Chik How Tan

According to our database1, Chik How Tan authored at least 106 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Analysis of TPL Signature Scheme.
IACR Cryptology ePrint Archive, 2019

New rank codes based encryption scheme using partial circulant matrices.
Des. Codes Cryptogr., 2019

Key Recovery Attack on Rank Quasi-Cyclic Code-based Signature Scheme.
CoRR, 2019

On the near prime-order MNT curves.
Appl. Algebra Eng. Commun. Comput., 2019

Key Recovery Attacks on Some Rank Metric Code-Based Signatures.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

A New Gabidulin-Like Code and Its Application in Cryptography.
Proceedings of the Codes, Cryptology and Information Security, 2019

Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
More New Classes of Differentially 4-Uniform Permutations with Good Cryptographic Properties.
IEICE Transactions, 2018

On the covering radius of the third order Reed-Muller code RM(3, 7).
Des. Codes Cryptogr., 2018

A New Technique in Rank Metric Code-Based Encryption.
Cryptography, 2018

Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation.
Proceedings of the Advances in Information and Computer Security, 2018

Rank Metric Code-based Signature.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Almost Orthogonal MDS Matrices over GR(2n, k).
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

A New Encryption Scheme Based on Rank Metric Codes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
New secondary constructions of differentially 4-uniform permutations over.
Int. J. Comput. Math., 2017

New differentially 4-uniform permutations by modifying the inverse function on subfields.
Cryptography and Communications, 2017

Orthogonal MDS Diffusion Matrices over Galois Rings.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

Generating Complete Edwards Curves.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Breaking an ID-based encryption based on discrete logarithm and factorization problems.
Inf. Process. Lett., 2016

On the Security and Key Generation of the ZHFE Encryption Scheme.
IACR Cryptology ePrint Archive, 2016

New explicit constructions of differentially 4-uniform permutations via special partitions of F22k.
Finite Fields and Their Applications, 2016

On the second-order nonlinearity of the hidden weighted bit function.
Discrete Applied Mathematics, 2016

Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences.
Discrete Applied Mathematics, 2016

Further refinements of Miller's algorithm on Edwards curves.
Appl. Algebra Eng. Commun. Comput., 2016

Implicit Quadratic Property of Differentially 4-Uniform Permutations.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

2015
A construction of Boolean functions with good cryptographic properties.
Int. J. Comput. Math., 2015

Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces.
IACR Cryptology ePrint Archive, 2015

MI-T-HFE, a New Multivariate Signature Scheme.
IACR Cryptology ePrint Archive, 2015

Randomizing the Montgomery Powering Ladder.
IACR Cryptology ePrint Archive, 2015

On near prime-order elliptic curves with small embedding degrees.
IACR Cryptology ePrint Archive, 2015

New bounds on the imbalance of a half-l-sequence.
Proceedings of the IEEE International Symposium on Information Theory, 2015

A Secure Variant of Yasuda, Takagi and Sakurai's Signature Scheme.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Identity based identification from algebraic coding theory.
Theor. Comput. Sci., 2014

Improved Miller's Algorithm for Computing Pairings on Edwards Curves.
IEEE Trans. Computers, 2014

On a class of quadratic polynomials with no zeros and its application to APN functions.
Finite Fields and Their Applications, 2014

Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity.
Discrete Applied Mathematics, 2014

Cryptographic properties of the hidden weighted bit function.
Discrete Applied Mathematics, 2014

A new construction of differentially 4-uniform permutations over $F_{2^{2k}}$.
CoRR, 2014

Six Constructions of Difference Families.
CoRR, 2014

Concatenations of the hidden weighted bit function and their cryptographic properties.
Adv. in Math. of Comm., 2014

Properties of a Family of Cryptographic Boolean Functions.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

Cryptographic boolean functions with a large number of variables.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

On Double Exponentiation for Securing RSA against Fault Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

A new perturbed matsumoto-imai signature scheme.
Proceedings of the ASIAPKC'14, 2014

2013
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method.
IEEE Trans. Information Theory, 2013

On the Fourier Spectra of New APN Functions.
SIAM J. Discrete Math., 2013

A new method to construct Boolean functions with good cryptographic properties.
Inf. Process. Lett., 2013

Speeding up Ate Pairing Computation in Affine Coordinates.
IACR Cryptology ePrint Archive, 2013

