Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3

    In this work, we focus on collision attacks against instances of SHA-3 hash family in both classical and quantum settings. Since the 5-round collision attacks on SHA3-256 and other variants proposed by Guo et al.

    Jian Guo, Guozhen Liu, Ling Song, Yi Tu in Advances in Cryptology – ASIACRYPT 2022 (2022)

  2. No Access

    Chapter and Conference Paper

    Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem

    This paper proposes a new generalized ElGamal public key encryption scheme based on a new Diffie-Hellman problem, so-called EDDH problem, which DDH problem can be reduced to. This scheme is one-way if and only...

    Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen **ao in Provable Security (2008)

  3. No Access

    Chapter and Conference Paper

    Some Notes on d-Form Functions with Difference-Balanced Property

    The relation between a cyclic relative difference set and a cyclic difference set is considered. Both the sets are with Singer parameters and can be constructed from a difference-balanced d-form function. Althoug...

    Tongjiang Yan, **aoni Du, Enjian Bai, Guozhen **ao in Arithmetic of Finite Fields (2007)

  4. No Access

    Chapter and Conference Paper

    Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete Logarithm

    An upper bound is established for certain exponential sums with respect to multiplicative characters defined on the rational points of an elliptic curve over a prime field. The bound is applied to investigate ...

    Zhixiong Chen, Shengqiang Li, Guozhen **ao in Sequences and Their Applications – SETA 2006 (2006)

  5. No Access

    Chapter and Conference Paper

    A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences

    An efficient algorithm for determining the linear complexity and the minimal polynomial of sequence with period p m q ...

    Shimin Wei, Guolong Chen, Guozhen **ao in Information Security and Cryptology (2005)