Journal Papers

  1. K. Feng, C. Xing. (2008). A new construction of quantum error-correcting codes. Transactions of the American Mathematical Society, 360, 2007-2019.

  2. C. Xing, W. Li. (2008). A 2x2 Lattice Space-time Code of Rank 5. Proceedings of the American Mathematical Society, 136, 3415-3418.

  3. D. Hachenberger, H. Niederreiter, C. Xing. (2008). Function-field codes. Applicable Algebra in Engineering, Communication and Computing, 19, 201-211.

  4. C. Xing. (2008). Dense packings from quadratic fields and codes. Journal of Combinatorial Theory, Series A, 115, 1021-1035.

  5. G. Nebe, C. Xing. (2008). A Gilbert-Varshamov type bound for Euclidean packings. Mathematics of Computation, 77, 2339-2344.

  6. G. Yang, D. S. Wong, H. Wang, X. Deng. (2008). Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160 - 1172.

  7. C. Tartary, H. Wang, J. Pieprzyk. (2008). A Coding Approach to the Multicast Stream Authentication Problems. International Journal of Information Security, 7, 265-283.

  8. Y. M. Chee, G. Ge, A. C. H. Ling. (2008). Group divisible codes and their application in the construction of optimal constant-composition codes of weight three. IEEE Transactions on Information Theory, 54(8), 3552-3564.

  9. S. Ling, F. Özbudak. (2008). Some constructions of (t,m,s)-nets with improved parameters. Finite Fields and Their Applications, 14, 658-675.

  10. H. M. Kiah, K. H. Leung, S. Ling. (2008). Cyclic codes over GR(pe, m) of length pk. Finite Fields and Their Applications, 14, 834-846.

  11. Y. M. Chee, A. C. H. Ling, H. Shen. (2008). The fine intersection problem for Steiner triple systems. Graphs and Combinatorics, 24(3), 149-157.

  12. J. Yuan, C. Ding, H. Wang, J. Pieprzyk. (2008). Permutation polynomials of the form $(x^p-x+\delta)^s + L(x)$. Finite Fields and Their Applications, 14(2), 482-493.

  13. Y. Wang, D. S. Wong, H. Wang. (2008). Employ A Mobile Agent for Making A Payment. Mobile Information Systems: An International Journal, 4(1), 51 - 68.

  14. Y. M. Chee, S. H. Dau, A. C. H. Ling, S. Ling. (2008). The sizes of optimal q-ary codes of weight three and distance four: a complete solution. IEEE Transactions on Information Theory, 54(3), 1291-1295.

  15. C. Tartary, S. Zhou, D. Lin, H. Wang, J. Pieprzyk. (2008). Analysis of Bilinear Pairing-based Accumulator for Identity Escrowing. IET Information Security, 2(4), 99 - 107.

  16. H. Chen, S. Ling, C. Xing. (2008). Access structures of elliptic secret sharing schemes. IEEE Transactions on Information Theory, 54(2), 850-852.

  17. Y. M. Chee, S. Ling. (2008). Improved lower bounds for constant GC-content DNA codes. IEEE Transactions on Information Theory, 54(1), 391-394.

  18. Y. M. Chee, P. Kaski. (2008). An enumeration of graphical designs. Journal of Combinatorial Designs, 16(1), 70-85.

  19. H. Wang, D. S. Wong. (2008). On Secret Reconstruction in Secret Sharing Schemes. IEEE Transactions on Information Theory, 54(1), 473 - 480.

  20. V. Pasupathinathan, J. Pieprzyk, H. Wang. (2008). Security Analysis of Australian and EU E-passport Implementation. Journal of Research and Practice in Information Technology, 40(3), 187-205.

Conference Papers

  1. Z. Zhang, M. Liu, Y. M. Chee, S. Ling, H. Wang. (2008). Strongly multiplicative and 3-multiplicative linear secret sharing schemes. ASIACRYPT 2008 – 14th International Conference on the Theory and Application of Cryptology & Information Security, vol. 5350 of Lecture Notes in Computer Science, pp. 19-36, Springer-Verlag.

