Chik How Tan

From MaRDI portal
Person:285461

Available identifiers

zbMath Open tan.chik-howMaRDI QIDQ285461

List of research outcomes





PublicationDate of PublicationType
High weight code-based signature scheme from QC-LDPC codes2024-05-31Paper
Depth-measurement trade-off for quantum search on block ciphers2024-05-30Paper
A new key recovery attack on a code-based signature from the Lyubashevsky framework2023-10-12Paper
Attack on a code-based signature scheme from QC-LDPC codes2023-10-04Paper
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems2023-07-07Paper
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences2022-07-13Paper
On existence of vectorial bent functions from the $\mathcal{PS}_{ap}$ class2022-03-21Paper
On the design and security of Lee metric McEliece cryptosystems2022-03-21Paper
On the security of the modified dual-Ouroboros PKE using Gabidulin codes2021-12-17Paper
MURAVE: a new rank code-based signature with multiple rank verification2021-01-26Paper
An answer to an open problem of Mesnager on bent functions2020-08-04Paper
Cryptanalysis on CCA2-secured LRPC-Kronecker cryptosystem2020-05-27Paper
Key recovery attacks on some rank metric code-based signatures2020-05-06Paper
Cryptanalysis of a rank-based signature with short public keys2020-03-27Paper
New rank codes based encryption scheme using partial circulant matrices2019-11-07Paper
A new Gabidulin-like code and its application in cryptography2019-10-14Paper
On the near prime-order MNT curves2019-05-16Paper
Key recovery attack on McNie based on low rank parity check codes and its reparation2018-10-24Paper
On the security and key generation of the ZHFE encryption scheme2018-10-24Paper
A new encryption scheme based on rank metric codes2018-09-26Paper
Orthogonal MDS diffusion matrices over Galois rings2018-04-20Paper
On the covering radius of the third order Reed-Muller code \(\mathrm{RM}(3, 7)\)2018-01-26Paper
Generating complete Edwards curves2017-08-25Paper
A new block cipher based on chaotic tent maps2017-08-25Paper
New secondary constructions of differentially 4-uniform permutations over2017-07-28Paper
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting2017-07-27Paper
Improved Miller’s Algorithm for Computing Pairings on Edwards Curves2017-06-20Paper
Constructing Differentially 4-Uniform Permutations Over <formula formulatype="inline"><tex Notation="TeX">${\BBF}_{2^{2k}}$</tex> </formula> via the Switching Method2017-06-08Paper
New differentially 4-uniform permutations by modifying the inverse function on subfields2017-02-09Paper
Implicit Quadratic Property of Differentially 4-Uniform Permutations2016-12-21Paper
Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences2016-11-02Paper
On the second-order nonlinearity of the hidden weighted bit function2016-10-07Paper
A Secure Variant of Yasuda, Takagi and Sakurai’s Signature Scheme2016-07-25Paper
A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)2016-07-19Paper
Further refinements of Miller's algorithm on Edwards curves2016-06-29Paper
New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)2016-05-19Paper
MI-T-HFE, A New Multivariate Signature Scheme2016-01-12Paper
Breaking an ID-based encryption based on discrete logarithm and factorization problems2015-12-01Paper
A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function2015-10-16Paper
On Near Prime-Order Elliptic Curves with Small Embedding Degrees2015-09-22Paper
Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme2015-09-11Paper
Properties of a Family of Cryptographic Boolean Functions2015-09-09Paper
A construction of Boolean functions with good cryptographic properties2015-06-24Paper
Concatenations of the hidden weighted bit function and their cryptographic properties2014-11-28Paper
Six Constructions of Difference Families2014-11-13Paper
Cryptographic properties of the hidden weighted bit function2014-08-22Paper
A new method to construct Boolean functions with good cryptographic properties2014-04-11Paper
On Double Exponentiation for Securing RSA against Fault Analysis2014-03-28Paper
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity2014-03-27Paper
On a class of quadratic polynomials with no zeros and its application to APN functions2014-02-05Paper
Identity based identification from algebraic coding theory2014-01-13Paper
On the Fourier spectra of new APN functions2013-09-26Paper
Speeding Up Ate Pairing Computation in Affine Coordinates2013-06-04Paper
What is your ``birthday elliptic curve?2012-11-27Paper
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions2012-10-23Paper
New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$2012-09-07Paper
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks2012-07-23Paper
Binomial differentially 4 uniform permutations with high nonlinearity2012-05-07Paper
Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves2011-12-16Paper
Certificateless cryptography with KGC trust level 32011-10-10Paper
Certificateless public key encryption: a new generic construction and two pairing-free schemes2011-02-21Paper
Dynamic Group Key Exchange Revisited2010-12-07Paper
Probabilistic Public Key Encryption with Equality Test2010-03-16Paper
Analysis of improved signcryption scheme with key privacy2010-01-29Paper
Secure public-key encryption scheme without random oracles2008-09-05Paper
https://portal.mardi4nfdi.de/entity/Q44507752004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q31497632002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q43306432002-05-14Paper

Research outcomes over time

This page was built for person: Chik How Tan