San Ling

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A tight upper bound on the number of nonzero weights of a quasi-cyclic code
Designs, Codes and Cryptography
2026-03-31Paper
Griesmer bound and constructions of linear codes in b-symbol metric
IEEE Transactions on Information Theory
2025-01-23Paper
Succinct non-subsequence arguments2025-01-10Paper
Fully dynamic attribute-based signatures for circuits from codes2024-11-12Paper
Improved spectral bound for quasi-cyclic codes
IEEE Transactions on Information Theory
2024-07-23Paper
On linear codes whose Hermitian hulls are MDS
IEEE Transactions on Information Theory
2024-07-23Paper
On the weights of linear codes with prescribed automorphisms
IEEE Transactions on Information Theory
2024-07-23Paper
Explicit low-bandwidth evaluation schemes for weighted sums of Reed-Solomon-coded symbols
IEEE Transactions on Information Theory
2024-07-23Paper
A Construction of Maximum Distance Profile Convolutional Codes With Small Alphabet Sizes
IEEE Transactions on Information Theory
2024-03-19Paper
New Families of MDS Symbol-Pair Codes From Matrix-Product Codes
IEEE Transactions on Information Theory
2024-03-19Paper
Hulls of Reed-Solomon Codes via Algebraic Geometry Codes
IEEE Transactions on Information Theory
2024-03-18Paper
Three New Constructions of Optimal Locally Repairable Codes From Matrix-Product Codes
IEEE Transactions on Information Theory
2024-03-14Paper
Efficient generation of elliptic curve cryptosystems
Lecture Notes in Computer Science
2024-01-29Paper
Constructing quantum error-correcting codes that require a variable amount of entanglement
Quantum Information Processing
2024-01-25Paper
A Construction of Asymptotically Optimal Cascaded CDC Schemes via Combinatorial Designs2023-09-08Paper
Type-II polyadic constacyclic codes over finite fields
Discrete Mathematics, Algorithms and Applications
2023-07-14Paper
Sharper Asymptotically Optimal CDC Schemes via Combinatorial Designs2023-07-09Paper
Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications
Advances in Mathematics of Communications
2023-07-07Paper
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
Journal of Cryptology
2023-07-05Paper
Generalized negacyclic codes over finite fields
Journal of Applied Mathematics and Computing
2023-04-20Paper
On the construction of self-dual cyclic codes over \(\mathbb{Z}_4\) with arbitrary even length
Cryptography and Communications
2022-10-06Paper
Asymmetric quantum Griesmer codes detecting a single bit-flip error
Discrete Mathematics
2022-09-26Paper
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease2022-07-01Paper
A new framework for deniable secure key exchange
Information and Computation
2022-06-08Paper
Application of optimal \(p\)-ary linear codes to alphabet-optimal locally repairable codes
Designs, Codes and Cryptography
2022-04-28Paper
Zero-knowledge proofs for committed symmetric Boolean functions2022-03-22Paper
A Comparison of Distance Bounds for Quasi-Twisted Codes
IEEE Transactions on Information Theory
2022-02-17Paper
Quasi-cyclic codes
(available as arXiv preprint)
2021-11-26Paper
Patch-Based Holographic Image Sensing
SIAM Journal on Imaging Sciences
2021-11-19Paper
Adaptive oblivious transfer with access control from lattice assumptions
Theoretical Computer Science
2021-10-21Paper
New bounds on the minimum distance of cyclic codes
Advances in Mathematics of Communications
2021-05-12Paper
An explicit expression for Euclidean self-dual cyclic codes of length \(2^k\) over Galois ring \(\mathrm{GR}(4,m)\)
Finite Fields and their Applications
2021-04-08Paper
Public key encryption with equality test in the standard model
Information Sciences
2021-03-31Paper
Public key encryption with equality test from generic assumptions in the random oracle model
Information Sciences
2020-12-10Paper
Lightweight Key Encapsulation Using LDPC Codes on FPGAs
IEEE Transactions on Computers
2020-10-02Paper
Provably Secure Group Signature Schemes From Code-Based Assumptions
IEEE Transactions on Information Theory
2020-09-29Paper
On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications
IEEE Transactions on Information Theory
2020-09-29Paper
Threshold changeable ramp secret sharing
Cryptology and Network Security
2020-07-20Paper
Perfect state transfer on Cayley graphs over dihedral groups: the non-normal case
The Electronic Journal of Combinatorics
2020-06-04Paper
Holographic sensing
Applied and Computational Harmonic Analysis
2020-04-27Paper
Robust positioning patterns with low redundancy
SIAM Journal on Computing
2020-03-25Paper
Forward-secure group signatures from lattices
(available as arXiv preprint)