  2. H. Sun, M. Wu, R. Steinfeld, J. Guo, H. Wang. (2008). Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. The 7th International Conference on Cryptology and Network Security, CANS 2008, vol. 5339 of Lecture Notes in Computer Science, pp. 49-63, Springer-Verlag.

  3. P. Wang, H. Wang, J. Pieprzyk. (2008). Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups, The7th International Conference on Cryptology and Network Security (CANS 2008), vol. 5339 of Lecture Notes in Computer Science, pp. 178-195, Springer-Verlag.

  4. Y. Lu, H. Wang, S. Ling. (2008). Cryptanalysis of Rabbit.  Information Security, Proceedings of 11th Information Security Conference 2008, T.-C. Wu, C.L. Lei, V. Rijmen, D.-T. Lee, eds., vol. 5222 of Lecture Notes in Computer Science, pp. 204-214, Springer-Verlag.

  5. Q. Ye, H. Wang, J. Pieprzyk, X. M. Zhang. (2008). Efficient Disjointness Tests for Private Database. 13th Australasian Conference on Information Security and Privacy (ACISP 2008), Lecture Notes in Computer Science, vol. 5107, pp. 155-169, Springer-Verlag.

  6. Q. Ye, H. Wang, C. Tartary. (2008). Privacy-Preserving Distributed Set Intersection. Proceedings of the 3rd International Conference on Availability, Security and Reliability (ARES 2008),1332-1339, IEEE Computer Society.

  7. F. Oggier, H. Fathi. (2008). Multi-receiver authentication codes for network coding. Allerton conference.

  8. Y. M. Chee, C. J. Colbourn. (2008). Scalable optimal test patterns for crosstalk-induced faults on deep submicron global interconnects. Proceedings of the 1st International Workshop on Coding and Cryptology, pp. 80-90, World Scientific.

  9. S. Contini, K. Matusiewicz, J. Pieprzyk, R. Steinfeld, J. Guo, S. Ling, H. Wang. (2008). Cryptanalysis of LASH. Fast Software Encryption 2008, K. Nyberg ed., vol. 5086 of Lecture Notes in Computer Science, pp. 207-223, Springer-Verlag

  10. H. M.  Sun, M. E. Wu, H. Wang,  J. Guo. (2008). On the Improvement of the BDF Attack on LSBS-RSA. Information Security and Privacy, 13th Australasian Conference (ACISP 2008), Lecture Notes in Computer Science, vol. 5107, pp. 84-97, Springer-Verlag.

  11. J. Yuan, Q. Ye, H. Wang, J. Pieprzyk. (2008). Secure Computation of the Vector Dominance Problem. Information Security Practice and Experience (ISPEC 2008), Lecture Notes in Computer Science, vol. 4991, pp. 319-333, Springer-Verlag.

  12. Q. Ye, H. Wang, J. Pieprzyk. (2008). Distributed Private Matching and Set Operations. Information Security Practice and Experience (ISPEC 2008), Lecture Notes in Computer Science, vol. 4991, pp. 347-360, Springer-Verlag.

  13. V. Pasupathinathan, J. Pieprzyk, H. Wang. (2008). An On-Line Secure E-passport Protocol. Information Security Practice and Experience (ISPEC 2008), Lecture Notes in Computer Science, vol. 991, pp. 14-28, Springer-Verlag.

  14. P. Wang, H. Wang, J. Pieprzyk. (2008). Threshold Privacy Preserving Keyword Searches. Theory and Practice of Computer Science (SOFSEM 2008), Lecture Notes in Computer Science, vol. 4910, pp. 646-658, Springer-Verlag.

  15. P. Wang, J. Pieprzyk, H. Wang. (2008). A New Dynamic Accumulator for Batch Updates. Ninth International Conference on Information and Communications Security (ICICS 2007), Lecture Notes in Computer Science, vol. 4861, pp. 98-112, Springer-Verlag.

Book Editorial

  1. Y. Li, S. Ling, H. Niederreiter, H. Wang, C. Xing, S. Zhang (Eds.). (2008). Coding and Cryptology, Proceedings of the First International Workshop (Wuyi Mountain, Fujian, China), Series on Coding Theory and Cryptology - Vol. 4. World Scientific.