Publications 2013

Journal Papers

  1. Y. M. Chee, L. Ji, H. M. Kiah, C. Wang, J. Yin. (2013). Maximum distance separable codes for symbol-pair read channels. IEEE Transactions on Information Theory, vol. 59, no. 11, pp. 7259–7267. [PDF]

  2. Y. M. Chee, S. Ling, H. Wang, L. F. Zhang. (2013). Upper bounds on matching families in Z^n_{pq}. IEEE Transactions on Information Theory, vol. 59, no. 8, pp. 5131–5139. [PDF]

  3. Y. M. Chee, H. M. Kiah, P. Purkayastha, C. Wang. (2013). Cross-bifix-free codes within a constant factor of optimality. IEEE Transactions on Information Theory, vol. 59, no. 7, pp. 4668–4674. [PDF]

  4. Y. M. Chee, H. M. Kiah, C. Wang. (2013). Generalized balanced tournament designs with block size four. Electronic Journal of Combinatorics, vol. 20, no. 2, P51. [PDF]

  5. Y. M. Chee, C. J. Colbourn, A. C. H. Ling, R. M. Wilson. (2013). Covering and packing for pairs. Journal of Combinatorial Theory, Series A, vol. 120, no. 7, pp. 1440–1449. [PDF]

  6. S. H. Dau, V. Skachek, Y. M. Chee. (2013). Error correction for index coding with side information. IEEE Transactions on Information Theory, vol. 59, no. 3, pp. 1517–1531. [PDF]

  7. Y. M. Chee, T. Feng, S. Ling, H. Wang, L. F. Zhang. (2013). Query-efficient locally decodable codes of subexponential length. Computational Complexity, vol. 22, no. 1, pp. 159–189. [PDF]

  8. Y. M. Chee, H. M. Kiah, P. Purkayastha. (2013). Estimates on the size of symbol weight codes. IEEE Transactions on Information Theory, vol. 59, no. 1, pp. 301 - 314.[PDF]

  9. Y. M. Chee, C. J. Colbourn, D. Horsley, J. Zhou. (2013). Sequence covering arrays. SIAM Journal on Discrete Mathematics, vol. 27, no. 4, pp. 1844–1861, 2013.

  10. Y. M. Chee, H. M. Kiah, P. Purkayastha, and C. Wang. (2013). Importance of symbol equity in coded modulation for power line communications. IEEE Transactions on Communications, vol. 61, no. 10, pp. 4381–4390, 2013.

  11. S. Jitman, S. Ling, H. Liu, X. Xie. (2013). Abelian codes in principal ideal group algebras. IEEE Transactions on Information Theory, vol. 59, no. 5, pp. 3046-3058.

  12. J. Cilleruelo, A. Kumchev, F. Luca, J. Rue, I. E. Shparlinski. (2013). On the fractional parts of a^n/n. Bulletin of the London Mathematical Society, vol. 45, pp. 249 - 256.

  13. H. Yap, K. Khoon, A. Poschmann. (2013). Parallelizing the Camellia and SMS4 Block Ciphers - Extended Version. International Journal of Applied Cryptography, vol. 3, no. 1, pp. 1 - 20.

  14. R. dela Cruz, H. Wang. (2013). Cheating-immune secret sharing schemes from codes and cumulative arrays. Cryptography and Communications, vol. 5, no. 1, pp. 67-83.

  15. A. Datta, F. Oggier. (2013). An Overview of Codes Tailor-made for Better Repairability in Networked Distributed Storage Systems. ACM SIGACT News Distributed Computing Column, vol. 44, no. 1, pp. 79-105.

  16. C. Ding, S. Ling. (2013). A q-polynomial approach to cyclic codes. Finite Fields and Their Applications, vol. 20, no. 1, pp. 1 – 14.

  17. J. Jean, M. Naya-Plasencia and T. Peyrin. (2013). Improved Cryptanalysis of AES-like Permutations. Journal of Cryptology, July 2013.

  18. F. Oggier and B. A. Sethuraman. (2013). Quotients of Orders in Cyclic Algebras and Space-Time Codes. Advances in Mathematics of Communications, vol. 7, no. 4, 2013.

  19. N. Markin and F. Oggier. Iterated Space-Time Code Constructions from Cyclic Algebras. IEEE Transactions on Information Theory, no. 9, vol. 59, September 2013.

  20. J.-C. Belfiore and F. Oggier. (2013). An Error Probability Approach to MIMO Wiretap Channels. IEEE Transactions on Communications , vol. 61, no. 8, August 2013.

  21. F. Lin and F. Oggier. (2013). A Classification of Unimodular Lattice Wiretap Codes in Small Dimensions. IEEE Transactions on Information Theory vol. 59, no. 6, June 2013.

  22. L. Pamies-Juarez, A. Datta, and F. Oggier. (2013). In-network redundancy generation for opportunistic speedup of data backup. Future Generation Computer Systems, vol. 29, no. 6, pp. 1353-1362, 2013.

