Chik How Tan

From MaRDI portal
(Redirected from Person:285461)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Concrete analysis of Schnorr-type signatures with aborts
Designs, Codes and Cryptography
2026-03-03Paper
Higher-order root-finding algorithm and its applications
International Journal of Computer Mathematics
2026-02-09Paper
High weight code-based signature scheme from QC-LDPC codes2024-05-31Paper
Depth-measurement trade-off for quantum search on block ciphers
Quantum Information Processing
2024-05-30Paper
A new key recovery attack on a code-based signature from the Lyubashevsky framework
Information Processing Letters
2023-10-12Paper
Attack on a code-based signature scheme from QC-LDPC codes
Codes, Cryptology and Information Security
2023-10-04Paper
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
Advances in Mathematics of Communications
2023-07-07Paper
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences
IEEE Transactions on Information Theory
2022-07-13Paper
On existence of vectorial bent functions from the \(\mathcal{PS}_{\mathrm{ap}}\) class
SCIENTIA SINICA Mathematica
2022-03-21Paper
On the design and security of Lee metric McEliece cryptosystems
Designs, Codes and Cryptography
2022-03-21Paper
On the security of the modified dual-Ouroboros PKE using Gabidulin codes
Applicable Algebra in Engineering, Communication and Computing
2021-12-17Paper
MURAVE: a new rank code-based signature with multiple rank verification2021-01-26Paper
An answer to an open problem of Mesnager on bent functions
Information Processing Letters
2020-08-04Paper
Cryptanalysis on CCA2-secured LRPC-Kronecker cryptosystem2020-05-27Paper
Key recovery attacks on some rank metric code-based signatures2020-05-06Paper
Cryptanalysis of a rank-based signature with short public keys
Designs, Codes and Cryptography
2020-03-27Paper
New rank codes based encryption scheme using partial circulant matrices
Designs, Codes and Cryptography
2019-11-07Paper
A new Gabidulin-like code and its application in cryptography2019-10-14Paper
On the near prime-order MNT curves
Applicable Algebra in Engineering, Communication and Computing
2019-05-16Paper
Key recovery attack on McNie based on low rank parity check codes and its reparation2018-10-24Paper
On the security and key generation of the ZHFE encryption scheme2018-10-24Paper
A new encryption scheme based on rank metric codes2018-09-26Paper
Orthogonal MDS diffusion matrices over Galois rings2018-04-20Paper
On the covering radius of the third order Reed-Muller code \(\mathrm{RM}(3, 7)\)
Designs, Codes and Cryptography
2018-01-26Paper
Generating complete Edwards curves2017-08-25Paper
A new block cipher based on chaotic tent maps
IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications
2017-08-25Paper
New secondary constructions of differentially 4-uniform permutations over \(\mathbb F_{2^{2k}}\)
International Journal of Computer Mathematics
2017-07-28Paper
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting
IEEE Transactions on Information Theory
2017-07-27Paper
Improved Miller’s Algorithm for Computing Pairings on Edwards Curves
IEEE Transactions on Computers
2017-06-20Paper
Constructing Differentially 4-Uniform Permutations Over <formula formulatype="inline"><tex Notation="TeX">${\BBF}_{2^{2k}}$</tex> </formula> via the Switching Method
IEEE Transactions on Information Theory
2017-06-08Paper
New differentially 4-uniform permutations by modifying the inverse function on subfields
Cryptography and Communications
2017-02-09Paper
Implicit Quadratic Property of Differentially 4-Uniform Permutations
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences
Discrete Applied Mathematics
2016-11-02Paper
On the second-order nonlinearity of the hidden weighted bit function
Discrete Applied Mathematics
2016-10-07Paper
A secure variant of Yasuda, Takagi and Sakurai's signature scheme
Information Security and Cryptology
2016-07-25Paper
A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
Science China. Mathematics
2016-07-19Paper
Further refinements of Miller's algorithm on Edwards curves
Applicable Algebra in Engineering, Communication and Computing
2016-06-29Paper
New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
Finite Fields and their Applications
2016-05-19Paper
MI-T-HFE, a new multivariate signature scheme
Cryptography and Coding
2016-01-12Paper
Breaking an ID-based encryption based on discrete logarithm and factorization problems
Information Processing Letters
2015-12-01Paper
A family of cryptographically significant Boolean functions based on the hidden weighted bit function
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
On near prime-order elliptic curves with small embedding degrees
Algebraic Informatics
2015-09-22Paper
Algebraic cryptanalysis of Yasuda, Takagi and Sakurai's signature scheme
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Properties of a family of cryptographic Boolean functions
Sequences and Their Applications - SETA 2014
2015-09-09Paper
A construction of Boolean functions with good cryptographic properties
International Journal of Computer Mathematics
2015-06-24Paper
Concatenations of the hidden weighted bit function and their cryptographic properties
Advances in Mathematics of Communications
2014-11-28Paper
Six Constructions of Difference Families2014-11-13Paper
Cryptographic properties of the hidden weighted bit function
Discrete Applied Mathematics
2014-08-22Paper
A new method to construct Boolean functions with good cryptographic properties
Information Processing Letters
2014-04-11Paper
On double exponentiation for securing RSA against fault analysis
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity
Discrete Applied Mathematics
2014-03-27Paper
On a class of quadratic polynomials with no zeros and its application to APN functions
Finite Fields and their Applications
2014-02-05Paper
Identity based identification from algebraic coding theory
Theoretical Computer Science
2014-01-13Paper
On the Fourier spectra of new APN functions
SIAM Journal on Discrete Mathematics
2013-09-26Paper
Speeding up Ate pairing computation in affine coordinates
Lecture Notes in Computer Science
2013-06-04Paper
What is your ``birthday elliptic curve?
Finite Fields and their Applications
2012-11-27Paper
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions
Information Processing Letters
2012-10-23Paper
New families of differentially 4-uniform permutations over \({\mathbb F}_{2^{2k}}\)
Lecture Notes in Computer Science
2012-09-07Paper
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Binomial differentially 4 uniform permutations with high nonlinearity
Finite Fields and their Applications
2012-05-07Paper
Improved precomputation scheme for scalar multiplication on elliptic curves
Cryptography and Coding
2011-12-16Paper
Certificateless cryptography with KGC trust level 3
Theoretical Computer Science
2011-10-10Paper
Certificateless public key encryption: a new generic construction and two pairing-free schemes
Theoretical Computer Science
2011-02-21Paper
Dynamic group key exchange revisited
Cryptology and Network Security
2010-12-07Paper
Probabilistic public key encryption with equality test
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Analysis of improved signcryption scheme with key privacy
Information Processing Letters
2010-01-29Paper
Secure public-key encryption scheme without random oracles
Information Sciences
2008-09-05Paper
scientific article; zbMATH DE number 2043341 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1808279 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1740054 (Why is no real title available?)2002-05-14Paper


Research outcomes over time


This page was built for person: Chik How Tan