cn/handle/1471x/2375023.
[89] Sun Yao, Huang Zhenyu, Lin Dongdai, Wang Dingkang. On Implementing the Symbolic Preprocessing Function over Boolean Polynomial Rings in Grobner Basis Algorithms Using Linear Algebra. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY[J]. 2016, 29(3): 789-804, http://ir.amss.ac.cn/handle/2S8OKBNM/40482, http://www.irgrid.ac.cn/handle/1471x/6870171, http://ir.amss.ac.cn/handle/2S8OKBNM/40483.
[90] Wang, Haiyan, Zhong, Jianghua, Lin, Dongdai, IEEE. Stability of Multi-valued Nonlinear Feedback Shift Registers. 2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA)null. 2016, 1764-1769, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000405519500316.
[91] Wang, Qiuyan, Jiang, Yupeng, Lin, Dongdai. Linear complexity of Ding-Helleseth sequences of order 2 over GF(l). CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2016, 8(1): 33-49, [92] Dongdai Lin. The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. ICICS 2016. 2016, [93] Xiang Zejun, Zhang Wentao, Bao Zhenzhen, Lin Dongdai, Cheon JH, Takagi T. Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT Inull. 2016, 10031: 648-678, [94] 孟小峰, 林东岱. 数据开放与隐私管理专题前言. 软件学报[J]. 2016, 1889-1890, http://lib.cqvip.com/Qikan/Article/Detail?id=669734260.
[95] 陈凯, 许海铭, 徐震, 林东岱, 刘勇. 适用于移动云计算的抗中间人攻击的SSP方案. 电子学报[J]. 2016, 44(8): 1806-1813, http://lib.cqvip.com/Qikan/Article/Detail?id=670495346.
[96] Xiang Zejun, Zhang Wentao, Lin Dongdai, Ogawa K, Yoshioka K. On the Division Property of SIMON48 and SIMON64. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016null. 2016, 9836: 147-163, [97] Chen, Yu, Zhang, Jiang, Lin, Dongdai, Zhang, Zhenfeng. Generic constructions of integrated PKE and PEKS. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2016, 78(2): 493-526, https://www.webofscience.com/wos/woscc/full-record/WOS:000370137800008.
[98] Wang, Qiuyan, Lin, Dongdai. Generalized cyclotomic numbers of order two and their applications. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2016, 8(4): 605-616, http://www.corc.org.cn/handle/1471x/2375066.
[99] Chen, Yu, Zhang, Zongyang, Lin, Dongdai, Cao, Zhenfu. Generalized (identity-based) hash proof system and its applications. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(12): 1698-1716, https://www.webofscience.com/wos/woscc/full-record/WOS:000380004400006.
[100] Guo, Chun, Lin, Dongdai. Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2016, 81(1): 109-129, http://www.corc.org.cn/handle/1471x/2374361.
[101] Dongdai Lin. Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework. Inscrypt 2016. 2016, [102] Sun, Yao, Huang, Zhenyu, Wang, Dingkang, Lin, Dongdai. An improvement over the GVW algorithm for inhomogeneous polynomial systems. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2016, 41: 174-192, https://www.webofscience.com/wos/woscc/full-record/WOS:000381062900012.
[103] Jianghua Zhong, Dongdai Lin. Driven stability of nonlinear feedback shift registers with inputs. IEEE TRANSACTIONS ON COMMUNICATIONS[J]. 2016, 64(6): 2274-2284, https://www.webofscience.com/wos/woscc/full-record/WOS:000384303400003.
[104] Zhong, Jianghua, Lin, Dongdai. Stability of nonlinear feedback shift registers. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2016, 59(1): https://www.webofscience.com/wos/woscc/full-record/WOS:000368314000017.
[105] 章睿, 薛锐, 林东岱. 海云安全体系架构. 中国科学. 信息科学[J]. 2015, 45(6): 796-816, [106] Dongdai Lin. Solving Linear Equations Modulo Unknown Divisors: Revisited. Asiacrypt (Lecture Notes in Computer Science). 2015, [107] Zhang WenTao, Bao ZhenZhen, Lin DongDai, Rijmen, Vincent, Yang BoHan, Verbauwhede, Ingrid. RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 58(12): https://www.webofscience.com/wos/woscc/full-record/WOS:000368790400012.
