Publications 2014

Journal Papers

  1. S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, and H. Wang. (2014). The Resistance of PRESENT-80 Against Related-Key Differential Attacks. Cryptography and Communications, September 2014.

  2. D. Khovratovich, I. Nikolić, and C. Rechberger. (2014). Rotational Rebound Attacks on Reduced Skein. Journal of Cryptology, July 2014.

  3. T. Peyrin. (2014). Collision Attack on Grindahl. Journal of Cryptology, May 2014.

  4. Y. Sasaki and L. Wang. (2014). Comprehensive Study of Integral Analysis on LBlock. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, January 2014.

  5. Y. Sasaki and L. Wang. (2014). Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, January 2014.

  6. W. Kositwattanarerk and F. Oggier. (2014). Connections Between Construction D and Related Constructions of Lattices. Designs, Codes and Cryptography, vol. 73, no. 2, pp 441-455, Nov. 2014.

  7. S.S. Ong and F. Oggier. (2014). Wiretap Lattice Codes from Number Fields with no Small Norm Elements. Designs, Codes and Cryptography, vol. 73, Issue 2, pp 425-440, Nov. 2014.

  8. E. Thomas, N. Markin, and F. Oggier. (2014). On Abelian Group Representability of Finite Groups. Advances in Mathematics of Communication , Volume 8, No. 2, pp. 139-152, 2014.

  9. J. Chen, H. W. Lim, S. Ling, H. Wang. (2014). The relation and transformation between hierarchical inner product encryption and spatial encryption. Des. Codes Cryptography vol. 71 no. 2, pp. 347-364, 2014.

  10. J. Chen, H. W. Lim, S. Ling, L. Su, H. Wang. (2014). Spatial encryption supporting non-monotone access structure. Des. Codes Cryptography vol. 73 no. 3, pp. 731-746, 2014.

  11. J. Chen, H. W. Lim, S. Ling, H. Wang, H. Wee. (2014). Shorter identity-based encryption via asymmetric pairings. Des. Codes Cryptography vol. 73 no. 3, pp. 911-947, 2014.

  12. S. Ling, I. Shparlinski, H. Wang. (2014). On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random Function. Math. Comput. vol. 83, no. 289, pp. 2429-2434, Sep. 2014.

  13. Y. Fan, S. Ling, H. Liu. (2014). Matrix product codes over finite commutative Frobenius rings. Des. Codes Cryptography vol. 71, no. 2, pp. 201-227, 2014.

  14. Y. Fan, S. Ling, H. Liu. (2014). Homogeneous weights of matrix product codes over finite principal ideal rings. Finite Fields and Their Applications vol. 29, pp 247-267, 2014.

  15. S. Ling, E. Ozdemir, C. Xing. (2014). A relation between embedding degrees and class numbers of binary quadratic forms. Math. Comput. vol. 83, no. 290, 2014.

  16. S. Jitman, S. Ling, P. Solé. (2014). Hermitian Self-Dual Abelian Codes. IEEE Transactions on Information Theory vol. 60, no.3, pp. 1496-1507, 2014.

  17. X. Yi, E. Bertino, J. Vaidya, C. Xing. (2014). Private Searching on Streaming Data Based on Keyword Frequency. IEEE Trans. Dependable Sec. Comput. vol. 11, no. 2, pp. 155-167, 2014.

  18. O. Farràs, C. Padró, C. Xing, A. Yang. (2014). Natural Generalizations of Threshold Secret Sharing. IEEE Transactions on Information Theory vol. 60, no. 3, pp. 1652-1664, 2014.

  19. L. Jin, C. Xing. (2014). A Construction of New Quantum MDS Codes. IEEE Transactions on Information Theory vol. 60, no. 5, pp. 2921-2925, 2014.

  20. I. Cascudo, R. Cramer, C. Xing. (2014). Torsion Limits and Riemann-Roch Systems for Function Fields and Applications. IEEE Transactions on Information Theory vol. 60, no. 7, pp. 3871-3888, 2014.

  21. Y. Ding, L. Jin, C. Xing. (2014). Erasure List-Decodable Codes From Random and Algebraic Geometry Codes. IEEE Transactions on Information Theory vol. 60, no. 7, pp. 3889-3894, 2014.

  22. H. Niederreiter, C. Xing. (2014). Sequences With High Nonlinear Complexity. IEEE Transactions on Information Theory vol. 60, no.10, pp. 6696-6701, 2014.

Conference Papers

  1. N. Anandakumar, T. Peyrin, and A. Poschmann. (2014). A Very Compact FPGA Implementation of LED and PHOTON. (INDOCRYPT 2014).

  2. J. Guo, J. Jean, I. Nikolić, and Y. Sasaki. (2014). Meet-in-the-Middle Attacks on Generic Feistel Constructions. (ASIACRYPT 2014).

  3. S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, and H. Wang. (2014). Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. (ASIACRYPT 2014).

  4. J. Jean, I. Nikolić, and T. Peyrin. (2014). Tweaks and Keys for Block Ciphers: the TWEAKEY Framework. (ASIACRYPT 2014).

  5. Y. Sasaki and L. Wang. (2014). Message Extension Attack against Authenticated Encryptions: Application to PANDA. (CANS 2014).