2020-02-25Paper
Semi-generic construction of public key encryption and identity-based encryption with equality test
Information Sciences
2020-02-06Paper
Accountable tracing signatures from lattices
(available as arXiv preprint)
2020-01-28Paper
Burst-deletion-correcting codes for permutations and multipermutations
IEEE Transactions on Information Theory
2020-01-28Paper
Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes
Designs, Codes and Cryptography
2019-11-07Paper
Self-dual and complementary dual abelian codes over Galois rings2019-10-30Paper
Binary robust positioning patterns with low redundancy and efficient locating algorithms
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms
2019-10-15Paper
Construction and enumeration for self-dual cyclic codes over \(\mathbb Z_4\) of oddly even length
Designs, Codes and Cryptography
2019-09-12Paper
Lattice-based group signatures: achieving full dynamicity (and deniability) with ease
Theoretical Computer Science
2019-08-13Paper
Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories
IEEE Transactions on Information Theory
2019-07-19Paper
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials
Designs, Codes and Cryptography
2019-05-17Paper
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions2019-01-23Paper
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
Theoretical Computer Science
2019-01-18Paper
Revocable predicate encryption from lattices2018-11-07Paper
Lattice-based zero-knowledge arguments for integer relations2018-09-26Paper
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields
Cryptography and Communications
2018-08-28Paper
scientific article; zbMATH DE number 6900640 (Why is no real title available?)2018-07-09Paper
Constant-size group signatures from lattices2018-05-29Paper
A lattice-based group signature scheme with verifier-local revocation
Theoretical Computer Science
2018-05-17Paper
Adaptive oblivious transfer with access control from lattice assumptions
Advances in Cryptology – ASIACRYPT 2017
2018-04-06Paper
Zero-knowledge arguments for lattice-based PRFs and applications to E-cash2018-02-23Paper
Construction of de Bruijn sequences from product of two irreducible polynomials
Cryptography and Communications
2018-02-14Paper
Hardness of \(k\)-LWE and applications in traitor tracing
Algorithmica
2018-01-05Paper
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions
IEEE Transactions on Information Theory
2017-08-08Paper
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions
IEEE Transactions on Information Theory
2017-08-08Paper
Hulls of cyclic and negacyclic codes over finite fields
Finite Fields and their Applications
2017-08-03Paper
Asymmetric Quantum Codes: Characterization and Constructions
IEEE Transactions on Information Theory
2017-07-27Paper
On Self-Dual Cyclic Codes Over Finite Fields
IEEE Transactions on Information Theory
2017-07-27Paper
Application of Classical Hermitian Self-Orthogonal MDS Codes to Quantum MDS Codes
IEEE Transactions on Information Theory
2017-07-27Paper
Linear Size Optimal $q$-ary Constant-Weight Codes and Constant-Composition Codes
IEEE Transactions on Information Theory
2017-07-27Paper
Generalization of Steane's Enlargement Construction of Quantum Codes and Applications
IEEE Transactions on Information Theory
2017-07-27Paper
Additive Asymmetric Quantum Codes
IEEE Transactions on Information Theory
2017-07-12Paper
Authentication of Digital Streams
IEEE Transactions on Information Theory
2017-07-12Paper
CSS-Like Constructions of Asymmetric Quantum Codes
IEEE Transactions on Information Theory
2017-06-08Paper
Abelian Codes in Principal Ideal Group Algebras
IEEE Transactions on Information Theory
2017-06-08Paper
Upper Bounds on Matching Families in <formula formulatype="inline"> <tex Notation="TeX">$\BBZ_{pq}^{n}$</tex></formula>
IEEE Transactions on Information Theory
2017-06-08Paper
External Difference Families from Finite Fields
Journal of Combinatorial Designs
2017-05-23Paper
Hermitian Self-Dual Abelian Codes
IEEE Transactions on Information Theory
2017-05-16Paper
Application of Constacyclic Codes to Quantum MDS Codes
IEEE Transactions on Information Theory
2017-04-28Paper
Polyadic Constacyclic Codes
IEEE Transactions on Information Theory
2017-04-28Paper
Spectral Analysis of Quasi-Cyclic Product Codes
IEEE Transactions on Information Theory
2017-04-28Paper
Three new classes of optimal frequency-hopping sequence sets
Designs, Codes and Cryptography
2017-03-23Paper
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
On the implausibility of constant-round public-coin zero-knowledge proofs
Lecture Notes in Computer Science
