Sangwisut, Ekkasit; Jitman, Somphong; Ling, San; Udomkavanich, Patanee Hulls of cyclic and negacyclic codes over finite fields. (English) Zbl 1368.94163 Finite Fields Appl. 33, 232-257 (2015). MSC: 94B15 11T71 PDFBibTeX XMLCite \textit{E. Sangwisut} et al., Finite Fields Appl. 33, 232--257 (2015; Zbl 1368.94163) Full Text: DOI
Ezerman, Martianus Frederic; Lee, Hyung Tae; Ling, San; Nguyen, Khoa; Wang, Huaxiong A provably secure group signature scheme from code-based assumptions. (English) Zbl 1396.94075 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 260-285 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{M. F. Ezerman} et al., Lect. Notes Comput. Sci. 9452, 260--285 (2015; Zbl 1396.94075) Full Text: DOI arXiv
Ling, San; Nguyen, Khoa; Wang, Huaxiong Group signatures from lattices: simpler, tighter, shorter, ring-based. (English) Zbl 1345.94075 Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 427-449 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Ling} et al., Lect. Notes Comput. Sci. 9020, 427--449 (2015; Zbl 1345.94075) Full Text: DOI
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong Low probability differentials and the cryptanalysis of full-round CLEFIA-128. (English) Zbl 1306.94050 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 141-157 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Emami} et al., Lect. Notes Comput. Sci. 8873, 141--157 (2014; Zbl 1306.94050) Full Text: DOI
Ling, San; Shparlinski, Igor; Wang, Huaxiong On the multidimensional distribution of the Naor-Reingold pseudo-random function. (English) Zbl 1315.11067 Math. Comput. 83, No. 289, 2429-2434 (2014). Reviewer: Yaochen Zhu (Beijing) MSC: 11K45 11T23 65C10 94A60 PDFBibTeX XMLCite \textit{S. Ling} et al., Math. Comput. 83, No. 289, 2429--2434 (2014; Zbl 1315.11067) Full Text: DOI
Chen, Jie; Lim, Hoon Wei; Ling, San; Wang, Huaxiong; Wee, Hoeteck Shorter identity-based encryption via asymmetric pairings. (English) Zbl 1299.94080 Des. Codes Cryptography 73, No. 3, 911-947 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Chen} et al., Des. Codes Cryptography 73, No. 3, 911--947 (2014; Zbl 1299.94080) Full Text: DOI
Chen, Jie; Lim, Hoon Wei; Ling, San; Su, Le; Wang, Huaxiong Spatial encryption supporting non-monotone access structure. (English) Zbl 1298.68080 Des. Codes Cryptography 73, No. 3, 731-746 (2014). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Chen} et al., Des. Codes Cryptography 73, No. 3, 731--746 (2014; Zbl 1298.68080) Full Text: DOI
Ling, San; Phan, Duong Hieu; Stehlé, Damien; Steinfeld, Ron Hardness of \(k\)-LWE and applications in traitor tracing. (English) Zbl 1343.94071 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 315-334 (2014). MSC: 94A60 68P25 68Q17 PDFBibTeX XMLCite \textit{S. Ling} et al., Lect. Notes Comput. Sci. 8616, 315--334 (2014; Zbl 1343.94071) Full Text: DOI
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong The resistance of PRESENT-80 against related-key differential attacks. (English) Zbl 1291.94079 Cryptogr. Commun. 6, No. 3, 171-187 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Emami} et al., Cryptogr. Commun. 6, No. 3, 171--187 (2014; Zbl 1291.94079) Full Text: DOI Link