  23. F. Oggier and A. Datta. (2013). Coding Techniques for Repairability in Networked Distributed Storage Systems. Foundations and Trends in Communications and Information Theory, Now Publishers, 2013.

  24. H. J. Asghar, S. Li, J. Pieprzyk, H. Wang. (2013). Cryptanalysis of the Convex Hull Click Human Identification Protocol. Int. J. Inf. Sec. vol. 12 no. 2, pp. 83-96, 2013.

  25. X. Yi, S. Ling, H. Wang. (2013). Efficient Two-Server Password-Only Authenticated Key Exchange. IEEE Trans. Parallel Distrib. Syst. vol. 24 no. 9, pp. 1773-1782, 2013.

Conference Papers

  1. Y. M. Chee, H. M. Kiah, P. Purkayastha. (2013). Matrix codes and multitone frequency shift keying for power line communications. In Proceedings of the 2013 IEEE International Symposium on Information Theory (ISIT 2013), pp. 2870–2874. [PDF]

  2. Y. M. Chee, H. Zhang, X. Zhang. (2013). Complexity of dependencies in bounded domains, Armstrong codes, and generalizations. In Proceedings of the 2013 IEEE International Symposium on Information Theory (ISIT 2013), pp. 499–503. [PDF]

  3. Y. M. Chee, H. M. Kiah, H. Zhang, X. Zhang. (2013). Optimal codes in the Enomoto-Katona space. In Proceedings of the 2013 IEEE International Symposium on Information Theory (ISIT 2013), pp. 321–325. [PDF]

  4. S. Kutzner, P. H. Nguyen, A. Poschmann, H. Wang. (2013). On 3-Share Threshold Implementations for 4-Bit S-boxes. (COSADE 2013), pp. 99-113.

  5. L. Su, H. W. Lim, S. Ling, H. Wang. (2013). Revocable IBE Systems with Almost Constant-Size Key Update. (Pairing 2013), pp. 168-185

  6. V. Guruswami, C. Xing. (2013). List decoding Reed-Solomon, Algebraic-Geometric, and Gabidulin subcodes up to the Singleton bound. In Proceedings of the 45th ACM Symposium on Theory of Computing (STOC 2013), pp. 843 - 852.

  7. Henk D. L. Hollmann. (2013). Storage codes – coding rate and repair locality. In Proceedings of the International Conference on Computing, Networking and Communications (ICNC 2013), pp. 830-834.

  8. L. Pamies-Juarez, F. Oggier, A. Datta. (2013). Data Insertion & Archiving in Erasure-coding Based Large-scale Storage Systems. In Proceedings of the 9th International Conference on Distributed Computing and Internet Technologies (ICDCIT 2013), LNCS, vol. 7753, 2013, pp 47-6

  9. 3. L. Pamies-Juarez, F. Oggier, A. Datta. (2013). Decentralized Erasure Coding for Efficient Data Archival in Distributed Storage Systems. In Proceedings of the 14th International Conference on Distributed Computing and Networking (ICDCN 2013), LNCS, vol. 7730, 2013, pp. 42-56.

  10. S. Ling, K. Nguyen, D. Stehlé & H. Wang. (2013). Improved zero-knowledge proofs of knowledge for ISIS problem, and applications. In Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2013), LNCS, vol. 7778, pp. 107 - 124, Springer.

  11. C. Chen, J. Chen, H. W. Lim, Z. Zhang, D. Feng, S. Ling & H. Wang. (2013). Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. In Proceedings of CT-RSA 2013, LNCS, vol. 7779, pp. 50 - 67, Springer.

  12. N. Jacob, S. Saetang, C-N. Chen, S. Kutzner, S. Ling, A. Poschmann. (2013). Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers. In Proceedings of the Conference on Selected Areas in Cryptography (SAC 2012), LNCS, vol. 7707, pp. 184-201.

  13. A. Steele, S. Pumpluen, F. Oggier. (2013). MIDO Space-Time Codes from Associative and Nonassociative Cyclic Algebras. In Proceedings of the 2012 Information Theory Workshop (ITW 2012), pp. 192-196

  14. P-A. Fouque, P. Karpman. (2013). Security Amplification against Meet-in-the-Middle Attacks Using Whitening. IMA CC 2013.

  15. G. Leurent, T. Peyrin and L. Wang. (2013). New Generic Attacks Against Hash-based MACs. In Advances in Cryptology - ASIACRYPT 2013.

  16. F. Mendel, T. Peyrin, M. Schläffer, L. Wang and S. Wu. (2013). Improved Cryptanalysis of Reduced RIPEMD-160. In Advances in Cryptology - ASIACRYPT 2013.

  17. M. Iwamoto, T. Peyrin and Y. Sasaki. (2013). Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful. In Advances in Cryptology - ASIACRYPT 2013.