A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions.
Inf. Process. Lett., 2012

SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks.
IACR Cryptology ePrint Archive, 2012

What is your "birthday elliptic curve"?
Finite Fields and Their Applications, 2012

Binomial differentially 4 uniform permutations with high nonlinearity.
Finite Fields and Their Applications, 2012

New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Certificateless cryptography with KGC trust level 3.
Theor. Comput. Sci., 2011

Certificateless public key encryption: A new generic construction and two pairing-free schemes.
Theor. Comput. Sci., 2011

Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity.
IEICE Transactions, 2011

Authenticated Key Exchange under Bad Randomness.
IACR Cryptology ePrint Archive, 2011

A Comparison of Post-Processing Techniques for Biased Random Number Generators.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Strongly secure certificateless key exchange without pairing.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting".
IEEE Trans. Information Theory, 2010

Probabilistic Public Key Encryption with Equality Test.
Proceedings of the Topics in Cryptology, 2010

Dynamic Group Key Exchange Revisited.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings.
Int. J. Reconfig. Comp., 2009

2008
Secure public-key encryption scheme without random oracles.
Inf. Sci., 2008

On the Security of Provably Secure Multi-Receiver ID-Based Signcryption Scheme.
IEICE Transactions, 2008

Signcryption Scheme in Multi-user Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008

Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles.
Proceedings of the The Third International Conference on Availability, 2008

2007
Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks.
Telecommunication Systems, 2007

Forgery of Provable Secure Short Signcryption Scheme.
IEICE Transactions, 2007

Security Analysis of Joint Group Key Agreement Protocol.
IEICE Transactions, 2007

Authenticated Group Key Agreement Against DoS in Heterogeneous Wireless Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Denial-of-service resilience password-based group key agreement for wireless networks.
Proceedings of the Q2SWinet'07, 2007

Protection AgainstWeb-based Password Phishing.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Authenticated Broadcast Encryption Scheme.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Insider-secure Hybrid Signcryption SchemeWithout Random Oracles.
Proceedings of the The Second International Conference on Availability, 2007

2006
Analysis of improved signcryption scheme with key privacy.
Inf. Process. Lett., 2006

Low-power authenticated group key agreement for heterogeneous wireless networks.
IJSN, 2006

A new signature scheme without random oracles.
IJSN, 2006

Security Analysis of Provably Secure Constant Round Dynamic Group Key Agreement.
IEICE Transactions, 2006

Authenticated Dynamic Group Key Agreement for Autoconfigurable Mobile Ad Hoc Networks.
IEICE Transactions, 2006

On Waters' Signature Scheme.
IEICE Transactions, 2006

Signature Scheme in Multi-User Setting.
IEICE Transactions, 2006

Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems.
IEICE Transactions, 2006

Public-Key Encryption from ID-Based Encryption Without One-Time Signature.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition.
Proceedings of the Advances in Information and Computer Security, 2006

Low-power group key agreement for heterogeneous wireless networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

A secure signature scheme.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Energy-efficient ID-based group key agreement protocols for wireless networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Certificateless Authenticated Two-Party Key Agreement Protocols.
Proceedings of the Advances in Computer Science, 2006

2005
On the Security of Signcryption Scheme with Key Privacy.
IEICE Transactions, 2005

Key Substitution Attacks on Provably Secure Short Signature Schemes.
IEICE Transactions, 2005

An authenticated group key agreement for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Energy-efficient and scalable group key agreement for large ad hoc networks.
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005

A New Electronic Cash Model.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
Key Substitution Attacks on Some Provably Secure Signature Schemes.
IEICE Transactions, 2004

2003
A secure conference scheme for mobile communications.
IEEE Trans. Wireless Communications, 2003

A secure and efficient conference scheme for mobile communications.
IEEE Trans. Vehicular Technology, 2003

A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
ID-based key agreement for multimedia encryption.
IEEE Trans. Consumer Electronics, 2002

2001
Fast encryption for multimedia.
IEEE Trans. Consumer Electronics, 2001

Signature Schemes Based on 3rd Order Shift Registers.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

1998
Period and Linear Complexity of Cascaded Clock-Controlled Generators.
Proceedings of the Sequences and their Applications, 1998


  Loading...