Chen, Jie; Lim, Hoon Wei; Ling, San; Wang, Huaxiong The relation and transformation between hierarchical inner product encryption and spatial encryption. (English) Zbl 1326.68128 Des. Codes Cryptography 71, No. 2, 347-364 (2014). Reviewer: Michael J. Jacobson jun. (Calgary) MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Chen} et al., Des. Codes Cryptography 71, No. 2, 347--364 (2014; Zbl 1326.68128) Full Text: DOI Link
Langlois, Adeline; Ling, San; Nguyen, Khoa; Wang, Huaxiong Lattice-based group signature scheme with verifier-local revocation. (English) Zbl 1335.94063 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 345-361 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Langlois} et al., Lect. Notes Comput. Sci. 8383, 345--361 (2014; Zbl 1335.94063) Full Text: DOI
Su, Le; Lim, Hoon Wei; Ling, San; Wang, Huaxiong Revocable IBE systems with almost constant-size key update. (English) Zbl 1307.94100 Cao, Zhenfu (ed.) et al., Pairing-based cryptography – Pairing 2013. 6th international conference, Beijing, China, November 22–24, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-04872-7/pbk). Lecture Notes in Computer Science 8365, 168-185 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Su} et al., Lect. Notes Comput. Sci. 8365, 168--185 (2014; Zbl 1307.94100) Full Text: DOI
Chee, Yeow Meng; Ling, San; Wang, Huaxiong; Zhang, Liang Feng Upper bounds on matching families in \(\mathbb Z^n_{pq}\). (English) Zbl 1364.94748 IEEE Trans. Inf. Theory 59, No. 8, 5131-5139 (2013). MSC: 94B60 11T71 PDFBibTeX XMLCite \textit{Y. M. Chee} et al., IEEE Trans. Inf. Theory 59, No. 8, 5131--5139 (2013; Zbl 1364.94748) Full Text: DOI arXiv
Ezerman, Martianus Frederic; Jitman, Somphong; Ling, San; Pasechnik, Dmitrii V. CSS-like constructions of asymmetric quantum codes. (English) Zbl 1364.81088 IEEE Trans. Inf. Theory 59, No. 10, 6732-6754 (2013). MSC: 81P70 94A40 94B05 94B60 PDFBibTeX XMLCite \textit{M. F. Ezerman} et al., IEEE Trans. Inf. Theory 59, No. 10, 6732--6754 (2013; Zbl 1364.81088) Full Text: DOI arXiv
Jacob, Nisha; Saetang, Sirote; Chen, Chien-Ning; Kutzner, Sebastian; Ling, San; Poschmann, Axel Feasibility and practicability of standardized cryptography on 4-bit micro controllers. (English) Zbl 1327.94055 Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 184-201 (2013). MSC: 94A60 14G50 68M07 PDFBibTeX XMLCite \textit{N. Jacob} et al., Lect. Notes Comput. Sci. 7707, 184--201 (2013; Zbl 1327.94055) Full Text: DOI Link
Tan, Yin; Qu, Longjiang; Ling, San; Tan, Chik How On the Fourier spectra of new APN functions. (English) Zbl 1292.11133 SIAM J. Discrete Math. 27, No. 2, 791-801 (2013). Reviewer: Alexander Pott (Magdeburg) MSC: 11T06 11T71 94B05 PDFBibTeX XMLCite \textit{Y. Tan} et al., SIAM J. Discrete Math. 27, No. 2, 791--801 (2013; Zbl 1292.11133) Full Text: DOI Link
Ling, San; Wang, Huaxiong; Xing, Chaoping Algebraic curves in cryptography. (English) Zbl 1282.94001 Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4200-7946-3/hbk; 978-1-138-38141-4/pbk; 978-0-429-18703-2/ebook). xvii, 321 p (2013). Reviewer: Fernando Hernando (Castellón) MSC: 94-02 94A60 94B27 94B25 11G20 11T71 94A55 14G50 PDFBibTeX XMLCite \textit{S. Ling} et al., Algebraic curves in cryptography. Boca Raton, FL: CRC Press (2013; Zbl 1282.94001) Full Text: DOI
