Chik How Tan

From MaRDI portal
Person:285461

Available identifiers

zbMath Open tan.chik-howMaRDI QIDQ285461

List of research outcomes

PublicationDate of PublicationType
A new key recovery attack on a code-based signature from the Lyubashevsky framework2023-10-12Paper
Attack on a code-based signature scheme from QC-LDPC codes2023-10-04Paper
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems2023-07-07Paper
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences2022-07-13Paper
On the design and security of Lee metric McEliece cryptosystems2022-03-21Paper
On existence of vectorial bent functions from the $\mathcal{PS}_{ap}$ class2022-03-21Paper
On the security of the modified dual-Ouroboros PKE using Gabidulin codes2021-12-17Paper
MURAVE: a new rank code-based signature with multiple rank verification2021-01-26Paper
An answer to an open problem of Mesnager on bent functions2020-08-04Paper
Cryptanalysis on CCA2-secured LRPC-Kronecker cryptosystem2020-05-27Paper
Key recovery attacks on some rank metric code-based signatures2020-05-06Paper
Cryptanalysis of a rank-based signature with short public keys2020-03-27Paper
New rank codes based encryption scheme using partial circulant matrices2019-11-07Paper
A new Gabidulin-like code and its application in cryptography2019-10-14Paper
On the near prime-order MNT curves2019-05-16Paper
On the security and key generation of the ZHFE encryption scheme2018-10-24Paper
Key recovery attack on McNie based on low rank parity check codes and its reparation2018-10-24Paper
A new encryption scheme based on rank metric codes2018-09-26Paper
Orthogonal MDS diffusion matrices over Galois rings2018-04-20Paper
On the covering radius of the third order Reed-Muller code \(\mathrm{RM}(3, 7)\)2018-01-26Paper
Generating complete Edwards curves2017-08-25Paper
A new block cipher based on chaotic tent maps2017-08-25Paper
New secondary constructions of differentially 4-uniform permutations over2017-07-28Paper
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting2017-07-27Paper
Improved Miller’s Algorithm for Computing Pairings on Edwards Curves2017-06-20Paper
Constructing Differentially 4-Uniform Permutations Over <formula formulatype="inline"><tex Notation="TeX">${\BBF}_{2^{2k}}$</tex> </formula> via the Switching Method2017-06-08Paper
New differentially 4-uniform permutations by modifying the inverse function on subfields2017-02-09Paper
Implicit Quadratic Property of Differentially 4-Uniform Permutations2016-12-21Paper
Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences2016-11-02Paper
On the second-order nonlinearity of the hidden weighted bit function2016-10-07Paper
A Secure Variant of Yasuda, Takagi and Sakurai’s Signature Scheme2016-07-25Paper
A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)2016-07-19Paper
Further refinements of Miller's algorithm on Edwards curves2016-06-29Paper
New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)2016-05-19Paper
MI-T-HFE, A New Multivariate Signature Scheme2016-01-12Paper
Breaking an ID-based encryption based on discrete logarithm and factorization problems2015-12-01Paper
A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function2015-10-16Paper
On Near Prime-Order Elliptic Curves with Small Embedding Degrees2015-09-22Paper
Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme2015-09-11Paper
Properties of a Family of Cryptographic Boolean Functions2015-09-09Paper
A construction of Boolean functions with good cryptographic properties2015-06-24Paper
Concatenations of the hidden weighted bit function and their cryptographic properties2014-11-28Paper
Six Constructions of Difference Families2014-11-13Paper
Cryptographic properties of the hidden weighted bit function2014-08-22Paper
A new method to construct Boolean functions with good cryptographic properties2014-04-11Paper
On Double Exponentiation for Securing RSA against Fault Analysis2014-03-28Paper
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity2014-03-27Paper
On a class of quadratic polynomials with no zeros and its application to APN functions2014-02-05Paper
Identity based identification from algebraic coding theory2014-01-13Paper
On the Fourier Spectra of New APN Functions2013-09-26Paper
Speeding Up Ate Pairing Computation in Affine Coordinates2013-06-04Paper
What is your ``birthday elliptic curve?2012-11-27Paper
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions2012-10-23Paper
New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$2012-09-07Paper
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks2012-07-23Paper
Binomial differentially 4 uniform permutations with high nonlinearity2012-05-07Paper
Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves2011-12-16Paper
Certificateless cryptography with KGC trust level 32011-10-10Paper
Certificateless public key encryption: a new generic construction and two pairing-free schemes2011-02-21Paper
Dynamic Group Key Exchange Revisited2010-12-07Paper
Probabilistic Public Key Encryption with Equality Test2010-03-16Paper
Analysis of improved signcryption scheme with key privacy2010-01-29Paper
Secure public-key encryption scheme without random oracles2008-09-05Paper
https://portal.mardi4nfdi.de/entity/Q44507752004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q31497632002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q43306432002-05-14Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Chik How Tan