Chik How Tan

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
High weight code-based signature scheme from QC-LDPC codes
 
2024-05-31Paper
Depth-measurement trade-off for quantum search on block ciphers
Quantum Information Processing
2024-05-30Paper
A new key recovery attack on a code-based signature from the Lyubashevsky framework
Information Processing Letters
2023-10-12Paper
Attack on a code-based signature scheme from QC-LDPC codes
Codes, Cryptology and Information Security
2023-10-04Paper
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
Advances in Mathematics of Communications
2023-07-07Paper
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences
IEEE Transactions on Information Theory
2022-07-13Paper
On existence of vectorial bent functions from the \(\mathcal{PS}_{\mathrm{ap}}\) class
SCIENTIA SINICA Mathematica
2022-03-21Paper
On the design and security of Lee metric McEliece cryptosystems
Designs, Codes and Cryptography
2022-03-21Paper
On the security of the modified dual-Ouroboros PKE using Gabidulin codes
Applicable Algebra in Engineering, Communication and Computing
2021-12-17Paper
MURAVE: a new rank code-based signature with multiple rank verification
 
2021-01-26Paper
An answer to an open problem of Mesnager on bent functions
Information Processing Letters
2020-08-04Paper
Cryptanalysis on CCA2-secured LRPC-Kronecker cryptosystem
 
2020-05-27Paper
Key recovery attacks on some rank metric code-based signatures
 
2020-05-06Paper
Cryptanalysis of a rank-based signature with short public keys
Designs, Codes and Cryptography
2020-03-27Paper
New rank codes based encryption scheme using partial circulant matrices
Designs, Codes and Cryptography
2019-11-07Paper
A new Gabidulin-like code and its application in cryptography
 
2019-10-14Paper
On the near prime-order MNT curves
Applicable Algebra in Engineering, Communication and Computing
2019-05-16Paper
Key recovery attack on McNie based on low rank parity check codes and its reparation
 
2018-10-24Paper
On the security and key generation of the ZHFE encryption scheme
 
2018-10-24Paper
A new encryption scheme based on rank metric codes
 
2018-09-26Paper
Orthogonal MDS diffusion matrices over Galois rings
 
2018-04-20Paper
On the covering radius of the third order Reed-Muller code \(\mathrm{RM}(3, 7)\)
Designs, Codes and Cryptography
2018-01-26Paper
Generating complete Edwards curves
 
2017-08-25Paper
A new block cipher based on chaotic tent maps
IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications
2017-08-25Paper
New secondary constructions of differentially 4-uniform permutations over \(\mathbb F_{2^{2k}}\)
International Journal of Computer Mathematics
2017-07-28Paper
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting
IEEE Transactions on Information Theory
2017-07-27Paper
Improved Miller’s Algorithm for Computing Pairings on Edwards Curves
IEEE Transactions on Computers
2017-06-20Paper
Constructing Differentially 4-Uniform Permutations Over <formula formulatype="inline"><tex Notation="TeX">${\BBF}_{2^{2k}}$</tex> </formula> via the Switching Method
IEEE Transactions on Information Theory
2017-06-08Paper
New differentially 4-uniform permutations by modifying the inverse function on subfields
Cryptography and Communications
2017-02-09Paper
Implicit Quadratic Property of Differentially 4-Uniform Permutations
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences
Discrete Applied Mathematics
2016-11-02Paper
On the second-order nonlinearity of the hidden weighted bit function
Discrete Applied Mathematics
2016-10-07Paper
A secure variant of Yasuda, Takagi and Sakurai's signature scheme
Information Security and Cryptology
2016-07-25Paper
A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
Science China. Mathematics
2016-07-19Paper
Further refinements of Miller's algorithm on Edwards curves
Applicable Algebra in Engineering, Communication and Computing
2016-06-29Paper
New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
Finite Fields and their Applications
2016-05-19Paper
MI-T-HFE, a new multivariate signature scheme
Cryptography and Coding
2016-01-12Paper
Breaking an ID-based encryption based on discrete logarithm and factorization problems
Information Processing Letters
2015-12-01Paper
A family of cryptographically significant Boolean functions based on the hidden weighted bit function
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
On near prime-order elliptic curves with small embedding degrees
Algebraic Informatics
2015-09-22Paper
Algebraic cryptanalysis of Yasuda, Takagi and Sakurai's signature scheme
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Properties of a family of cryptographic Boolean functions
Sequences and Their Applications - SETA 2014
2015-09-09Paper
A construction of Boolean functions with good cryptographic properties
International Journal of Computer Mathematics
2015-06-24Paper
Concatenations of the hidden weighted bit function and their cryptographic properties
Advances in Mathematics of Communications
2014-11-28Paper
Six Constructions of Difference Families
 
2014-11-13Paper
Cryptographic properties of the hidden weighted bit function
Discrete Applied Mathematics
2014-08-22Paper
A new method to construct Boolean functions with good cryptographic properties
Information Processing Letters
2014-04-11Paper
On double exponentiation for securing RSA against fault analysis
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity
Discrete Applied Mathematics
2014-03-27Paper
On a class of quadratic polynomials with no zeros and its application to APN functions
Finite Fields and their Applications
2014-02-05Paper
Identity based identification from algebraic coding theory
Theoretical Computer Science
2014-01-13Paper
On the Fourier spectra of new APN functions
SIAM Journal on Discrete Mathematics
2013-09-26Paper
Speeding up Ate pairing computation in affine coordinates
Lecture Notes in Computer Science
2013-06-04Paper
What is your ``birthday elliptic curve?
Finite Fields and their Applications
2012-11-27Paper
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions
Information Processing Letters
2012-10-23Paper
New families of differentially 4-uniform permutations over \({\mathbb F}_{2^{2k}}\)
Lecture Notes in Computer Science
2012-09-07Paper
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Binomial differentially 4 uniform permutations with high nonlinearity
Finite Fields and their Applications
2012-05-07Paper
Improved precomputation scheme for scalar multiplication on elliptic curves
Cryptography and Coding
2011-12-16Paper
Certificateless cryptography with KGC trust level 3
Theoretical Computer Science
2011-10-10Paper
Certificateless public key encryption: a new generic construction and two pairing-free schemes
Theoretical Computer Science
2011-02-21Paper
Dynamic group key exchange revisited
Cryptology and Network Security
2010-12-07Paper
Probabilistic public key encryption with equality test
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Analysis of improved signcryption scheme with key privacy
Information Processing Letters
2010-01-29Paper
Secure public-key encryption scheme without random oracles
Information Sciences
2008-09-05Paper
scientific article; zbMATH DE number 2043341 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 1808279 (Why is no real title available?)
 
2002-09-26Paper
scientific article; zbMATH DE number 1740054 (Why is no real title available?)
 
2002-05-14Paper


Research outcomes over time


This page was built for person: Chik How Tan