Ling, San; Nguyen, Khoa; Stehlé, Damien; Wang, Huaxiong Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications. (English) Zbl 1314.94087 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 107-124 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Ling} et al., Lect. Notes Comput. Sci. 7778, 107--124 (2013; Zbl 1314.94087) Full Text: DOI
Chen, Jie; Lim, Hoon Wei; Ling, San; Wang, Huaxiong; Wee, Hoeteck Shorter IBE and signatures via asymmetric pairings. (English) Zbl 1305.94038 Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 122-140 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Chen} et al., Lect. Notes Comput. Sci. 7708, 122--140 (2013; Zbl 1305.94038) Full Text: DOI
Chen, Cheng; Chen, Jie; Lim, Hoon Wei; Zhang, Zhenfeng; Feng, Dengguo; Ling, San; Wang, Huaxiong Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. (English) Zbl 1312.94039 Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 50-67 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Chen} et al., Lect. Notes Comput. Sci. 7779, 50--67 (2013; Zbl 1312.94039) Full Text: DOI
Chen, Chien-Ning; Jacob, Nisha; Kutzner, Sebastian; Ling, San; Poschmann, Axel; Saetang, Sirote Standardized signature algorithms on ultra-constrained 4-bit MCU. (English) Zbl 1292.94046 Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 37-50 (2012). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{C.-N. Chen} et al., Lect. Notes Comput. Sci. 7631, 37--50 (2012; Zbl 1292.94046) Full Text: DOI Link
Wu, Hongjun; Huang, Tao; Nguyen, Phuong Ha; Wang, Huaxiong; Ling, San Differential attacks against stream cipher ZUC. (English) Zbl 1292.94154 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 262-277 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wu} et al., Lect. Notes Comput. Sci. 7658, 262--277 (2012; Zbl 1292.94154) Full Text: DOI
Wei, Lei; Peyrin, Thomas; Sokołowski, Przemysław; Ling, San; Pieprzyk, Josef; Wang, Huaxiong On the (in)security of IDEA in various hashing modes. (English) Zbl 1312.94099 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 163-179 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Wei} et al., Lect. Notes Comput. Sci. 7549, 163--179 (2012; Zbl 1312.94099) Full Text: DOI Link
Chen, Jie; Lim, Hoon Wei; Ling, San; Wang, Huaxiong; Nguyen, Khoa Revocable identity-based encryption from lattices. (English) Zbl 1308.94064 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 390-403 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Chen} et al., Lect. Notes Comput. Sci. 7372, 390--403 (2012; Zbl 1308.94064) Full Text: DOI
Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. (English) Zbl 1294.94079 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 353-371 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Steinfeld} et al., Lect. Notes Comput. Sci. 7293, 353--371 (2012; Zbl 1294.94079) Full Text: DOI
Ling, San; Ozdemir, Enver; Xing, Chaoping Constructing irreducible polynomials over finite fields. (English) Zbl 1277.11111 Math. Comput. 81, No. 279, 1663-1668 (2012). MSC: 11T06 11Y16 PDFBibTeX XMLCite \textit{S. Ling} et al., Math. Comput. 81, No. 279, 1663--1668 (2012; Zbl 1277.11111) Full Text: DOI
Ling, San; Shparlinski, Igor E.; Steinfeld, Ron; Wang, Huaxiong On the modular inversion hidden number problem. (English) Zbl 1248.11103 J. Symb. Comput. 47, No. 4, 358-367 (2012). MSC: 11T71 68W30 94A60 PDFBibTeX XMLCite \textit{S. Ling} et al., J. Symb. Comput. 47, No. 4, 358--367 (2012; Zbl 1248.11103) Full Text: DOI
