San Ling

According to our database1, San Ling authored at least 169 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Trans. Symmetric Cryptol., 2019

Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories.
IEEE Trans. Information Theory, 2019

Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease.
Theor. Comput. Sci., 2019

Public key encryption with equality test from generic assumptions in the random oracle model.
Inf. Sci., 2019

SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Cryptology ePrint Archive, 2019

On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials.
Des. Codes Cryptogr., 2019

Binary Robust Positioning Patterns with Low Redundancy and Efficient Locating Algorithms.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

Forward-Secure Group Signatures from Lattices.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Accountable Tracing Signatures from Lattices.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
Geometric Orthogonal Codes of Size Larger Than Optical Orthogonal Codes.
IEEE Trans. Information Theory, 2018

On the Efficiency of FHE-Based Private Queries.
IEEE Trans. Dependable Sec. Comput., 2018

A lattice-based group signature scheme with verifier-local revocation.
Theor. Comput. Sci., 2018

The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields.
Cryptography and Communications, 2018

Construction of de Bruijn sequences from product of two irreducible polynomials.
Cryptography and Communications, 2018

Constant-Size Group Signatures from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Lattice-Based Zero-Knowledge Arguments for Integer Relations.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications.
IACR Cryptology ePrint Archive, 2017

Three new classes of optimal frequency-hopping sequence sets.
Des. Codes Cryptogr., 2017

Revocable Predicate Encryption from Lattices.
Proceedings of the Provable Security, 2017

Permutation codes correcting a single burst deletion II: Stable deletions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Geometric orthogonal codes better than optical orthogonal codes.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Analysis of Gong et al.'s CCA2-secure homomorphic encryption.
Theor. Comput. Sci., 2016

Semi-generic construction of public key encryption and identity-based encryption with equality test.
Inf. Sci., 2016

Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2016

Public Key Encryption with Equality Test in the Standard Model.
IACR Cryptology ePrint Archive, 2016

Better Security for Queries on Encrypted Databases.
IACR Cryptology ePrint Archive, 2016

Enumeration formulas for self-dual cyclic codes.
Finite Fields and Their Applications, 2016

CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test.
Comput. J., 2016

On self-dual cyclic codes of length pa over GR(p2, s).
Adv. in Math. of Comm., 2016

On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Spectral analysis of quasi-cyclic product codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

String concatenation construction for Chebyshev permutation channel codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Efficient encoding/decoding of capacity-achieving constant-composition ICI-free codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Rates of constant-composition codes that mitigate intercell interference.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Application of Constacyclic Codes to Quantum MDS Codes.
IEEE Trans. Information Theory, 2015

Polyadic Constacyclic Codes.
IEEE Trans. Information Theory, 2015

On the Efficiency of FHE-based Private Queries.
IACR Cryptology ePrint Archive, 2015

Hulls of cyclic and negacyclic codes over finite fields.
Finite Fields and Their Applications, 2015

Quasi-abelian codes.
Des. Codes Cryptogr., 2015

Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

A Provably Secure Group Signature Scheme from Code-Based Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Hermitian Self-Dual Abelian Codes.
IEEE Trans. Information Theory, 2014

On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random Function.
Math. Comput., 2014

A relation between embedding degrees and class numbers of binary quadratic forms.
Math. Comput., 2014

Homogeneous weights of matrix product codes over finite principal ideal rings.
Finite Fields and Their Applications, 2014

Matrix product codes over finite commutative Frobenius rings.
Des. Codes Cryptogr., 2014

Shorter identity-based encryption via asymmetric pairings.
Des. Codes Cryptogr., 2014

The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014

Spatial encryption supporting non-monotone access structure.
Des. Codes Cryptogr., 2014

The resistance of PRESENT-80 against related-key differential attacks.
Cryptography and Communications, 2014

Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Decoding of quasi-cyclic codes up to a new lower bound on the minimum distance.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Hardness of k-LWE and Applications in Traitor Tracing.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Efficient Two-Server Password-Only Authenticated Key Exchange.
IEEE Trans. Parallel Distrib. Syst., 2013

Abelian Codes in Principal Ideal Group Algebras.
IEEE Trans. Information Theory, 2013

CSS-Like Constructions of Asymmetric Quantum Codes.
IEEE Trans. Information Theory, 2013

Upper Bounds on Matching Families in BBZpqn.
IEEE Trans. Information Theory, 2013

