San Ling

From MaRDI portal
Person:165896

Available identifiers

zbMath Open ling.sanMaRDI QIDQ165896

List of research outcomes





PublicationDate of PublicationType
Griesmer bound and constructions of linear codes in b-symbol metric2025-01-23Paper
Succinct non-subsequence arguments2025-01-10Paper
Fully dynamic attribute-based signatures for circuits from codes2024-11-12Paper
Improved spectral bound for quasi-cyclic codes2024-07-23Paper
On linear codes whose Hermitian hulls are MDS2024-07-23Paper
On the weights of linear codes with prescribed automorphisms2024-07-23Paper
Explicit low-bandwidth evaluation schemes for weighted sums of Reed-Solomon-coded symbols2024-07-23Paper
A Construction of Maximum Distance Profile Convolutional Codes With Small Alphabet Sizes2024-03-19Paper
New Families of MDS Symbol-Pair Codes From Matrix-Product Codes2024-03-19Paper
Hulls of Reed-Solomon Codes via Algebraic Geometry Codes2024-03-18Paper
Three New Constructions of Optimal Locally Repairable Codes From Matrix-Product Codes2024-03-14Paper
Efficient generation of elliptic curve cryptosystems2024-01-29Paper
Constructing quantum error-correcting codes that require a variable amount of entanglement2024-01-25Paper
A Construction of Asymptotically Optimal Cascaded CDC Schemes via Combinatorial Designs2023-09-08Paper
Type-II polyadic constacyclic codes over finite fields2023-07-14Paper
Sharper Asymptotically Optimal CDC Schemes via Combinatorial Designs2023-07-09Paper
Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications2023-07-07Paper
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors2023-07-05Paper
Generalized negacyclic codes over finite fields2023-04-20Paper
On the construction of self-dual cyclic codes over \(\mathbb{Z}_4\) with arbitrary even length2022-10-06Paper
Asymmetric quantum Griesmer codes detecting a single bit-flip error2022-09-26Paper
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease2022-07-01Paper
A new framework for deniable secure key exchange2022-06-08Paper
Application of optimal \(p\)-ary linear codes to alphabet-optimal locally repairable codes2022-04-28Paper
Zero-knowledge proofs for committed symmetric Boolean functions2022-03-22Paper
A Comparison of Distance Bounds for Quasi-Twisted Codes2022-02-17Paper
Quasi-Cyclic Codes2021-11-26Paper
Patch-Based Holographic Image Sensing2021-11-19Paper
Adaptive oblivious transfer with access control from lattice assumptions2021-10-21Paper
New bounds on the minimum distance of cyclic codes2021-05-12Paper
An explicit expression for Euclidean self-dual cyclic codes of length \(2^k\) over Galois ring \(\mathrm{GR}(4,m)\)2021-04-08Paper
Public key encryption with equality test in the standard model2021-03-31Paper
Public key encryption with equality test from generic assumptions in the random oracle model2020-12-10Paper
Lightweight Key Encapsulation Using LDPC Codes on FPGAs2020-10-02Paper
Provably Secure Group Signature Schemes From Code-Based Assumptions2020-09-29Paper
On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications2020-09-29Paper
Threshold Changeable Ramp Secret Sharing2020-07-20Paper
Perfect state transfer on Cayley graphs over dihedral groups: the non-normal case2020-06-04Paper
Holographic sensing2020-04-27Paper
Robust Positioning Patterns with Low Redundancy2020-03-25Paper
Forward-secure group signatures from lattices2020-02-25Paper
Semi-generic construction of public key encryption and identity-based encryption with equality test2020-02-06Paper
Accountable tracing signatures from lattices2020-01-28Paper
Burst-Deletion-Correcting Codes for Permutations and Multipermutations2020-01-28Paper
Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes2019-11-07Paper
https://portal.mardi4nfdi.de/entity/Q52411872019-10-30Paper
Binary Robust Positioning Patterns with Low Redundancy and Efficient Locating Algorithms2019-10-15Paper
Construction and enumeration for self-dual cyclic codes over \(\mathbb Z_4\) of oddly even length2019-09-12Paper
Lattice-based group signatures: achieving full dynamicity (and deniability) with ease2019-08-13Paper
Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories2019-07-19Paper
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials2019-05-17Paper
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions2019-01-23Paper
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption2019-01-18Paper
Revocable predicate encryption from lattices2018-11-07Paper
Lattice-based zero-knowledge arguments for integer relations2018-09-26Paper
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields2018-08-28Paper
https://portal.mardi4nfdi.de/entity/Q45708552018-07-09Paper
Constant-size group signatures from lattices2018-05-29Paper
A lattice-based group signature scheme with verifier-local revocation2018-05-17Paper
Adaptive oblivious transfer with access control from lattice assumptions2018-04-06Paper
Zero-knowledge arguments for lattice-based PRFs and applications to E-cash2018-02-23Paper
Construction of de Bruijn sequences from product of two irreducible polynomials2018-02-14Paper
Hardness of \(k\)-LWE and applications in traitor tracing2018-01-05Paper
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions2017-08-08Paper
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions2017-08-08Paper
Hulls of cyclic and negacyclic codes over finite fields2017-08-03Paper
Asymmetric Quantum Codes: Characterization and Constructions2017-07-27Paper
On Self-Dual Cyclic Codes Over Finite Fields2017-07-27Paper
Application of Classical Hermitian Self-Orthogonal MDS Codes to Quantum MDS Codes2017-07-27Paper
Linear Size Optimal $q$-ary Constant-Weight Codes and Constant-Composition Codes2017-07-27Paper
Generalization of Steane's Enlargement Construction of Quantum Codes and Applications2017-07-27Paper
Additive Asymmetric Quantum Codes2017-07-12Paper
Authentication of Digital Streams2017-07-12Paper
CSS-Like Constructions of Asymmetric Quantum Codes2017-06-08Paper
Abelian Codes in Principal Ideal Group Algebras2017-06-08Paper
Upper Bounds on Matching Families in <formula formulatype="inline"> <tex Notation="TeX">$\BBZ_{pq}^{n}$</tex></formula>2017-06-08Paper
External Difference Families from Finite Fields2017-05-23Paper
Hermitian Self-Dual Abelian Codes2017-05-16Paper
Application of Constacyclic Codes to Quantum MDS Codes2017-04-28Paper
Polyadic Constacyclic Codes2017-04-28Paper
Spectral Analysis of Quasi-Cyclic Product Codes2017-04-28Paper
Three new classes of optimal frequency-hopping sequence sets2017-03-23Paper
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions2017-01-06Paper
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption2017-01-06Paper
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs2016-10-21Paper
On self-dual cyclic codes of length \(p^a\) over \(\mathrm{GR}(p^2,s)\)2016-10-12Paper
Enumeration formulas for self-dual cyclic codes2016-10-10Paper
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors2016-07-15Paper
Analysis of Gong et al.'s CCA2-secure homomorphic encryption2016-07-05Paper
A Provably Secure Group Signature Scheme from Code-Based Assumptions2016-06-10Paper
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers2015-12-04Paper
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based2015-08-27Paper
Quasi-abelian codes2015-03-12Paper
Construction of Quasi-Cyclic Product Codes2015-01-26Paper
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-1282015-01-16Paper
On the Multidimensional Distribution of the Naor–Reingold Pseudo-Random Function2014-09-10Paper
A relation between embedding degrees and class numbers of binary quadratic forms2014-09-10Paper
Shorter identity-based encryption via asymmetric pairings2014-09-04Paper
Spatial encryption supporting non-monotone access structure2014-09-04Paper
Homogeneous weights of matrix product codes over finite principal ideal rings2014-09-02Paper
Hardness of k-LWE and Applications in Traitor Tracing2014-08-07Paper
The resistance of PRESENT-80 against related-key differential attacks2014-06-20Paper
Matrix product codes over finite commutative Frobenius rings2014-04-29Paper
The relation and transformation between hierarchical inner product encryption and spatial encryption2014-04-29Paper