[108] Lin, Zhiqiang, Ke, Lishan, Lin, Dongdai, Gao, Jian. On the LFSRization of a Class of FCSR Automata. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2015, E98A(1): 434-440, https://www.webofscience.com/wos/woscc/full-record/WOS:000359464100048.
[109] Jianghua Zhong, Dongdai Lin. A new linearization method for nonlinear feedback shift registers. JOURNAL OF COMPUTER AND SYSTEM SCIENCES[J]. 2015, 81(4): 783-796, https://www.webofscience.com/wos/woscc/full-record/WOS:000349741800011.
[110] Cao, Xiaochun, Ma, Meili, Guo, Xiaojie, Du, Ling, Lin, Dongdai. A new encryption scheme for surveillance videos. FRONTIERS OF COMPUTER SCIENCE[J]. 2015, 9(5): 765-777, https://www.webofscience.com/wos/woscc/full-record/WOS:000361611300010.
[111] Wang Tianze, Liu Meicheng, Zhao Shangwei, Lin Dongdai, IEEE. Construction of Cubic Rotation Symmetric Bent Functions in Power-of-Two Variables. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)null. 2015, 486-490, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380904700097.
[112] Zhang HuanGuo, Han WenBao, Lai XueJia, Lin DongDai, Ma JianFeng, Li JianHua. Survey on cyberspace security. SCIENCE CHINA-INFORMATION SCIENCESnull. 2015, 58(11): http://dx.doi.org/10.1007/s11432-015-5433-4.
[113] Wu, Baofeng, Lin, Dongdai. On constructing complete permutation polynomials over finite fields of even characteristic. DISCRETE APPLIED MATHEMATICS[J]. 2015, 184: 213-222, http://dx.doi.org/10.1016/j.dam.2014.11.008.
[114] 李盟, 贾晓启, 王蕊, 林东岱. 一种恶意代码特征选取和建模方法. 计算机应用与软件[J]. 2015, 32(8): 266-271, http://lib.cqvip.com/Qikan/Article/Detail?id=665815853.
[115] Guo, Chun, Lin, Dongdai. Improved domain extender for the ideal cipher. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2015, 7(4): 509-533, https://www.webofscience.com/wos/woscc/full-record/WOS:000364960300010.
[116] Qiuyan Wang, Yupeng Jiang, Dongdai Lin. Linear complexity of binary generalized cyclotomic sequences over GF(formula omitted). Journal of Complexity. 2015, 31(5): 731-740, http://dx.doi.org/10.1016/j.jco.2015.01.001.
[117] Guo Chun, Lin Dongdai, Iwata T, Cheon JH. A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT IInull. 2015, 9453: 389-410, [118] Zhang WenTao, Bao ZhenZhen, Lin DongDai, Rijmen, Vincent, Yang BoHan, Verbauwhede, Ingrid. RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 58(12): https://www.webofscience.com/wos/woscc/full-record/WOS:000368790400012.
[119] Yang, Minghui, Li, Jin, Feng, Keqin, Lin, Dongdai. Generalized Hamming Weights of Irreducible Cyclic Codes. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2015, 61(9): 4905-4913, https://www.webofscience.com/wos/woscc/full-record/WOS:000360015900024.
[120] Tian YouLiang, Peng ChangGen, Lin DongDai, Ma JianFeng, Jiang Qi, Ji WenJiang. Bayesian mechanism for rational secret sharing scheme. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2015, 58(5): https://www.webofscience.com/wos/woscc/full-record/WOS:000353818200008.
[121] Wang, Qiuyan, Jiang, Yupeng, Lin, Dongdai. Linear complexity of binary generalized cyclotomic sequences over GF(q). JOURNAL OF COMPLEXITY[J]. 2015, 31(5): 731-740, https://www.webofscience.com/wos/woscc/full-record/WOS:000360250000005.
[122] Tian, ChengLiang, Wei, Wei, Lin, DongDai. Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY[J]. 2015, 30(6): 1370-1377, https://www.webofscience.com/wos/woscc/full-record/WOS:000365873400015.