  18. J. Guo, Y. Sasaki, L. Wang and S. Wu. (2013). Cryptanalysis of HMAC/NMAC-Whirlpool. In Advances in Cryptology - ASIACRYPT 2013.

  19. Y. Sasaki and L. Wang. (2013). Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. In Selected Areas of Cryptography (SAC 2013).

  20. J. Jean, M. Naya-Plasencia and T. Peyrin. (2013). Multiple Limited-Birthday Distinguishers and Applications. In Selected Areas of Cryptography (SAC 2013).

  21. R. Benadjila, J. Guo, V. Lomné and T. Peyrin. (2013). Implementing Lightweight Block Ciphers on x86 Architectures. In Selected Areas of Cryptography (SAC 2013).

  22. P.-A. Fouque, J. Jean and T. Peyrin. (2013). Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128. In Advances in Cryptology (CRYPTO 2013).

  23. F. Landelle and T. Peyrin. (2013). Cryptanalysis of Full RIPEMD-128. In Advances in Cryptology (CRYPTO 2013). Invited to Journal of Cryptology.

  24. F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann and S. Chakraborty. (2013). Security Challenges in Automotive Hardware/Software Architecture Design. In Design, Automation & Test in Europe (DATE 2013).

  25. J. Jean, I. Nikolic, T. Peyrin, L. Wang and S. Wu. (2013). Security Analysis of PRINCE. In Fast Software Encryption (FSE 2013).

  26. I. Nikolić, L. Wang and S. Wu. (2013). Cryptanalysis of Round-Reduced LED. In Fast Software Encryption (FSE 2013).

  27. A. Biryukov, I. Nikolić. (2013). Complementing Feistel Ciphers. In Fast Software Encryption (FSE 2013).

  28. Y. Sasaki and L. Wang. (2013). Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs. In International Conference on Information Security and Cryptology (ICISC 2013).

  29. Y. Naito, Y. Sasaki, L. Wang and K. Yasuda. (2013). Generic State-Recovery and Forgery Attacks on ChopMD-MAC and NMAC/HMAC. In International Workshop on Security (IWSEC 2013).

  30. Y. Sasaki, W. Komatsubara, Y. Sakai, L. Wang , M. Iwamoto, K. Ohta and K. Sakiyama. (2013). Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL. In International Conference on Security and Cryptography (SECRYPT 2013).

  31. J. Ducoat. (2013). Generalized rank weights: a duality statement. Finite Fields and Applications (Fq11 2013).

  32. W. Kositwattanarerk, S.S. Ong and F. Oggier. (2013). Wiretap encoding of lattices from number fields using codes over Fp. IEEE International Symposium on Information Theory (ISIT 2013).

  33. S.S. Ong and F. Oggier. (2013). Lattices from totally real number fields with large regulator. (WCC 2013).

  34. W. Kositwattanarerk and F. Oggier. (2013). On Construction D and related constructions of lattices from linear codes. (WCC 2013).

  35. N. Markin, E. Thomas and F. Oggier. (2013). Groups and Information Inequalities in 5 Variables. (Allerton 2013).

  36. F. Oggier and J.-C. Belfiore. (2013). Enabling Multiplication in Lattice Codes via Construction A. (ITW 2013).

  37. E. Thomas and F. Oggier. (2013). Explicit Constructions of Quasi-Uniform Codes from Groups. (ISIT 2013).

  38. L. Pamies-Juarez, A. Datta and F. Oggier. (2013). RapidRAID: Pipelined Erasure Codes for Fast Data Archival in Distributed Storage Systems. (Infocom 2013).

  39. L. Pamies-Juarez, H. Hollmann and F. Oggier. (2013). Locally Repairable Codes with Multiple Repair Alternatives. (ISIT 2013).

  40. H. Hollmann and W. Poh. (2013). Characterizations and construction methods for linear functional-repair storage codes. (ISIT 2013).

  41. K. S. Esmaili, L. Pamies-Juarez and A. Datta. (2013). CORE: Cross-Object Redundancy for Efficient Data Repair in Storage Systems. (BigData 2013).

publications 2012

Journal Papers

  1. S. H. Dau, V. Skachek, Y. M. Chee. Optimal index codes with near-extreme rates. IEEE Transactions on Information Theory (accepted November 2013).

  2. C. Caliskan, Y. M. Chee. New infinite families of 2-edge-balanced graphs. Journal of Combinatorial Designs (accepted July 2013).

  3. B. Liu, G. Cong, Y. Zeng, D. Xu, Y. M. Chee. Influence spreading path and its application to the time constrained social influence maximization problem and beyond. IEEE Transactions on Knowledge and Data Engineering (accepted May 2013).

  4. S. H. Dau, Y. M. Chee. Polynomial time algorithm for min-ranks of graphs with simple tree structures. Algorithmica (accepted April 2013).