Zhang, Zhifang; Chee, Yeow Meng; Ling, San; Liu, Mulan; Wang, Huaxiong Threshold changeable secret sharing schemes revisited. (English) Zbl 1236.94085 Theor. Comput. Sci. 418, 106-115 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Theor. Comput. Sci. 418, 106--115 (2012; Zbl 1236.94085) Full Text: DOI
Kiah, Han Mao; Leung, Ka Hin; Ling, San A note on cyclic codes over \(\mathrm{GR}(p^{2},m)\) of length \(p^{k}\). (English) Zbl 1237.94135 Des. Codes Cryptography 63, No. 1, 105-112 (2012). Reviewer: Ralph-Hardo Schulz (Berlin) MSC: 94B15 11T71 PDFBibTeX XMLCite \textit{H. M. Kiah} et al., Des. Codes Cryptography 63, No. 1, 105--112 (2012; Zbl 1237.94135) Full Text: DOI
Ling, San; Qu, Longjiang A note on linearized polynomials and the dimension of their kernels. (English) Zbl 1273.11171 Finite Fields Appl. 18, No. 1, 56-62 (2012). MSC: 11T06 12E20 PDFBibTeX XMLCite \textit{S. Ling} and \textit{L. Qu}, Finite Fields Appl. 18, No. 1, 56--62 (2012; Zbl 1273.11171) Full Text: DOI
Jia, Yan; Ling, San; Xing, Chaoping On self-dual cyclic codes over finite fields. (English) Zbl 1366.94639 IEEE Trans. Inf. Theory 57, No. 4, 2243-2251 (2011). MSC: 94B15 94B05 11T71 PDFBibTeX XMLCite \textit{Y. Jia} et al., IEEE Trans. Inf. Theory 57, No. 4, 2243--2251 (2011; Zbl 1366.94639) Full Text: DOI
Tartary, Christophe; Wang, Huaxiong; Ling, San Authentication of digital streams. (English) Zbl 1365.94492 IEEE Trans. Inf. Theory 57, No. 9, 6285-6303 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Tartary} et al., IEEE Trans. Inf. Theory 57, No. 9, 6285--6303 (2011; Zbl 1365.94492) Full Text: DOI
Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San Side-channel resistant crypto for less than 2,300 GE. (English) Zbl 1239.94063 J. Cryptology 24, No. 2, 322-345 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Poschmann} et al., J. Cryptology 24, No. 2, 322--345 (2011; Zbl 1239.94063) Full Text: DOI Link
Wei, Lei; Rechberger, Christian; Guo, Jian; Wu, Hongjun; Wang, Huaxiong; Ling, San Improved meet-in-the-middle cryptanalysis of KTANTAN (poster). (English) Zbl 1295.94153 Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 433-438 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Wei} et al., Lect. Notes Comput. Sci. 6812, 433--438 (2011; Zbl 1295.94153) Full Text: DOI Link
Chee, Yeow Meng (ed.); Guo, Zhenbo (ed.); Ling, San (ed.); Shao, Fengjing (ed.); Tang, Yuansheng (ed.); Wang, Huaxiong (ed.); Xing, Chaoping (ed.) Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. (English) Zbl 1214.94002 Lecture Notes in Computer Science 6639. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). viii, 295 p. (2011). MSC: 94-06 94A60 94Bxx 00B25 PDFBibTeX XMLCite \textit{Y. M. Chee} (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 -- June 3, 2011. Proceedings. Berlin: Springer (2011; Zbl 1214.94002) Full Text: DOI
Moradi, Amir; Poschmann, Axel; Ling, San; Paar, Christof; Wang, Huaxiong Pushing the limits: a very compact and a threshold implementation of AES. (English) Zbl 1281.94044 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 69-88 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Moradi} et al., Lect. Notes Comput. Sci. 6632, 69--88 (2011; Zbl 1281.94044) Full Text: DOI