[123] Cao, Xiaochun, Wei, Xingxing, Han, Yahong, Lin, Dongdai. Robust Face Clustering Via Tensor Decomposition. IEEE TRANSACTIONS ON CYBERNETICS[J]. 2015, 45(11): 2546-2557, https://www.webofscience.com/wos/woscc/full-record/WOS:000363233000015.
[124] Ma Duohe, Xu Zhen, Lin Dongdai, Tian J, Jing J, Srivatsa M. Defending Blind DDoS Attack on SDN Based on Moving Target Defense. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT Inull. 2015, 152: 463-480, [125] Zhang Bin, Li Zhenqi, Feng Dengguo, Lin Dongdai, Moriai S. Near Collision Attack on the Grain v1 Stream Cipher. FAST SOFTWARE ENCRYPTION (FSE 2013)null. 2014, 8424: 518-538, [126] 邹静, 林东岱, 郝春辉. 一种基于结构划分概率的口令攻击方法. 计算机学报[J]. 2014, 37(5): 1206-1215, http://lib.cqvip.com/Qikan/Article/Detail?id=49658535.
[127] Fu, Huazhu, Cao, Xiaochun, Tu, Zhuowen, Lin, Dongdai. Symmetry Constraint for Foreground Extraction. IEEE TRANSACTIONS ON CYBERNETICS[J]. 2014, 44(5): 644-654, https://www.webofscience.com/wos/woscc/full-record/WOS:000334739900007.
[128] Wu Baofeng, Jin Qingfang, Liu Zhuojun, Lin Dongdai. Constructing Boolean functions with potentially optimal algebraic im- munity based on additive decompositions of finite fields (extended abstract). 2014 IEEE International Symposium on Information Theorynull. 2014, [129] Yang, Minghui, Lin, Dongdai, Guang, Xuan. Generalized Fourier Transform and the Joint N-Adic Complexity of a Multisequence. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2014, E97A(9): 1982-1986, https://www.webofscience.com/wos/woscc/full-record/WOS:000342783900023.
[130] Chen Shan, Zhang Xushen, Wang Kunpeng, Lin Dongdai. Six Subfamilies of Implementation-Friendly Barreto-Naehrig Curves. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 23(1): 169-174, https://www.webofscience.com/wos/woscc/full-record/WOS:000330089800031.
[131] Wang, Qiuyan, Lin, Dongdai, Guang, Xuan. On the Linear Complexity of Legendre Sequences Over F-q. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2014, E97A(7): 1627-1630, https://www.webofscience.com/wos/woscc/full-record/WOS:000342738700023.
[132] Yang, Minghui, Lin, Dongdai, Shi, Minjia. Minimum Linear Complexity Approximation of Sequences with Period q(n)-1 over F-q. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2014, E97A(12): 2667-2670, https://www.webofscience.com/wos/woscc/full-record/WOS:000351567100053.
[133] Chen, Yu, Zhang, Zongyang, Lin, Dongdai, Cao, Zhenfu. CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System. COMPUTER JOURNAL[J]. 2014, 57(10): 1537-1556, https://www.webofscience.com/wos/woscc/full-record/WOS:000343417100006.
[134] 赵倩, 刘峰, 林东岱. 美国网络空间安全教育战略计划. 中国信息安全. 2014, 91-94, http://lib.cqvip.com/Qikan/Article/Detail?id=661884058.
[135] Zhang, Yin, Liu, Meicheng, Lin, Dongdai. On the immunity of rotation symmetric Boolean functions against fast algebraic attacks. DISCRETE APPLIED MATHEMATICS[J]. 2014, 162: 17-27, http://dx.doi.org/10.1016/j.dam.2013.04.014.
[136] Jiang, Yupeng, Lin, Dongdai. Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2014, 60(10): 6602-6608, https://www.webofscience.com/wos/woscc/full-record/WOS:000342416900045.
[137] Wang, Qiuyan, Jiang, Yupeng, Lin, Dongdai, Guang, Xuan. On the Linear Complexity of New Modified Jacobi Sequences. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2014, E97A(11): 2263-2266, https://www.webofscience.com/wos/woscc/full-record/WOS:000351567000025.
[138] Lu, Yao, Zhang, Rui, Lin, Dongdai. IMPROVED BOUNDS FOR THE IMPLICIT FACTORIZATION PROBLEM. ADVANCES IN MATHEMATICS OF COMMUNICATIONS[J]. 2013, 7(3): 243-251, https://www.webofscience.com/wos/woscc/full-record/WOS:000322821000002.