New results on two hypercube coloring problems2014-04-23Paper
Lattice-Based Group Signature Scheme with Verifier-Local Revocation2014-03-25Paper
Revocable IBE Systems with Almost Constant-Size Key Update2014-02-18Paper
On the Fourier spectra of new APN functions2013-09-26Paper
Pure asymmetric quantum MDS codes from CSS construction: a complete characterization2013-08-28Paper
Algebraic curves in cryptography2013-07-15Paper
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications2013-04-19Paper
Query-efficient locally decodable codes of subexponential length2013-04-11Paper
Shorter IBE and Signatures via Asymmetric Pairings2013-04-04Paper
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU2013-04-04Paper
A \(q\)-polynomial approach to cyclic codes2013-03-20Paper
Differential Attacks against Stream Cipher ZUC2013-03-19Paper
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures2013-03-18Paper
On the (In)Security of IDEA in Various Hashing Modes2013-01-08Paper
Revocable Identity-Based Encryption from Lattices2012-09-07Paper
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model2012-07-20Paper
Constructing irreducible polynomials over finite fields2012-06-29Paper
Skew constacyclic codes over finite chain rings2012-05-11Paper
On the modular inversion hidden number problem2012-05-04Paper
Threshold changeable secret sharing schemes revisited2012-03-13Paper
A note on cyclic codes over \(\mathrm{GR}(p^{2},m)\) of length \(p^{k}\)2012-03-01Paper
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences2012-02-17Paper
A note on linearized polynomials and the dimension of their kernels2012-02-11Paper
Side-channel resistant crypto for less than 2,300 GE2012-01-18Paper
Structure of functional codes defined on non-degenerate Hermitian varieties2011-10-21Paper
List decodability at small radii2011-09-27Paper
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)2011-07-07Paper
Pushing the Limits: A Very Compact and a Threshold Implementation of AES2011-05-27Paper
From skew-cyclic codes to asymmetric quantum codes2011-05-17Paper
Association schemes arising from bent functions2011-04-08Paper
Checkable Codes from Group Rings2010-12-26Paper
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-22010-12-07Paper
256 Bit Standardized Crypto for 650 GE – GOST Revisited2010-08-17Paper
On the constructions of constant-composition codes from perfect nonlinear functions2010-02-26Paper
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes2010-01-07Paper
Practical Pseudo-collisions for Hash Functions ARIRANG-224/3842009-12-09Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
New informations on the structure of the functional codes defined by forms of degree $h$ on non-degenerate Hermitian varieties in $\mathbb{P}^{n(\mathbb{F}_q)$}2009-07-27Paper
Intersection of two quadrics with no common hyperplane in $\mathbb{P}^{n}(\mathbb{F}_q)$}}2009-07-27Paper
Constructions and bounds on linear error-block codes2009-03-31Paper
Improved Lower Bounds for Constant GC-Content DNA Codes2009-02-24Paper
The Sizes of Optimal $q$-Ary Codes of Weight Three and Distance Four: A Complete Solution2009-02-24Paper
Access Structures of Elliptic Secret Sharing Schemes2009-02-24Paper
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes2009-02-10Paper
Polyadic Codes Revisited2008-12-21Paper
On the Algebraic Structure of Quasi-Cyclic Codes III: Generator Theory2008-12-21Paper
Asymptotic bounds on quantum codes from algebraic geometry codes2008-12-21Paper
Constructions for $q$-Ary Constant-Weight Codes2008-12-21Paper
Quantum Codes From Concatenated Algebraic-Geometric Codes2008-12-21Paper
New lower bounds and constructions for binary codes correcting asymmetric errors2008-12-21Paper
The Probability of Undetected Error for Binary Constant-Weight Codes2008-12-21Paper
A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes2008-12-21Paper
An Improvement on the Bounds of Weil Exponential Sums Over Galois Rings With Some Applications2008-12-21Paper