On the Fourier Spectra of New APN Functions.
SIAM J. Discrete Math., 2013

The Resistance of PRESENT-80 Against Related-Key Differential Attacks.
IACR Cryptology ePrint Archive, 2013

A q-polynomial approach to cyclic codes.
Finite Fields and Their Applications, 2013

New results on two hypercube coloring problems.
Discrete Applied Mathematics, 2013

Query-Efficient Locally Decodable Codes of Subexponential Length.
Computational Complexity, 2013

Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Revocable IBE Systems with Almost Constant-Size Key Update.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

2012
Threshold changeable secret sharing schemes revisited.
Theor. Comput. Sci., 2012

Constructing irreducible polynomials over finite fields.
Math. Comput., 2012

Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences.
Math. Comput., 2012

On the modular inversion hidden number problem.
J. Symb. Comput., 2012

On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptology ePrint Archive, 2012

A note on linearized polynomials and the dimension of their kernels.
Finite Fields and Their Applications, 2012

A note on cyclic codes over GR(p 2, m) of length p k.
Des. Codes Cryptogr., 2012

Skew constacyclic codes over finite chain rings.
Adv. in Math. of Comm., 2012

Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Shorter IBE and Signatures via Asymmetric Pairings.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU.
Proceedings of the Advances in Information and Computer Security, 2012

On the (In)Security of IDEA in Various Hashing Modes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Differential Attacks against Stream Cipher ZUC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Revocable Identity-Based Encryption from Lattices.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Authentication of Digital Streams.
IEEE Trans. Information Theory, 2011

On Self-Dual Cyclic Codes Over Finite Fields.
IEEE Trans. Information Theory, 2011

Additive Asymmetric Quantum Codes.
IEEE Trans. Information Theory, 2011

Side-Channel Resistant Crypto for Less than 2, 300 GE.
J. Cryptology, 2011

Structure of functional codes defined on non-degenerate Hermitian varieties.
J. Comb. Theory, Ser. A, 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN.
IACR Cryptology ePrint Archive, 2011

Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptology ePrint Archive, 2011

The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption.
IACR Cryptology ePrint Archive, 2011

Association schemes arising from bent functions.
Des. Codes Cryptogr., 2011

List decodability at small radii.
Des. Codes Cryptogr., 2011

From skew-cyclic codes to asymmetric quantum codes.
Adv. in Math. of Comm., 2011

Pushing the Limits: A Very Compact and a Threshold Implementation of AES.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Asymmetric quantum codes: characterization and constructions.
IEEE Trans. Information Theory, 2010

Generalization of Steane's enlargement construction of quantum codes and applications.
IEEE Trans. Information Theory, 2010

Application of classical hermitian self-orthogonal MDS codes to quantum MDS codes.
IEEE Trans. Information Theory, 2010

Linear size optimal q-ary constant-weight codes and constant-composition codes.
IEEE Trans. Information Theory, 2010

Query-Efficient Locally Decodable Codes.
Electronic Colloquium on Computational Complexity (ECCC), 2010

256 Bit Standardized Crypto for 650 GE - GOST Revisited.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

On Multidimensional Linear Cryptanalysis.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions.
IEEE Trans. Information Theory, 2009

Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions.
IEEE Trans. Information Theory, 2009

On the constructions of constant-composition codes from perfect nonlinear functions.
Science in China Series F: Information Sciences, 2009

Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes.
Proceedings of the Cryptography and Coding, 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

2008
Access Structures of Elliptic Secret Sharing Schemes.
IEEE Trans. Information Theory, 2008

Improved Lower Bounds for Constant GC-Content DNA Codes.
IEEE Trans. Information Theory, 2008

The Sizes of Optimal q -Ary Codes of Weight Three and Distance Four: A Complete Solution.
IEEE Trans. Information Theory, 2008

Cycle Systems in the Complete Bipartite Graph Plus a One-Factor.
SIAM J. Discrete Math., 2008

Some constructions of (t, m, s)-nets with improved parameters.
Finite Fields and Their Applications, 2008

Cyclic codes over GR(p2, m) of length pk.
Finite Fields and Their Applications, 2008

Cryptanalysis of Rabbit.
Proceedings of the Information Security, 11th International Conference, 2008