Guo, Jian; Ling, San; Rechberger, Christian; Wang, Huaxiong Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2. (English) Zbl 1253.94051 Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 56-75 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Guo} et al., Lect. Notes Comput. Sci. 6477, 56--75 (2010; Zbl 1253.94051) Full Text: DOI
Poschmann, Axel; Ling, San; Wang, Huaxiong 256 bit standardized crypto for 650 GE – GOST revisited. (English) Zbl 1297.94098 Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 219-233 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Poschmann} et al., Lect. Notes Comput. Sci. 6225, 219--233 (2010; Zbl 1297.94098) Full Text: DOI
Li, Chao; Ling, San; Qu, Longjiang On the covering structures of two classes of linear codes from perfect nonlinear functions. (English) Zbl 1367.94374 IEEE Trans. Inf. Theory 55, No. 1, 70-82 (2009). MSC: 94B05 94A62 PDFBibTeX XMLCite \textit{C. Li} et al., IEEE Trans. Inf. Theory 55, No. 1, 70--82 (2009; Zbl 1367.94374) Full Text: DOI
Li, Chao; Li, Qiang; Ling, San Properties and applications of preimage distributions of perfect nonlinear functions. (English) Zbl 1367.94326 IEEE Trans. Inf. Theory 55, No. 1, 64-69 (2009). MSC: 94A60 94B25 94B05 PDFBibTeX XMLCite \textit{C. Li} et al., IEEE Trans. Inf. Theory 55, No. 1, 64--69 (2009; Zbl 1367.94326) Full Text: DOI
Chen, Hao; Ling, San; Padró, Carles; Wang, Huaxiong; Xing, Chaoping Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes. (English) Zbl 1234.94073 Parker, Matthew G. (ed.), Cryptography and coding. 12th IMA international conference, cryptography and coding 2009, Cirencester, UK, December 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10867-9/pbk). Lecture Notes in Computer Science 5921, 263-277 (2009). MSC: 94A62 14G50 PDFBibTeX XMLCite \textit{H. Chen} et al., Lect. Notes Comput. Sci. 5921, 263--277 (2009; Zbl 1234.94073) Full Text: DOI
Guo, Jian; Matusiewicz, Krystian; Knudsen, Lars R.; Ling, San; Wang, Huaxiong Practical pseudo-collisions for hash functions ARIRANG-224/384. (English) Zbl 1267.94063 Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 141-156 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Guo} et al., Lect. Notes Comput. Sci. 5867, 141--156 (2009; Zbl 1267.94063) Full Text: DOI
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong Cryptanalysis of the LAKE hash family. (English) Zbl 1248.94057 Dunkelman, Orr (ed.), Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22–25, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03316-2/pbk). Lecture Notes in Computer Science 5665, 156-179 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Biryukov} et al., Lect. Notes Comput. Sci. 5665, 156--179 (2009; Zbl 1248.94057) Full Text: DOI
Chee, Yeow Meng (ed.); Li, Chao (ed.); Ling, San (ed.); Wang, Huaxiong (ed.); Xing, Chaoping (ed.) Coding and cryptology. Second international workshop, IWCC 2009, Zhangjiajie, China, June 1–5, 2009. Proceedings. (English) Zbl 1167.94001 Lecture Notes in Computer Science 5557. Berlin: Springer (ISBN 978-3-642-01813-8/pbk). viii, 275 p. (2009). MSC: 94-06 94A60 94Bxx 00B25 PDFBibTeX XMLCite \textit{Y. M. Chee} (ed.) et al., Coding and cryptology. Second international workshop, IWCC 2009, Zhangjiajie, China, June 1--5, 2009. Proceedings. Berlin: Springer (2009; Zbl 1167.94001) Full Text: DOI