2016-10-21Paper
On self-dual cyclic codes of length \(p^a\) over \(\mathrm{GR}(p^2,s)\)
Advances in Mathematics of Communications
2016-10-12Paper
Enumeration formulas for self-dual cyclic codes
Finite Fields and their Applications
2016-10-10Paper
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Analysis of Gong et al.'s CCA2-secure homomorphic encryption
Theoretical Computer Science
2016-07-05Paper
A provably secure group signature scheme from code-based assumptions
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers
Selected Areas in Cryptography
2015-12-04Paper
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based
Lecture Notes in Computer Science
2015-08-27Paper
Quasi-abelian codes
Designs, Codes and Cryptography
2015-03-12Paper
Construction of Quasi-Cyclic Product Codes2015-01-26Paper
Low probability differentials and the cryptanalysis of full-round CLEFIA-128
Lecture Notes in Computer Science
2015-01-16Paper
On the Multidimensional Distribution of the Naor–Reingold Pseudo-Random Function
Mathematics of Computation
2014-09-10Paper
A relation between embedding degrees and class numbers of binary quadratic forms
Mathematics of Computation
2014-09-10Paper
Shorter identity-based encryption via asymmetric pairings
Designs, Codes and Cryptography
2014-09-04Paper
Spatial encryption supporting non-monotone access structure
Designs, Codes and Cryptography
2014-09-04Paper
Homogeneous weights of matrix product codes over finite principal ideal rings
Finite Fields and their Applications
2014-09-02Paper
Hardness of \(k\)-LWE and applications in traitor tracing
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
The resistance of PRESENT-80 against related-key differential attacks
Cryptography and Communications
2014-06-20Paper
Matrix product codes over finite commutative Frobenius rings
Designs, Codes and Cryptography
2014-04-29Paper
Matrix product codes over finite commutative Frobenius rings
Designs, Codes and Cryptography
2014-04-29Paper
The relation and transformation between hierarchical inner product encryption and spatial encryption
Designs, Codes and Cryptography
2014-04-29Paper
New results on two hypercube coloring problems
Discrete Applied Mathematics
2014-04-23Paper
Lattice-based group signature scheme with verifier-local revocation
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Revocable IBE systems with almost constant-size key update
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
On the Fourier spectra of new APN functions
SIAM Journal on Discrete Mathematics
2013-09-26Paper
Pure asymmetric quantum MDS codes from CSS construction: a complete characterization
International Journal of Quantum Information
2013-08-28Paper
Algebraic curves in cryptography
Discrete Mathematics and its Applications
2013-07-15Paper
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Query-efficient locally decodable codes of subexponential length
Computational Complexity
2013-04-11Paper
Query-efficient locally decodable codes of subexponential length
Computational Complexity
2013-04-11Paper
Shorter IBE and signatures via asymmetric pairings
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU
Advances in Information and Computer Security
2013-04-04Paper
A \(q\)-polynomial approach to cyclic codes
Finite Fields and their Applications
2013-03-20Paper
Differential attacks against stream cipher ZUC
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
On the (in)security of IDEA in various hashing modes
Fast Software Encryption
2013-01-08Paper
Revocable Identity-Based Encryption from Lattices
Information Security and Privacy
2012-09-07Paper
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
Constructing irreducible polynomials over finite fields
Mathematics of Computation
2012-06-29Paper
Skew constacyclic codes over finite chain rings
Advances in Mathematics of Communications
2012-05-11Paper
On the modular inversion hidden number problem
Journal of Symbolic Computation
2012-05-04Paper
Threshold changeable secret sharing schemes revisited
Theoretical Computer Science
2012-03-13Paper
A note on cyclic codes over \(\mathrm{GR}(p^{2},m)\) of length \(p^{k}\)
Designs, Codes and Cryptography
2012-03-01Paper
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences
Mathematics of Computation
2012-02-17Paper
A note on linearized polynomials and the dimension of their kernels
Finite Fields and their Applications
2012-02-11Paper
Side-channel resistant crypto for less than 2,300 GE
Journal of Cryptology
2012-01-18Paper
Structure of functional codes defined on non-degenerate Hermitian varieties
Journal of Combinatorial Theory. Series A
