San Ling

From MaRDI portal
Person:165896

Available identifiers

zbMath Open ling.sanMaRDI QIDQ165896

List of research outcomes

PublicationDate of PublicationType
New Families of MDS Symbol-Pair Codes From Matrix-Product Codes2024-03-19Paper
A Construction of Maximum Distance Profile Convolutional Codes With Small Alphabet Sizes2024-03-19Paper
Hulls of Reed-Solomon Codes via Algebraic Geometry Codes2024-03-18Paper
Three New Constructions of Optimal Locally Repairable Codes From Matrix-Product Codes2024-03-14Paper
Efficient generation of elliptic curve cryptosystems2024-01-29Paper
Constructing quantum error-correcting codes that require a variable amount of entanglement2024-01-25Paper
Type-II polyadic constacyclic codes over finite fields2023-07-14Paper
Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications2023-07-07Paper
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors2023-07-05Paper
Generalized negacyclic codes over finite fields2023-04-20Paper
On the construction of self-dual cyclic codes over \(\mathbb{Z}_4\) with arbitrary even length2022-10-06Paper
Asymmetric quantum Griesmer codes detecting a single bit-flip error2022-09-26Paper
A new framework for deniable secure key exchange2022-06-08Paper
Application of optimal \(p\)-ary linear codes to alphabet-optimal locally repairable codes2022-04-28Paper
Zero-knowledge proofs for committed symmetric Boolean functions2022-03-22Paper
A Comparison of Distance Bounds for Quasi-Twisted Codes2022-02-17Paper
Quasi-Cyclic Codes2021-11-26Paper
Patch-Based Holographic Image Sensing2021-11-19Paper
Adaptive oblivious transfer with access control from lattice assumptions2021-10-21Paper
New bounds on the minimum distance of cyclic codes2021-05-12Paper
An explicit expression for Euclidean self-dual cyclic codes of length \(2^k\) over Galois ring \(\mathrm{GR}(4,m)\)2021-04-08Paper
Public key encryption with equality test in the standard model2021-03-31Paper
Public key encryption with equality test from generic assumptions in the random oracle model2020-12-10Paper
Lightweight Key Encapsulation Using LDPC Codes on FPGAs2020-10-02Paper
On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications2020-09-29Paper
Provably Secure Group Signature Schemes From Code-Based Assumptions2020-09-29Paper
Threshold Changeable Ramp Secret Sharing2020-07-20Paper
Perfect state transfer on Cayley graphs over dihedral groups: the non-normal case2020-06-04Paper
Holographic sensing2020-04-27Paper
Robust Positioning Patterns with Low Redundancy2020-03-25Paper
Forward-secure group signatures from lattices2020-02-25Paper
Semi-generic construction of public key encryption and identity-based encryption with equality test2020-02-06Paper
Burst-Deletion-Correcting Codes for Permutations and Multipermutations2020-01-28Paper
Accountable tracing signatures from lattices2020-01-28Paper
Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes2019-11-07Paper
https://portal.mardi4nfdi.de/entity/Q52411872019-10-30Paper
Binary Robust Positioning Patterns with Low Redundancy and Efficient Locating Algorithms2019-10-15Paper
Construction and enumeration for self-dual cyclic codes over \(\mathbb Z_4\) of oddly even length2019-09-12Paper
Lattice-based group signatures: achieving full dynamicity (and deniability) with ease2019-08-13Paper
Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories2019-07-19Paper
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials2019-05-17Paper
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions2019-01-23Paper
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption2019-01-18Paper
Revocable predicate encryption from lattices2018-11-07Paper
Lattice-based zero-knowledge arguments for integer relations2018-09-26Paper
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields2018-08-28Paper
https://portal.mardi4nfdi.de/entity/Q45708552018-07-09Paper
Constant-size group signatures from lattices2018-05-29Paper
A lattice-based group signature scheme with verifier-local revocation2018-05-17Paper
Adaptive oblivious transfer with access control from lattice assumptions2018-04-06Paper
Zero-knowledge arguments for lattice-based PRFs and applications to E-cash2018-02-23Paper
Construction of de Bruijn sequences from product of two irreducible polynomials2018-02-14Paper
Hardness of \(k\)-LWE and applications in traitor tracing2018-01-05Paper
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions2017-08-08Paper
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions2017-08-08Paper
Hulls of cyclic and negacyclic codes over finite fields2017-08-03Paper
Linear Size Optimal $q$-ary Constant-Weight Codes and Constant-Composition Codes2017-07-27Paper
On Self-Dual Cyclic Codes Over Finite Fields2017-07-27Paper
Application of Classical Hermitian Self-Orthogonal MDS Codes to Quantum MDS Codes2017-07-27Paper
Generalization of Steane's Enlargement Construction of Quantum Codes and Applications2017-07-27Paper
Asymmetric Quantum Codes: Characterization and Constructions2017-07-27Paper