Edoukou, Frédéric A. B.; Ling, San; Xing, Chaoping New informations on the structure of the functional codes defined by forms of degree \(h\) on non-degenerate Hermitian varieties in \(\mathbb{P}^{n(\mathbb{F}_q)\). arXiv:0907.4548 Preprint, arXiv:0907.4548 [math.AG] (2009). MSC: 05B25 11T71 14J29 BibTeX Cite \textit{F. A. B. Edoukou} et al., ``New informations on the structure of the functional codes defined by forms of degree $h$ on non-degenerate Hermitian varieties in $\mathbb{P}^{n(\mathbb{F}_q)$'', Preprint, arXiv:0907.4548 [math.AG] (2009) Full Text: arXiv OA License
Chen, Hao; Ling, San; Xing, Chaoping Access structures of elliptic secret sharing schemes. (English) Zbl 1311.94104 IEEE Trans. Inf. Theory 54, No. 2, 850-852 (2008). MSC: 94A62 14G50 94A60 94B27 PDFBibTeX XMLCite \textit{H. Chen} et al., IEEE Trans. Inf. Theory 54, No. 2, 850--852 (2008; Zbl 1311.94104) Full Text: DOI
Zhang, Zhifang; Liu, Mulan; Chee, Yeow Meng; Ling, San; Wang, Huaxiong Strongly multiplicative and 3-multiplicative linear secret sharing schemes. (English) Zbl 1172.94607 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 19-36 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 5350, 19--36 (2008; Zbl 1172.94607) Full Text: DOI
Lu, Yi; Wang, Huaxiong; Ling, San Cryptanalysis of Rabbit. (English) Zbl 1181.94100 Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 204-214 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Lu} et al., Lect. Notes Comput. Sci. 5222, 204--214 (2008; Zbl 1181.94100) Full Text: DOI
Steinfeld, Ron; Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef; Guo, Jian; Ling, San; Wang, Huaxiong Cryptanalysis of LASH. (English) Zbl 1154.68411 Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 207-223 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{R. Steinfeld} et al., Lect. Notes Comput. Sci. 5086, 207--223 (2008; Zbl 1154.68411) Full Text: DOI
Ling, San; Özbudak, Ferruh Some constructions of \((t,m,s)\)-nets with improved parameters. (English) Zbl 1162.11041 Finite Fields Appl. 14, No. 3, 658-675 (2008). Reviewer: Zhu Yaochen (Beijing) MSC: 11K45 11K31 11T71 94B05 PDFBibTeX XMLCite \textit{S. Ling} and \textit{F. Özbudak}, Finite Fields Appl. 14, No. 3, 658--675 (2008; Zbl 1162.11041) Full Text: DOI
Li, Yongqing (ed.); Ling, San (ed.); Niederreiter, Harald (ed.); Wang, Huaxiong (ed.); Xing, Chaoping (ed.); Zhang, Shengyuan (ed.) Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. (English) Zbl 1155.94004 Series on Coding Theory and Cryptology 4. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). x, 277 p. (2008). MSC: 94-06 94A60 94Bxx 00B25 PDFBibTeX XMLCite \textit{Y. Li} (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11--15, 2007. Hackensack, NJ: World Scientific (2008; Zbl 1155.94004)
Ling, San; Özbudak, Ferruh Constructions and bounds on linear error-block codes. (English) Zbl 1178.94228 Des. Codes Cryptography 45, No. 3, 297-316 (2007). MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{S. Ling} and \textit{F. Özbudak}, Des. Codes Cryptography 45, No. 3, 297--316 (2007; Zbl 1178.94228) Full Text: DOI Link
Chee, Yeow Meng; Ling, Alan C. H.; Ling, San; Shen, Hao The PBD-closure of constant-composition codes. (English) Zbl 1181.94124 IEEE Trans. Inf. Theory 53, No. 8, 2685-2692 (2007). MSC: 94B25 94A29 PDFBibTeX XMLCite \textit{Y. M. Chee} et al., IEEE Trans. Inf. Theory 53, No. 8, 2685--2692 (2007; Zbl 1181.94124) Full Text: DOI arXiv