2011-10-21Paper
List decodability at small radii
Designs, Codes and Cryptography
2011-09-27Paper
List decodability at small radii
Designs, Codes and Cryptography
2011-09-27Paper
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
Information Security and Privacy
2011-07-07Paper
Pushing the limits: a very compact and a threshold implementation of AES
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
From skew-cyclic codes to asymmetric quantum codes
Advances in Mathematics of Communications
2011-05-17Paper
Association schemes arising from bent functions
Designs, Codes and Cryptography
2011-04-08Paper
Checkable Codes from Group Rings2010-12-26Paper
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
256 bit standardized crypto for 650 GE -- GOST revisited
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
On the constructions of constant-composition codes from perfect nonlinear functions
Science in China. Series F
2010-02-26Paper
Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes
Cryptography and Coding
2010-01-07Paper
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Selected Areas in Cryptography
2009-12-09Paper
Cryptanalysis of the LAKE Hash Family
Fast Software Encryption
2009-08-11Paper
New informations on the structure of the functional codes defined by forms of degree $h$ on non-degenerate Hermitian varieties in $\mathbb{P}^{n(\mathbb{F}_q)$}2009-07-27Paper
Intersection of two quadrics with no common hyperplane in $\mathbb{P}^{n}(\mathbb{F}_q)$}}2009-07-27Paper
Constructions and bounds on linear error-block codes
Designs, Codes and Cryptography
2009-03-31Paper
Improved Lower Bounds for Constant GC-Content DNA Codes
IEEE Transactions on Information Theory
2009-02-24Paper
The Sizes of Optimal $q$-Ary Codes of Weight Three and Distance Four: A Complete Solution
IEEE Transactions on Information Theory
2009-02-24Paper
Access Structures of Elliptic Secret Sharing Schemes
IEEE Transactions on Information Theory
2009-02-24Paper
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Polyadic Codes Revisited
IEEE Transactions on Information Theory
2008-12-21Paper
On the Algebraic Structure of Quasi-Cyclic Codes III: Generator Theory
IEEE Transactions on Information Theory
2008-12-21Paper
Asymptotic bounds on quantum codes from algebraic geometry codes
IEEE Transactions on Information Theory
2008-12-21Paper
Constructions for $q$-Ary Constant-Weight Codes
IEEE Transactions on Information Theory
2008-12-21Paper
Quantum Codes From Concatenated Algebraic-Geometric Codes
IEEE Transactions on Information Theory
2008-12-21Paper
New lower bounds and constructions for binary codes correcting asymmetric errors
IEEE Transactions on Information Theory
2008-12-21Paper
The Probability of Undetected Error for Binary Constant-Weight Codes
IEEE Transactions on Information Theory
2008-12-21Paper
A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes
IEEE Transactions on Information Theory
2008-12-21Paper
An Improvement on the Bounds of Weil Exponential Sums Over Galois Rings With Some Applications
IEEE Transactions on Information Theory
2008-12-21Paper
On the reliability-order-based decoding algorithms for binary linear block codes
IEEE Transactions on Information Theory
2008-12-21Paper
Cycle Systems in the Complete Bipartite Graph Plus a One-Factor
SIAM Journal on Discrete Mathematics
2008-12-05Paper
Cryptanalysis of Rabbit
Lecture Notes in Computer Science
2008-11-20Paper
Cryptanalysis of LASH
Fast Software Encryption
2008-09-18Paper
Cyclic codes over \(\text{GR}(p^2,m)\) of length \(p^k\)
Finite Fields and their Applications
2008-08-27Paper
Some constructions of \((t,m,s)\)-nets with improved parameters
Finite Fields and their Applications
2008-08-27Paper
Improved p-ary Codes and Sequence Families from Galois Rings
Sequences and Their Applications - SETA 2004
2008-03-14Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Improved p-ary Codes and Sequence Families from Galois Rings of Characteristic p2
SIAM Journal on Discrete Mathematics
2006-06-01Paper
On the algebraic structure of quasi-cyclic codes. IV: Repeated roots
Designs, Codes and Cryptography
2006-05-29Paper
Cyclic codes over \(\mathbb Z_4\) of even length
Designs, Codes and Cryptography
2006-05-29Paper
An explicit class of codes with good parameters and their duals
Discrete Applied Mathematics
2006-04-28Paper
A class of Artin-Schreier towers with finite genus
Bulletin of the Brazilian Mathematical Society. New Series
2006-01-17Paper
Good self-dual quasi-cyclic codes exist
IEEE Transactions on Information Theory
2005-06-01Paper
Z(p/sup k+1/)-linear codes
IEEE Transactions on Information Theory