Authentication of Digital Streams2017-07-12Paper
Additive Asymmetric Quantum Codes2017-07-12Paper
CSS-Like Constructions of Asymmetric Quantum Codes2017-06-08Paper
Upper Bounds on Matching Families in <formula formulatype="inline"> <tex Notation="TeX">$\BBZ_{pq}^{n}$</tex></formula>2017-06-08Paper
Abelian Codes in Principal Ideal Group Algebras2017-06-08Paper
External Difference Families from Finite Fields2017-05-23Paper
Hermitian Self-Dual Abelian Codes2017-05-16Paper
Spectral Analysis of Quasi-Cyclic Product Codes2017-04-28Paper
Polyadic Constacyclic Codes2017-04-28Paper
Application of Constacyclic Codes to Quantum MDS Codes2017-04-28Paper
Three new classes of optimal frequency-hopping sequence sets2017-03-23Paper
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption2017-01-06Paper
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions2017-01-06Paper
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs2016-10-21Paper
On self-dual cyclic codes of length \(p^a\) over \(\mathrm{GR}(p^2,s)\)2016-10-12Paper
Enumeration formulas for self-dual cyclic codes2016-10-10Paper
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors2016-07-15Paper
Analysis of Gong et al.'s CCA2-secure homomorphic encryption2016-07-05Paper
A Provably Secure Group Signature Scheme from Code-Based Assumptions2016-06-10Paper
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers2015-12-04Paper
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based2015-08-27Paper
Quasi-abelian codes2015-03-12Paper
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-1282015-01-16Paper
On the Multidimensional Distribution of the Naor–Reingold Pseudo-Random Function2014-09-10Paper
A relation between embedding degrees and class numbers of binary quadratic forms2014-09-10Paper
Spatial encryption supporting non-monotone access structure2014-09-04Paper
Shorter identity-based encryption via asymmetric pairings2014-09-04Paper
Homogeneous weights of matrix product codes over finite principal ideal rings2014-09-02Paper
Hardness of k-LWE and Applications in Traitor Tracing2014-08-07Paper
The resistance of PRESENT-80 against related-key differential attacks2014-06-20Paper
Matrix product codes over finite commutative Frobenius rings2014-04-29Paper
The relation and transformation between hierarchical inner product encryption and spatial encryption2014-04-29Paper
New results on two hypercube coloring problems2014-04-23Paper
Lattice-Based Group Signature Scheme with Verifier-Local Revocation2014-03-25Paper
Revocable IBE Systems with Almost Constant-Size Key Update2014-02-18Paper
On the Fourier Spectra of New APN Functions2013-09-26Paper
PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION2013-08-28Paper
Algebraic Curves in Cryptography2013-07-15Paper
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications2013-04-19Paper
Query-efficient locally decodable codes of subexponential length2013-04-11Paper
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU2013-04-04Paper
Shorter IBE and Signatures via Asymmetric Pairings2013-04-04Paper
A \(q\)-polynomial approach to cyclic codes2013-03-20Paper
Differential Attacks against Stream Cipher ZUC2013-03-19Paper
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures2013-03-18Paper
On the (In)Security of IDEA in Various Hashing Modes2013-01-08Paper
Revocable Identity-Based Encryption from Lattices2012-09-07Paper
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model2012-07-20Paper
Constructing irreducible polynomials over finite fields2012-06-29Paper
Skew constacyclic codes over finite chain rings2012-05-11Paper
On the modular inversion hidden number problem2012-05-04Paper
Threshold changeable secret sharing schemes revisited2012-03-13Paper
A note on cyclic codes over \(\mathrm{GR}(p^{2},m)\) of length \(p^{k}\)2012-03-01Paper
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences2012-02-17Paper
A note on linearized polynomials and the dimension of their kernels2012-02-11Paper
Side-channel resistant crypto for less than 2,300 GE2012-01-18Paper
Structure of functional codes defined on non-degenerate Hermitian varieties2011-10-21Paper
List decodability at small radii2011-09-27Paper
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)2011-07-07Paper
Pushing the Limits: A Very Compact and a Threshold Implementation of AES2011-05-27Paper
From skew-cyclic codes to asymmetric quantum codes2011-05-17Paper
Association schemes arising from bent functions2011-04-08Paper
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-22010-12-07Paper
256 Bit Standardized Crypto for 650 GE – GOST Revisited2010-08-17Paper
On the constructions of constant-composition codes from perfect nonlinear functions2010-02-26Paper
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes2010-01-07Paper
Practical Pseudo-collisions for Hash Functions ARIRANG-224/3842009-12-09Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Constructions and bounds on linear error-block codes2009-03-31Paper
Improved Lower Bounds for Constant GC-Content DNA Codes2009-02-24Paper