[139] Wang Tianze, Lin Dongdai. A method for counting the number of polynomial equivalence classes. JOURNAL OF MATHEMATICAL CRYPTOLOGY[J]. 2013, 7(1): 69-95, [140] ZOU JingI, LIN Dongdai, HAO Chunhui, LI Zhenqi, WANG Wenhao, LU Yao. Making a Higher Hit Ratio Cryptanalytic Time-Memory Trade-Off Attack on Passwords. 电子学报:英文版. 2013, 22(4): 671-676, http://lib.cqvip.com/Qikan/Article/Detail?id=48055288.
[141] Zou Jing, Lin Dongdai, Hao Chunhui, Li Zhenqi, Wang Wenhao, Lu Yao. Making a Higher Hit Ratio Cryptanalytic Time-Memory Trade-Off Attack on Passwords. CHINESE JOURNAL OF ELECTRONICS[J]. 2013, 22(4): 671-676, http://lib.cqvip.com/Qikan/Article/Detail?id=48055288.
[142] Dongdai Lin. Robust Tensor Clustering with Non-Greedy Maximization. IJCAI 2013. 2013, [143] Chen Yu, Chen LiQun, Lin DongDai. Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme. SCIENCE CHINA-MATHEMATICS[J]. 2013, 56(7): 1385-1401, https://www.webofscience.com/wos/woscc/full-record/WOS:000321587300006.
[144] Dongdai Lin. Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. ACISP 2013. 2013, [145] Wang Tianze, Lin Dongdai. A method for counting the number of polynomial equivalence classes. JOURNAL OF MATHEMATICAL CRYPTOLOGY[J]. 2013, 7(1): 69-95, [146] ZOU JingI, LIN Dongdai, HAO Chunhui, LI Zhenqi, WANG Wenhao, LU Yao. Making a Higher Hit Ratio Cryptanalytic Time-Memory Trade-Off Attack on Passwords. 电子学报:英文版. 2013, 22(4): 671-676, http://lib.cqvip.com/Qikan/Article/Detail?id=48055288.
[147] Zou Jing, Lin Dongdai, Hao Chunhui, Li Zhenqi, Wang Wenhao, Lu Yao. Making a Higher Hit Ratio Cryptanalytic Time-Memory Trade-Off Attack on Passwords. CHINESE JOURNAL OF ELECTRONICS[J]. 2013, 22(4): 671-676, http://lib.cqvip.com/Qikan/Article/Detail?id=48055288.
[148] Dongdai Lin. Robust Tensor Clustering with Non-Greedy Maximization. IJCAI 2013. 2013, [149] Chen Yu, Chen LiQun, Lin DongDai. Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme. SCIENCE CHINA-MATHEMATICS[J]. 2013, 56(7): 1385-1401, https://www.webofscience.com/wos/woscc/full-record/WOS:000321587300006.
[150] Dongdai Lin. Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. ACISP 2013. 2013, [151] Wang TianZe, Lin DongDai. On enumeration of polynomial equivalence classes. SCIENCE CHINA-MATHEMATICS[J]. 2012, 55(6): 1137-1152, http://lib.cqvip.com/Qikan/Article/Detail?id=42195945.
[152] Lin, Dongdai, Faugere, JeanCharles, Perret, Ludovic, Wang, Tianze. On enumeration of polynomial equivalence classes and their application to MPKC. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2012, 18(2): 283-302, [153] 林东岱, 刘峰. 美国信息安全保密体系初探. 保密科学技术. 2012, 6-13, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479771.
[154] ZHANG Yin, LIN Dongdai, LIU Meicheng. Improving the Lower Bound on Linear Complexity of the Sequences Generated by Ndnlinear Filtering. 电子学报:英文版. 2012, 21(3): 519-522, http://lib.cqvip.com/Qikan/Article/Detail?id=44611573.
[155] WANG TianZe, LIN DongDai. On enumeration of polynomial equivalence classes. 中国科学:数学英文版. 2012, 55(6): 1137-1152, http://lib.cqvip.com/Qikan/Article/Detail?id=42195945.