  6. A. Biryukov and I. Nikolić. (2014). Colliding Keys for SC2000-256. In Selected Areas in Cryptography (SAC 2014).

  7. D. Augot, P-A. Fouque, and P. Karpman. (2014). Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation. In Selected Areas in Cryptography (SAC 2014).

  8. J. Jean, I. Nikolić, Y. Sasaki, and L. Wang. (2014). Practical Cryptanalysis of PAES. In Selected Areas in Cryptography (SAC 2014).

  9. J. Guo, J. Jean, G. Leurent, T. Peyrin and L. Wang. (2014). The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. In Selected Areas in Cryptography (SAC 2014).

  10. Y. Sasaki and L. Wang. (2014). Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. (SCN 2014).

  11. K. Khoo, T. Peyrin, A. Poschmann and H. Yap. (2014). FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. (CHES 2014).

  12. J. Guo, T. Peyrin, Y. Sasaki and L. Wang. (2014). Updates on Generic Attacks against HMAC and NMAC. In Advances in Cryptology (CRYPTO 2014).

  13. T. Peyrin and L. Wang. (2014). Generic Universal Forgery Attack on Iterative Hash-based MACs. In Advances in Cryptology (EUROCRYPT 2014).

  14. I. Dinur and J. Jean. (2014). Cryptanalysis of FIDES. (FSE 2014).

  15. T. Iwata and L. Wang. (2014). Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs. (FSE 2014).

  16. J. Guo, Y. Sasaki, L. Wang, M. Wang, and L. Wen. (2014). Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. (FSE 2014).

  17. T. Iwata, K. Minematsu, J. Guo, and S. Morioka. (2014). CLOC: Authenticated Encryption for Short Input. (FSE 2014).

  18. J. Guo, P. Karpman, I. Nikolić, L. Wang, and S. Wu. (2014). Analysis of BLAKE2. In RSA Conference Cryptographers' Track (CT-RSA 2014).

  19. Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, and K. Ohta. (2014). An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl. In RSA Conference Cryptographers' Track - (CT-RSA 2014).

  20. X. Hou, F. Lin, and F. Oggier. (2014). Construction and Secrecy Gain of a Family of 5-modular Lattices. (ITW 2014).

  21. J. Ducoat and F. Oggier. (2014). Rank weight hierarchy of some classes of cyclic codes. (ITW 2014).

  22. J. Ducoat and F. Oggier. (2014). Lattice Encoding of Cyclic Codes from Skew-polynomial Rings. (4ICMCTA).

  23. F. Lin, C. Ling, and J.-C. Belfiore. (2014). Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices. (ISIT 2014).

  24. J. Ducoat and F. Oggier. (2014). An Analysis of Small Dimensional Fading Wiretap Lattice Codes. (ISIT 2014).

  25. R. Vehkalahti, W. Kositwattanarerk and F. Oggier. (2014). Constructions A of Lattices from Number Fields and Division Algebras. (ISIT 2014).

  26. E. Thomas and F. Oggier. Applications of Quasi-uniform Codes to Storage. Invited Paper. (SPCOM 2014).

  27. M. A. Vázquez-Castro and F. Oggier. (2014). Lattice Network Coding over Euclidean Domains. (EUSIPCO 2014).

  28. F. Oggier. (2014). Some Constructions of Storage Codes from Grassmann Graphs. International Zurich Seminar on Communications (Invited Paper) 2014.

  29. S. Liu and F. Oggier. (2014). On Storage Codes Allowing Partially Collaborative Repairs. (ISIT 2014).

  30. S. Liu and F. Oggier. (2014). Two Storage Code Constructions Allowing Partially Collaborative Repairs. (ISITA 2014).

  31. S. Liu and F. Oggier. (2014). On the Design of Storage Orbit Codes. (4ICMCTA).

  32. S. Emami, S. Ling, I. Nikolic, J. Pieprzyk, H. Wang. (2014). Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. (ASIACRYPT 2014) pp. 141-157.

  33. A. Langlois, S. Ling, K. Nguyen, H. Wang. (2014). Lattice-Based Group Signature Scheme with Verifier-Local Revocation. (PKC 2014) pp 345-361.

  34. C. Bösch, A. Peter, B. Leenders, H. W. Lim, Q. Tang, H. Wang, P. H. Hartel, W. Jonker. (2014). Distributed Searchable Symmetric Encryption. (PST 2014), pp. 330-337.

  35. S. Ling, D. H. Phan, D. Stehlé, R. Steinfeld. (2014). Hardness of k-LWE and Applications in Traitor Tracing. (CRYPTO 2014) pp. 315-334.

  36. A. Zeh, S. Ling. (2014).Decoding of quasi-cyclic codes up to a new lower bound on the minimum distance. (ISIT 2014), pp. 2584-2588.

  37. V. Guruswami, C. Xing. (2014). Hitting Sets for Low-Degree Polynomials with Optimal Density. IEEE Conference on Computational Complexity 2014, pp. 161-168.

  38. Y. M. Chee, L. Wu, C. Xing. (2014). Correcting on curves and highly sound locally correctable codes of high rate. (ISIT 2014), pp. 2964-2966.

  39. V. Guruswami, C. Xing. (2014). Optimal rate list decoding of folded algebraic-geometric codes over constant-sized alphabets. (SODA 2014), pp. 1858-1866.

publications 2012

Journal Papers

  1. To be updated