Bao, Feng (ed.); Ling, San (ed.); Okamoto, Tatsuaki (ed.); Wang, Huaxiong (ed.); Xing, Chaoping (ed.) Cryptology and network security. 6th international conference, CANS 2007, Singapore, December 8–10, 2007. Proceedings. (English) Zbl 1152.94304 Lecture Notes in Computer Science 4856. Berlin: Springer (ISBN 978-3-540-76968-2/pbk). xii, 283 p. (2007). MSC: 94-06 68-06 94A60 68P25 00B25 PDFBibTeX XMLCite \textit{F. Bao} (ed.) et al., Cryptology and network security. 6th international conference, CANS 2007, Singapore, December 8--10, 2007. Proceedings. Berlin: Springer (2007; Zbl 1152.94304) Full Text: DOI
Ling, San; Özbudak, Ferruh Improved bounds on Weil sums over Galois rings and homogeneous weights. (English) Zbl 1151.11337 Ytrehus, Øyvind (ed.), Coding and cryptography. International workshop, WCC 2005, Bergen, Norway, March 14–18, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-35481-6/pbk). Lecture Notes in Computer Science 3969, 412-426 (2006). MSC: 11L03 11T71 94B10 PDFBibTeX XMLCite \textit{S. Ling} and \textit{F. Özbudak}, Lect. Notes Comput. Sci. 3969, 412--426 (2006; Zbl 1151.11337) Full Text: DOI
Ling, San; Özbudak, Ferruh Improved \(p\)-ary codes and sequence families from Galois rings of characteristic \(p^2\). (English) Zbl 1103.94028 SIAM J. Discrete Math. 19, No. 4, 1011-1028 (2006). MSC: 94B05 94B40 11T23 PDFBibTeX XMLCite \textit{S. Ling} and \textit{F. Özbudak}, SIAM J. Discrete Math. 19, No. 4, 1011--1028 (2006; Zbl 1103.94028) Full Text: DOI
Ling, San; Niederreiter, Harald; Solé, Patrick On the algebraic structure of quasi-cyclic codes. IV: Repeated roots. (English) Zbl 1172.94636 Des. Codes Cryptography 38, No. 3, 337-361 (2006). MSC: 94B05 11T71 94B15 PDFBibTeX XMLCite \textit{S. Ling} et al., Des. Codes Cryptography 38, No. 3, 337--361 (2006; Zbl 1172.94636) Full Text: DOI Link
Ling, San; Özbudak, Ferruh Improved \(p\)-ary codes and sequence families from Galois rings. (English) Zbl 1143.94358 Helleseth, T. (ed.) et al., Sequences and their applications – SETA 2004. Third international conference, Seoul, Korea, October 24–28, 2004. Revised selected papers. Berlin: Springer (ISBN 978-3-540-26084-4/pbk). Lecture Notes in Computer Science 3486, 236-242 (2005). MSC: 94B05 94B40 11T23 PDFBibTeX XMLCite \textit{S. Ling} and \textit{F. Özbudak}, Lect. Notes Comput. Sci. 3486, 236--242 (2005; Zbl 1143.94358) Full Text: DOI
Ling, San; Özbudak, Ferruh An improvement on the bounds of Weil exponential sums over Galois rings with some applications. (English) Zbl 1247.11147 IEEE Trans. Inf. Theory 50, No. 10, 2529-2543 (2004). MSC: 11T23 11T71 94B05 PDFBibTeX XMLCite \textit{S. Ling} and \textit{F. Özbudak}, IEEE Trans. Inf. Theory 50, No. 10, 2529--2543 (2004; Zbl 1247.11147) Full Text: DOI
Lahtonen, Jyrki; Ling, San; Solé, Patrick; Zinoviev, Dmitrii \(\mathbb Z_{8}\)-Kerdock codes and pseudorandom binary sequences. (English) Zbl 1059.94013 J. Complexity 20, No. 2-3, 318-330 (2004). Reviewer: Herman J. Tiersma (Den Haag) MSC: 94A55 94A60 94B60 PDFBibTeX XMLCite \textit{J. Lahtonen} et al., J. Complexity 20, No. 2--3, 318--330 (2004; Zbl 1059.94013) Full Text: DOI