Access Structures of Elliptic Secret Sharing Schemes2009-02-24Paper
The Sizes of Optimal $q$-Ary Codes of Weight Three and Distance Four: A Complete Solution2009-02-24Paper
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes2009-02-10Paper
Quantum Codes From Concatenated Algebraic-Geometric Codes2008-12-21Paper
Asymptotic bounds on quantum codes from algebraic geometry codes2008-12-21Paper
New lower bounds and constructions for binary codes correcting asymmetric errors2008-12-21Paper
An Improvement on the Bounds of Weil Exponential Sums Over Galois Rings With Some Applications2008-12-21Paper
On the Algebraic Structure of Quasi-Cyclic Codes III: Generator Theory2008-12-21Paper
Polyadic Codes Revisited2008-12-21Paper
On the reliability-order-based decoding algorithms for binary linear block codes2008-12-21Paper
The Probability of Undetected Error for Binary Constant-Weight Codes2008-12-21Paper
Constructions for $q$-Ary Constant-Weight Codes2008-12-21Paper
A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes2008-12-21Paper
Cycle Systems in the Complete Bipartite Graph Plus a One-Factor2008-12-05Paper
Cryptanalysis of Rabbit2008-11-20Paper
Cryptanalysis of LASH2008-09-18Paper
Some constructions of \((t,m,s)\)-nets with improved parameters2008-08-27Paper
Cyclic codes over \(\text{GR}(p^2,m)\) of length \(p^k\)2008-08-27Paper
Improved p-ary Codes and Sequence Families from Galois Rings2008-03-14Paper
Coding and Cryptography2007-05-02Paper
Improved p-ary Codes and Sequence Families from Galois Rings of Characteristic p22006-06-01Paper
On the algebraic structure of quasi-cyclic codes. IV: Repeated roots2006-05-29Paper
Cyclic codes over \(\mathbb Z_4\) of even length2006-05-29Paper
An explicit class of codes with good parameters and their duals2006-04-28Paper
A class of Artin-Schreier towers with finite genus2006-01-17Paper
Good self-dual quasi-cyclic codes exist2005-06-01Paper
Z(p/sup k+1/)-linear codes2005-05-11Paper
On the variance of average distance of subsets in the Hamming space2005-02-23Paper
https://portal.mardi4nfdi.de/entity/Q31548592005-01-14Paper
https://portal.mardi4nfdi.de/entity/Q31548652005-01-14Paper
A family of group character codes2004-08-06Paper
\(\mathbb Z_{8}\)-Kerdock codes and pseudorandom binary sequences2004-08-06Paper
On Viterbi-like algorithms and their application to Reed-Muller codes2004-08-06Paper
Duadic codes over \(\mathbb{F}_2+u\mathbb{F}_2\)2004-02-18Paper
Type II codes over \(\mathbb{F}_{2^m} + u\mathbb{F}_{2^m}\)2004-02-02Paper
Symmetric polynomials and some good codes2003-09-30Paper
On the algebraic structure of quasi-cyclic codes. II: Chain rings2003-09-07Paper
Nonlinear \(p\)-ary sequences2003-09-01Paper
https://portal.mardi4nfdi.de/entity/Q47923552003-07-22Paper
Highly symmetric expanders2002-09-30Paper
Duadic codes over Z/sub 2k/2002-08-04Paper
Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound2002-08-04Paper
On the algebraic structure of quasi-cyclic codes .I. Finite fields2002-08-04Paper
New binary linear codes from algebraic curves2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q43306362002-05-14Paper
Type II codes over \(\mathbb{F}_4+u\mathbb{F}_4\)2002-05-05Paper
Maps between Jacobians of Shimura curves and congruence kernels2002-05-04Paper
https://portal.mardi4nfdi.de/entity/Q27414372001-10-15Paper
Constructions of semi-regular relative difference sets2001-09-11Paper
https://portal.mardi4nfdi.de/entity/Q27086372001-07-17Paper
A class of linear codes with good parameters2001-03-19Paper
Secret-sharing with a class of ternary codes2000-10-26Paper
Component group of the \(p\)-new subvariety of \(J_0 (Mp)\)2000-09-19Paper
Elementary 2-group character codes2000-09-07Paper
Split group codes2000-09-07Paper
A class of linear codes with good parameters from algebraic curves2000-09-07Paper
Attack on RSA-type cryptosystems based on singular cubic curves over \(\mathbb{Z}/n\mathbb{Z}\)2000-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44862362000-06-26Paper
https://portal.mardi4nfdi.de/entity/Q42669292000-06-07Paper
The rank of a latin square associated to an abelian group2000-03-23Paper
On component groups of 𝐽₀(𝑁) and degeneracy maps1998-09-22Paper
Almost perfect sequences with \(\theta =2\)1998-07-13Paper
https://portal.mardi4nfdi.de/entity/Q43645881997-12-15Paper
On the \(\mathbb{Q}\)-rational cuspidal subgroup and the component group of \(J_0(p^r)\)1997-12-14Paper
On the rational cuspidal subgroup and the rational torsion points of $J_0(pq)$1997-12-11Paper
Shimura subgroups and degeneracy maps1996-10-27Paper
The old subvariety of \(J_ 0(pq)\) and the Eisenstein kernel in Jacobians1994-11-27Paper
Shimura Subgroups of Jacobians of Shimura Curves1994-09-15Paper
Congruences between cusp forms and the geometry of Jacobians of modular curves1994-06-16Paper
The Fitting ideal of \(J_ 0(q)(\mathbb{F}_{p^ n})\) over the Hecke algebra1994-06-06Paper
Projective Covering Designs1994-05-03Paper
https://portal.mardi4nfdi.de/entity/Q40261951993-02-21Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: San Ling