Matthew Kwan

Orcid: 0000-0002-4003-7567

According to our database1, Matthew Kwan authored at least 22 papers between 1991 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
List-Decodability With Large Radius for Reed-Solomon Codes.
IEEE Trans. Inf. Theory, 2022

Dirac-type theorems in random hypergraphs.
J. Comb. Theory, Ser. B, 2022

Singularity of sparse random matrices: simple proofs.
Comb. Probab. Comput., 2022

2021
Lower bounds for superpatterns and universal sequences.
J. Comb. Theory, Ser. A, 2021

2020
Extension complexity of low-dimensional polytopes.
CoRR, 2020

Dense Induced Bipartite Subgraphs in Triangle-Free Graphs.
Comb., 2020

2019
Anticoncentration for subgraph statistics.
J. Lond. Math. Soc., 2019

2018
Intercalates and discrepancy in random Latin squares.
Random Struct. Algorithms, 2018

The random k-matching-free process.
Random Struct. Algorithms, 2018

Counting Hamilton cycles in sparse random directed graphs.
Random Struct. Algorithms, 2018

Non-trivially intersecting multi-part families.
J. Comb. Theory, Ser. A, 2018

Experiential Learning in an Online IT Program: A Case Study of Third-Party Capstone Project Sourcing.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

2017
Bounded-Degree Spanning Trees in Randomly Perturbed Graphs.
SIAM J. Discret. Math., 2017

Resilience for the Littlewood-Offord Problem.
Electron. Notes Discret. Math., 2017

The average number of spanning trees in sparse graphs with given degrees.
Eur. J. Comb., 2017

2015
Cycles and matchings in randomly perturbed digraphs and hypergraphs.
Electron. Notes Discret. Math., 2015

2014
On the Number of Spanning Trees in Random Regular Graphs.
Electron. J. Comb., 2014

2000
Reducing the Gate Count of Bitslice DES.
IACR Cryptol. ePrint Arch., 2000

1997
The Design of the ICE Encryption Algorithm.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

1991
A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption).
Proceedings of the Advances in Cryptology, 1991

Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI.
Proceedings of the Advances in Cryptology, 1991


  Loading...