Ling, San A family of group character codes. (English) Zbl 1050.94015 Eur. J. Comb. 25, No. 4, 579-590 (2004). Reviewer: Piroska Lakatos (Debrecen) MSC: 94B05 11T71 94B25 PDFBibTeX XMLCite \textit{S. Ling}, Eur. J. Comb. 25, No. 4, 579--590 (2004; Zbl 1050.94015) Full Text: DOI Link
Ling, San; Solé, Patrick On the algebraic structure of quasi-cyclic codes. II: Chain rings. (English) Zbl 1032.94011 Des. Codes Cryptography 30, No. 1, 113-130 (2003). Reviewer: T.Aaron Gulliver (Victoria) MSC: 94B05 11T71 94B15 PDFBibTeX XMLCite \textit{S. Ling} and \textit{P. Solé}, Des. Codes Cryptography 30, No. 1, 113--130 (2003; Zbl 1032.94011)
Ling, San; Solé, Patrick Nonlinear \(p\)-ary sequences. (English) Zbl 1041.94009 Appl. Algebra Eng. Commun. Comput. 14, No. 2, 117-125 (2003). Reviewer: Patrice Parraud (Guer) MSC: 94A55 94B15 11T71 PDFBibTeX XMLCite \textit{S. Ling} and \textit{P. Solé}, Appl. Algebra Eng. Commun. Comput. 14, No. 2, 117--125 (2003; Zbl 1041.94009) Full Text: DOI
Ling, San Duadic codes. (English) Zbl 1014.94013 Sunada, Toshikazu (ed.) et al., Proceedings of the third Asian mathematical conference 2000, University of the Philippines, Diliman, Philippines, October 23-27, 2000. Singapore: World Scientific. 324-336 (2002). MSC: 94B15 11T71 PDFBibTeX XMLCite \textit{S. Ling}, in: Proceedings of the third Asian mathematical conference 2000, University of the Philippines, Diliman, Philippines, October 23--27, 2000. Singapore: World Scientific. 324--336 (2002; Zbl 1014.94013)
Ling, San; Solé, Patrick On the algebraic structure of quasi-cyclic codes. I: Finite fields. (English) Zbl 1023.94015 IEEE Trans. Inf. Theory 47, No. 7, 2751-2760 (2001). Reviewer: T.Aaron Gulliver (Victoria) MSC: 94B05 94B40 94B15 11T71 PDFBibTeX XMLCite \textit{S. Ling} and \textit{P. Solé}, IEEE Trans. Inf. Theory 47, No. 7, 2751--2760 (2001; Zbl 1023.94015) Full Text: DOI Link
Ding, Cunsheng; Kohel, David R.; Ling, San Counting the number of points on affine diagonal curves. (English) Zbl 0994.11025 Lam, Kwok-Yan (ed.) et al., Cryptography and computational number theory. Proceedings of the workshop, CCNT’99, Singapore, November 22-26, 1999. Basel: Birkhäuser. Prog. Comput. Sci. Appl. Log. 20, 15-24 (2001). Reviewer: T.Helleseth (Bergen) MSC: 11G20 11T22 14G50 94A60 PDFBibTeX XMLCite \textit{C. Ding} et al., Prog. Comput. Sci. Appl. Log. 20, 15--24 (2001; Zbl 0994.11025)
Ling, San; Niederreiter, Harald; Xing, Chaoping Symmetric polynomials and some good codes. (English) Zbl 1020.94024 Finite Fields Appl. 7, No. 1, 142-148 (2001). Reviewer: H.J.Tiersma (Diemen) MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{S. Ling} et al., Finite Fields Appl. 7, No. 1, 142--148 (2001; Zbl 1020.94024) Full Text: DOI
Xing, Chaoping; Ling, San A class of linear codes with good parameters. (English) Zbl 1003.94031 IEEE Trans. Inf. Theory 46, No. 6, 2184-2188 (2000). MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{C. Xing} and \textit{S. Ling}, IEEE Trans. Inf. Theory 46, No. 6, 2184--2188 (2000; Zbl 1003.94031) Full Text: DOI Link
Ding, Cunsheng; Kohel, David R.; Ling, San Secret-sharing with a class of ternary codes. (English) Zbl 0951.68029 Theor. Comput. Sci. 246, No. 1-2, 285-298 (2000). MSC: 94A62 68P25 94A60 PDFBibTeX XMLCite \textit{C. Ding} et al., Theor. Comput. Sci. 246, No. 1--2, 285--298 (2000; Zbl 0951.68029) Full Text: DOI