[156] Liu, Meicheng, Zhang, Yin, Lin, Dongdai, Wang, X, Sako, K. Perfect Algebraic Immune Functions. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012null. 2012, 7658: 172-189, [157] 李昕, 林东岱, 徐琳. 一种布尔多项式的高效计算机表示. 计算机研究与发展. 2012, 49(12): 2568-2574, http://lib.cqvip.com/Qikan/Article/Detail?id=44163891.
[158] Lin, Dongdai, Shi, Tao, Yang, Zifeng. Ergodic theory over F-2T. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2012, 18(3): 473-491, https://www.webofscience.com/wos/woscc/full-record/WOS:000301807900001.
[159] Zhang Yin, Lin Dongdai, Liu Meicheng. Improving the Lower Bound on Linear Complexity of the Sequences Generated by Nonlinear Filtering. CHINESE JOURNAL OF ELECTRONICS[J]. 2012, 21(3): 519-522, https://www.webofscience.com/wos/woscc/full-record/WOS:000306618700026.
[160] Wang TianZe, Lin DongDai. On enumeration of polynomial equivalence classes. SCIENCE CHINA-MATHEMATICS[J]. 2012, 55(6): 1137-1152, http://lib.cqvip.com/Qikan/Article/Detail?id=42195945.
[161] Lin, Dongdai, Faugere, JeanCharles, Perret, Ludovic, Wang, Tianze. On enumeration of polynomial equivalence classes and their application to MPKC. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2012, 18(2): 283-302, [162] 林东岱, 刘峰. 美国信息安全保密体系初探. 保密科学技术. 2012, 6-13, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479771.
[163] ZHANG Yin, LIN Dongdai, LIU Meicheng. Improving the Lower Bound on Linear Complexity of the Sequences Generated by Ndnlinear Filtering. 电子学报:英文版. 2012, 21(3): 519-522, http://lib.cqvip.com/Qikan/Article/Detail?id=44611573.
[164] WANG TianZe, LIN DongDai. On enumeration of polynomial equivalence classes. 中国科学:数学英文版. 2012, 55(6): 1137-1152, http://lib.cqvip.com/Qikan/Article/Detail?id=42195945.
[165] Liu, Meicheng, Zhang, Yin, Lin, Dongdai, Wang, X, Sako, K. Perfect Algebraic Immune Functions. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012null. 2012, 7658: 172-189, [166] 李昕, 林东岱, 徐琳. 一种布尔多项式的高效计算机表示. 计算机研究与发展. 2012, 49(12): 2568-2574, http://lib.cqvip.com/Qikan/Article/Detail?id=44163891.
[167] Lin, Dongdai, Shi, Tao, Yang, Zifeng. Ergodic theory over F-2T. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2012, 18(3): 473-491, https://www.webofscience.com/wos/woscc/full-record/WOS:000301807900001.
[168] Zhang Yin, Lin Dongdai, Liu Meicheng. Improving the Lower Bound on Linear Complexity of the Sequences Generated by Nonlinear Filtering. CHINESE JOURNAL OF ELECTRONICS[J]. 2012, 21(3): 519-522, https://www.webofscience.com/wos/woscc/full-record/WOS:000306618700026.
[169] Liu, Meicheng, Lin, Dongdai, Pei, Dingyi. Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2011, 57(7): 4817-4821, https://www.webofscience.com/wos/woscc/full-record/WOS:000291922500057.
[170] Deng, Yi, Feng, Dengguo, Goyal, Vipul, Lin, Dongdai, Sahai, Amit, Yung, Moti, Lee, DH, Wang, XY. Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011null. 2011, 7073: 390-+, [171] Zhang, Yin, Liu, Meicheng, Lin, Dongdai. ON THE NONEXISTENCE of BENT FUNCTIONS. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE[J]. 2011, 22(6): 1431-1438, https://www.webofscience.com/wos/woscc/full-record/WOS:000294809400013.
[172] Huang Zhenyu, Lin Dongdai. Attacking bivium and trivium with the characteristic set method. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2011, 77-91, http://124.16.136.157/handle/311060/14357.
[173] 刘美成, 林东岱, Pei Dingyi. Results on the immunity of boolean functions against probabilistic algebraic attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2011, 34-46, http://124.16.136.157/handle/311060/14241.