Cryptanalysis of LASH.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 2008

2007
The PBD-Closure of Constant-Composition Codes.
IEEE Trans. Information Theory, 2007

Constructions for q-Ary Constant-Weight Codes.
IEEE Trans. Information Theory, 2007

Cryptanalysis of LASH.
IACR Cryptology ePrint Archive, 2007

Constructions and bounds on linear error-block codes.
Des. Codes Cryptogr., 2007

2006
On the reliability-order-based decoding algorithms for binary linear block codes.
IEEE Trans. Information Theory, 2006

Asymptotic bounds on quantum codes from algebraic geometry codes.
IEEE Trans. Information Theory, 2006

Aperiodic and Odd Correlations of Some p-Ary Sequences from Galois Rings.
IEICE Transactions, 2006

On the Algebraic Structure of Quasi-cyclic Codes IV: Repeated Roots.
Des. Codes Cryptogr., 2006

Cyclic Codes Over Z4 of Even Length.
Des. Codes Cryptogr., 2006

An explicit class of codes with good parameters and their duals.
Discrete Applied Mathematics, 2006

A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
The Probability of Undetected Error for Binary Constant-Weight Codes.
IEEE Trans. Information Theory, 2005

On the algebraic structure of quasi-cyclic codes III: generator theory.
IEEE Trans. Information Theory, 2005

Quantum codes from concatenated algebraic-geometric codes.
IEEE Trans. Information Theory, 2005

Improved p-ary Codes and Sequence Families from Galois Rings of Characteristic p2.
SIAM J. Discrete Math., 2005

On the variance of average distance of subsets in the Hamming space.
Discrete Applied Mathematics, 2005

Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights.
Proceedings of the Coding and Cryptography, International Workshop, 2005

2004
Polyadic codes revisited.
IEEE Trans. Information Theory, 2004

An improvement on the bounds of Weil exponential sums over Galois rings with some applications.
IEEE Trans. Information Theory, 2004

On Viterbi-like algorithms and their application to Reed-Muller codes.
J. Complexity, 2004

Z8-Kerdock codes and pseudorandom binary sequences.
J. Complexity, 2004

A family of group character codes.
Eur. J. Comb., 2004

Type II codes over F2m+uF2m.
Discrete Mathematics, 2004

Improved p-ary Codes and Sequence Families from Galois Rings.
Proceedings of the Sequences and Their Applications, 2004

2003
Good self-dual quasi-cyclic codes exist.
IEEE Trans. Information Theory, 2003

New lower bounds and constructions for binary codes correcting asymmetric errors.
IEEE Trans. Information Theory, 2003

On the Algebraic Structure of Quasi-cyclic Codes II: Chain Rings.
Des. Codes Cryptogr., 2003

Nonlinear p-ary Sequences.
Appl. Algebra Eng. Commun. Comput., 2003

2002
Zpk+1-Linear codes.
IEEE Trans. Information Theory, 2002

New binary linear codes from algebraic curves.
IEEE Trans. Information Theory, 2002

2001
On the algebraic structure of quasi-cyclic codes I: Finite fields.
IEEE Trans. Information Theory, 2001

Duadic codes over Z2k.
IEEE Trans. Information Theory, 2001

Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound.
IEEE Trans. Information Theory, 2001

Decomposing Quasi-Cyclic Codes.
Electronic Notes in Discrete Mathematics, 2001

Type II Codes OverF4 + uF4.
Eur. J. Comb., 2001

Duadic Codes over F2 + uF2.
Appl. Algebra Eng. Commun. Comput., 2001

2000
A class of linear codes with good parameters.
IEEE Trans. Information Theory, 2000

A class of linear codes with good parameters from algebraic curves.
IEEE Trans. Information Theory, 2000

Split group codes.
IEEE Trans. Information Theory, 2000

Elementary 2-group character codes.
IEEE Trans. Information Theory, 2000

Secret-sharing with a class of ternary codes.
Theor. Comput. Sci., 2000

1999
Attack on RSA-Type Cryptosystems Based on Singular Cubic Curves over Z/nZ.
Theor. Comput. Sci., 1999

1998
Explicit Sequence Expansions.
Proceedings of the Sequences and their Applications, 1998

1997
A Rabin-Type Scheme Based on y2 equiv x3 + bx2 mod n.
Proceedings of the Computing and Combinatorics, Third Annual International Conference, 1997

1996
Efficient Generation of Elliptic Curve Cryptosystems.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996


  Loading...