On the reliability-order-based decoding algorithms for binary linear block codes2008-12-21Paper
Cycle Systems in the Complete Bipartite Graph Plus a One-Factor2008-12-05Paper
Cryptanalysis of Rabbit2008-11-20Paper
Cryptanalysis of LASH2008-09-18Paper
Cyclic codes over \(\text{GR}(p^2,m)\) of length \(p^k\)2008-08-27Paper
Some constructions of \((t,m,s)\)-nets with improved parameters2008-08-27Paper
Improved p-ary Codes and Sequence Families from Galois Rings2008-03-14Paper
Coding and Cryptography2007-05-02Paper
Improved p-ary Codes and Sequence Families from Galois Rings of Characteristic p22006-06-01Paper
On the algebraic structure of quasi-cyclic codes. IV: Repeated roots2006-05-29Paper
Cyclic codes over \(\mathbb Z_4\) of even length2006-05-29Paper
An explicit class of codes with good parameters and their duals2006-04-28Paper
A class of Artin-Schreier towers with finite genus2006-01-17Paper
Good self-dual quasi-cyclic codes exist2005-06-01Paper
Z(p/sup k+1/)-linear codes2005-05-11Paper
On the variance of average distance of subsets in the Hamming space2005-02-23Paper
https://portal.mardi4nfdi.de/entity/Q31548592005-01-14Paper
https://portal.mardi4nfdi.de/entity/Q31548652005-01-14Paper
A family of group character codes2004-08-06Paper
\(\mathbb Z_{8}\)-Kerdock codes and pseudorandom binary sequences2004-08-06Paper
On Viterbi-like algorithms and their application to Reed-Muller codes2004-08-06Paper
Duadic codes over \(\mathbb{F}_2+u\mathbb{F}_2\)2004-02-18Paper
Type II codes over \(\mathbb{F}_{2^m} + u\mathbb{F}_{2^m}\)2004-02-02Paper
Symmetric polynomials and some good codes2003-09-30Paper
On the algebraic structure of quasi-cyclic codes. II: Chain rings2003-09-07Paper
Nonlinear \(p\)-ary sequences2003-09-01Paper
https://portal.mardi4nfdi.de/entity/Q47923552003-07-22Paper
Highly symmetric expanders2002-09-30Paper
On the algebraic structure of quasi-cyclic codes .I. Finite fields2002-08-04Paper
Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound2002-08-04Paper
Duadic codes over Z/sub 2k/2002-08-04Paper
New binary linear codes from algebraic curves2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q43306362002-05-14Paper
Type II codes over \(\mathbb{F}_4+u\mathbb{F}_4\)2002-05-05Paper
Maps between Jacobians of Shimura curves and congruence kernels2002-05-04Paper
Decomposing quasi-cyclic codes2001-10-15Paper
Constructions of semi-regular relative difference sets2001-09-11Paper
https://portal.mardi4nfdi.de/entity/Q27086372001-07-17Paper
A class of linear codes with good parameters2001-03-19Paper
Secret-sharing with a class of ternary codes2000-10-26Paper
Component group of the \(p\)-new subvariety of \(J_0 (Mp)\)2000-09-19Paper
Elementary 2-group character codes2000-09-07Paper
A class of linear codes with good parameters from algebraic curves2000-09-07Paper
Split group codes2000-09-07Paper
Attack on RSA-type cryptosystems based on singular cubic curves over \(\mathbb{Z}/n\mathbb{Z}\)2000-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44862362000-06-26Paper
Combinatorial coverings from geometries over principal ideal rings2000-06-07Paper
The rank of a latin square associated to an abelian group2000-03-23Paper
On component groups of 𝐽₀(𝑁) and degeneracy maps1998-09-22Paper
Almost perfect sequences with \(\theta =2\)1998-07-13Paper
https://portal.mardi4nfdi.de/entity/Q43645881997-12-15Paper
On the \(\mathbb{Q}\)-rational cuspidal subgroup and the component group of \(J_0(p^r)\)1997-12-14Paper
On the rational cuspidal subgroup and the rational torsion points of $J_0(pq)$1997-12-11Paper
Shimura subgroups and degeneracy maps1996-10-27Paper
The old subvariety of \(J_ 0(pq)\) and the Eisenstein kernel in Jacobians1994-11-27Paper
Shimura Subgroups of Jacobians of Shimura Curves1994-09-15Paper
Congruences between cusp forms and the geometry of Jacobians of modular curves1994-06-16Paper
The Fitting ideal of \(J_ 0(q)(\mathbb{F}_{p^ n})\) over the Hecke algebra1994-06-06Paper
Projective Covering Designs1994-05-03Paper
https://portal.mardi4nfdi.de/entity/Q40261951993-02-21Paper

Research outcomes over time

This page was built for person: San Ling