[174] Liu, Meicheng, Lin, Dongdai, Pei, Dingyi. Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2011, 57(7): 4817-4821, https://www.webofscience.com/wos/woscc/full-record/WOS:000291922500057.
[175] Deng, Yi, Feng, Dengguo, Goyal, Vipul, Lin, Dongdai, Sahai, Amit, Yung, Moti, Lee, DH, Wang, XY. Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011null. 2011, 7073: 390-+, [176] Zhang, Yin, Liu, Meicheng, Lin, Dongdai. ON THE NONEXISTENCE of BENT FUNCTIONS. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE[J]. 2011, 22(6): 1431-1438, https://www.webofscience.com/wos/woscc/full-record/WOS:000294809400013.
[177] Huang Zhenyu, Lin Dongdai. Attacking bivium and trivium with the characteristic set method. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2011, 77-91, http://124.16.136.157/handle/311060/14357.
[178] 刘美成, 林东岱, Pei Dingyi. Results on the immunity of boolean functions against probabilistic algebraic attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2011, 34-46, http://124.16.136.157/handle/311060/14241.
[179] LIU HanWu, LIN DongDai. A two-round honest-verifier zero-knowledge protocol. 中国科学:信息科学(英文版). 2010, 954-963, http://lib.cqvip.com/Qikan/Article/Detail?id=33670624.
[180] Liu HanWu, Lin DongDai. A two-round honest-verifier zero-knowledge protocol. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2010, 53(5): 954-963, http://lib.cqvip.com/Qikan/Article/Detail?id=33670624.
[181] LIU Hanwu, LIN Dongdai. Some Constant-Round Zero-Knowledge Protocols. 电子学报:英文版. 2010, 7-12, http://lib.cqvip.com/Qikan/Article/Detail?id=37118609.
[182] Huang Guifang, Hu Lei, Lin Dongdai. An efficient compiler from Σ-protocol to deniable zero knowledge in CRS model. Journal of the Graduate School of the Academy of Sciences[J]. 2010, 27(6): 831-837, [183] Liu MeiCheng, Du YuSong, Pei DingYi, Lin DongDai. On designated-weight Boolean functions with highest algebraic immunity. SCIENCE CHINA-MATHEMATICS[J]. 2010, 53(11): 2847-2854, https://www.webofscience.com/wos/woscc/full-record/WOS:000284382200003.
[184] 黄桂芳, 胡磊, 林东岱. 从Σ-协议到公共参考串模型下可否认零知识的高效编译器. 中国科学院研究生院学报. 2010, 27(6): 831-837, http://lib.cqvip.com/Qikan/Article/Detail?id=36104151.
[185] Liu Hanwu, Lin Dongdai. Some Constant-Round Zero-Knowledge Protocols. CHINESE JOURNAL OF ELECTRONICS[J]. 2010, 19(1): 7-12, http://lib.cqvip.com/Qikan/Article/Detail?id=37118609.
[186] LIU HanWu, LIN DongDai. A two-round honest-verifier zero-knowledge protocol. 中国科学:信息科学(英文版). 2010, 954-963, http://lib.cqvip.com/Qikan/Article/Detail?id=33670624.
[187] Liu HanWu, Lin DongDai. A two-round honest-verifier zero-knowledge protocol. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2010, 53(5): 954-963, http://lib.cqvip.com/Qikan/Article/Detail?id=33670624.
[188] LIU Hanwu, LIN Dongdai. Some Constant-Round Zero-Knowledge Protocols. 电子学报:英文版. 2010, 7-12, http://lib.cqvip.com/Qikan/Article/Detail?id=37118609.
[189] Huang Guifang, Hu Lei, Lin Dongdai. An efficient compiler from Σ-protocol to deniable zero knowledge in CRS model. Journal of the Graduate School of the Academy of Sciences[J]. 2010, 27(6): 831-837, [190] Liu MeiCheng, Du YuSong, Pei DingYi, Lin DongDai. On designated-weight Boolean functions with highest algebraic immunity. SCIENCE CHINA-MATHEMATICS[J]. 2010, 53(11): 2847-2854, https://www.webofscience.com/wos/woscc/full-record/WOS:000284382200003.
