Tung Chou

Orcid: 0000-0003-3043-6190

According to our database1, Tung Chou authored at least 30 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Representations of Elementary Vectors in VOLE-in-the-head-based Schemes.
IACR Cryptol. ePrint Arch., 2025

2024
Reducing Signature Size of Matrix-Code-Based Signature Schemes.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

CryptAttackTester: high-assurance attack analysis.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
On Linear Equivalence, Canonical Forms, and Digital Signatures.
IACR Cryptol. ePrint Arch., 2023

CryptAttackTester: formalizing attack analyses.
IACR Cryptol. ePrint Arch., 2023

Take Your MEDS: Digital Signatures from Matrix Code Equivalence.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
A Constant-time AVX2 Implementation of a Variant of ROLLO.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Complete and Improved FPGA Implementation of Classic McEliece.
IACR Cryptol. ePrint Arch., 2022

2021
Rainbow on Cortex-M4.
IACR Cryptol. ePrint Arch., 2021

Optimizing BIKE for the Intel Haswell and ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2021

Classic McEliece on the ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2021

CTIDH: faster constant-time CSIDH.
IACR Cryptol. ePrint Arch., 2021

2020
An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

2018
McBits revisited: toward a fast constant-time code-based KEM.
J. Cryptogr. Eng., 2018

A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
McBits Revisited.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Solving Quadratic Equations with XL on Parallel Architectures - extended version.
IACR Cryptol. ePrint Arch., 2016

QcBits: Constant-Time Small-Key Code-Based Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Sandy2x: New Curve25519 Speed Records.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

The Simplest Protocol for Oblivious Transfer.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2014
How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014

Faster Binary-Field Multiplication and Faster Binary-Field MACs.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

2013
Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013

Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

McBits: Fast Constant-Time Code-Based Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

2012
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Solving Quadratic Equations with XL on Parallel Architectures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2010
Fast Exhaustive Search for Polynomial Systems in F<sub>2</sub>.
IACR Cryptol. ePrint Arch., 2010

Fast Exhaustive Search for Polynomial Systems in <i>F</i><sub>2</sub>.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010


  Loading...