2005-05-11Paper
On the variance of average distance of subsets in the Hamming space
Discrete Applied Mathematics
2005-02-23Paper
scientific article; zbMATH DE number 2127868 (Why is no real title available?)2005-01-14Paper
scientific article; zbMATH DE number 2127874 (Why is no real title available?)2005-01-14Paper
A family of group character codes
European Journal of Combinatorics
2004-08-06Paper
\(\mathbb Z_{8}\)-Kerdock codes and pseudorandom binary sequences
Journal of Complexity
2004-08-06Paper
On Viterbi-like algorithms and their application to Reed-Muller codes
Journal of Complexity
2004-08-06Paper
Duadic codes over \(\mathbb{F}_2+u\mathbb{F}_2\)
Applicable Algebra in Engineering, Communication and Computing
2004-02-18Paper
Type II codes over \(\mathbb{F}_{2^m} + u\mathbb{F}_{2^m}\)
Discrete Mathematics
2004-02-02Paper
Symmetric polynomials and some good codes
Finite Fields and their Applications
2003-09-30Paper
On the algebraic structure of quasi-cyclic codes. II: Chain rings
Designs, Codes and Cryptography
2003-09-07Paper
Nonlinear \(p\)-ary sequences
Applicable Algebra in Engineering, Communication and Computing
2003-09-01Paper
scientific article; zbMATH DE number 1866920 (Why is no real title available?)2003-07-22Paper
Highly symmetric expanders
Finite Fields and their Applications
2002-09-30Paper
On the algebraic structure of quasi-cyclic codes .I. Finite fields
IEEE Transactions on Information Theory
2002-08-04Paper
Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound
IEEE Transactions on Information Theory
2002-08-04Paper
Duadic codes over Z/sub 2k/
IEEE Transactions on Information Theory
2002-08-04Paper
New binary linear codes from algebraic curves
IEEE Transactions on Information Theory
2002-08-04Paper
scientific article; zbMATH DE number 1740049 (Why is no real title available?)2002-05-14Paper
Type II codes over \(\mathbb{F}_4+u\mathbb{F}_4\)
European Journal of Combinatorics
2002-05-05Paper
Maps between Jacobians of Shimura curves and congruence kernels
Mathematische Annalen
2002-05-04Paper
Decomposing quasi-cyclic codes2001-10-15Paper
Constructions of semi-regular relative difference sets
Finite Fields and their Applications
2001-09-11Paper
scientific article; zbMATH DE number 1588488 (Why is no real title available?)2001-07-17Paper
A class of linear codes with good parameters
IEEE Transactions on Information Theory
2001-03-19Paper
Secret-sharing with a class of ternary codes
Theoretical Computer Science
2000-10-26Paper
Component group of the \(p\)-new subvariety of \(J_0 (Mp)\)
Israel Journal of Mathematics
2000-09-19Paper
Elementary 2-group character codes
IEEE Transactions on Information Theory
2000-09-07Paper
A class of linear codes with good parameters from algebraic curves
IEEE Transactions on Information Theory
2000-09-07Paper
Split group codes
IEEE Transactions on Information Theory
2000-09-07Paper
Attack on RSA-type cryptosystems based on singular cubic curves over \(\mathbb{Z}/n\mathbb{Z}\)
Theoretical Computer Science
2000-08-23Paper
scientific article; zbMATH DE number 1465652 (Why is no real title available?)2000-06-26Paper
Combinatorial coverings from geometries over principal ideal rings2000-06-07Paper
The rank of a latin square associated to an abelian group
Communications in Algebra
2000-03-23Paper
On component groups of 𝐽₀(𝑁) and degeneracy maps
Proceedings of the American Mathematical Society
1998-09-22Paper
Almost perfect sequences with \(\theta =2\)
Archiv der Mathematik
1998-07-13Paper
scientific article; zbMATH DE number 1088272 (Why is no real title available?)1997-12-15Paper
On the \(\mathbb{Q}\)-rational cuspidal subgroup and the component group of \(J_0(p^r)\)
Israel Journal of Mathematics
1997-12-14Paper
On the rational cuspidal subgroup and the rational torsion points of $J_0(pq)$
Proceedings of the American Mathematical Society
1997-12-11Paper
Shimura subgroups and degeneracy maps
Journal of Number Theory
1996-10-27Paper
The old subvariety of \(J_ 0(pq)\) and the Eisenstein kernel in Jacobians
Israel Journal of Mathematics
1994-11-27Paper
Shimura Subgroups of Jacobians of Shimura Curves1994-09-15Paper
Congruences between cusp forms and the geometry of Jacobians of modular curves
Mathematische Annalen
1994-06-16Paper
The Fitting ideal of \(J_ 0(q)(\mathbb{F}_{p^ n})\) over the Hecke algebra
Journal of Algebra
1994-06-06Paper
Projective Covering Designs
Bulletin of the London Mathematical Society
1994-05-03Paper
scientific article; zbMATH DE number 124555 (Why is no real title available?)1993-02-21Paper


Research outcomes over time


This page was built for person: San Ling