[191] 黄桂芳, 胡磊, 林东岱. 从Σ-协议到公共参考串模型下可否认零知识的高效编译器. 中国科学院研究生院学报. 2010, 27(6): 831-837, http://lib.cqvip.com/Qikan/Article/Detail?id=36104151.
[192] Liu Hanwu, Lin Dongdai. Some Constant-Round Zero-Knowledge Protocols. CHINESE JOURNAL OF ELECTRONICS[J]. 2010, 19(1): 7-12, http://lib.cqvip.com/Qikan/Article/Detail?id=37118609.
[193] Huang Guifang, Lin Dongdai. Unbounded Non-Malleable Non-Interactive Zero Knowledge Protocols for NP. CHINESE JOURNAL OF ELECTRONICS[J]. 2009, 18(3): 400-404, http://lib.cqvip.com/Qikan/Article/Detail?id=31317853.
[194] Huang Guifang, Lin Dongdai. Unbounded Non-Malleable Non-Interactive Zero Knowledge Protocols for NP. CHINESE JOURNAL OF ELECTRONICS[J]. 2009, 18(3): 400-404, http://lib.cqvip.com/Qikan/Article/Detail?id=31317853.
[195] DENG Yi, LIN DongDai. Novel Ω-protocols for NP. 中国科学:F辑英文版. 2008, 40-52, http://lib.cqvip.com/Qikan/Article/Detail?id=26252788.
[196] Deng Yi, Lin DongDai. Novel Omega-protocols for NP. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES[J]. 2008, 51(1): 40-52, http://www.corc.org.cn/handle/1471x/2386356.
[197] DENG Yi, LIN DongDai. Novel Ω-protocols for NP. 中国科学:F辑英文版. 2008, 40-52, http://lib.cqvip.com/Qikan/Article/Detail?id=26252788.
[198] Deng Yi, Lin DongDai. Novel Omega-protocols for NP. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES[J]. 2008, 51(1): 40-52, http://www.corc.org.cn/handle/1471x/2386356.
[199] 卢凤清, 林东岱. 对Otway-Rees协议的一个改进方法. 计算机应用. 2007, 27(B06): 260-260, http://lib.cqvip.com/Qikan/Article/Detail?id=24804156.
[200] Hu Zhenyu, Lin Dongdai, Wu Wenling, Feng Dengguo. On the security of encrypt-and-MAC paradigm. CHINESE JOURNAL OF ELECTRONICS[J]. 2007, 16(1): 45-50, http://lib.cqvip.com/Qikan/Article/Detail?id=24226175.
[201] 卢凤清, 林东岱. 对Otway-Rees协议的一个改进方法. 计算机应用. 2007, 27(B06): 260-260, http://lib.cqvip.com/Qikan/Article/Detail?id=24804156.
[202] Hu Zhenyu, Lin Dongdai, Wu Wenling, Feng Dengguo. On the security of encrypt-and-MAC paradigm. CHINESE JOURNAL OF ELECTRONICS[J]. 2007, 16(1): 45-50, http://lib.cqvip.com/Qikan/Article/Detail?id=24226175.
[203] 曹天杰, 林东岱, 薛锐. WWW的信息监控研究. 通讯和计算机:中英文版. 2005, 2(6): 1-6, http://lib.cqvip.com/Qikan/Article/Detail?id=23310215.
[204] 曹天杰, 林东岱, 薛锐. WWW的信息监控研究. 通讯和计算机:中英文版. 2005, 2(6): 1-6, http://lib.cqvip.com/Qikan/Article/Detail?id=23310215.
发表著作
(1) 美国网络空间安全体系,Overview of the Cybersecurity System in USA,科学出版社,2015-01,第2作者
(2) 应用密码学,Applied Cryptography,科学出版社,2008-12,第1作者
(3) 代数学基础与有限域,An Introduction to Algebra and Finite Fields,高等教育出版社,2007-04,第1作者
(4) 企业信息系统安全-威胁与对策,Enterprise Information System Security,电子工业出版社,2004-07,第1作者

科研活动

   
科研项目
(1) 代数动力系统及其序列密码相关问题研究 ,主持,国家级,2014-01--2017-12
(2) 海云安全体系与关键技术,主持,部委级,2012-01--2016-12
(3) 数学机械化理论与算法,参与,国家级,2011-01--2015-08