
|
Journal Papers
-
Y. M. Chee, A. C. H. Ling, J. Yin. (2010). Optimal partitioned cyclic difference packings for frequency hopping and code synchronization. IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5738–5746.
[PDF]
- E. Byrne, M. Greferath, A. Kohnert, V. Skachek. (2010). New Bounds for Codes over Finite Frobenius Rings. Designs, Codes and Cryptography, 57(2), 169-179.
- L. Jin, S. Ling, J. Luo, C. Xing. (2010). Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes. IEEE Transactions on Information Theory 56, no. 9, 4735 – 4740.
- S. Ling, J. Luo, C. Xing. (2010). Generalization of Steane’s enlargement construction of quantum codes and applications. IEEE Transactions on Information Theory 56, no. 8, 4080 – 4084.
- A. Ostafe, I. E. Shparlinski, A. Winterhof. (2010). On the Generalized Joint Linear Complexity Profile of a Class of Nonlinear Pseudorandom Multisequences. Advances in Mathematics of Communications, vol. 4, pp. 369-379.
- L. Wang, K. Feng, S. Ling, C. Xing. (2010). Asymmetric quantum codes: characterization and constructions. IEEE Transactions on Information Theory 56, no. 6, 2938 – 2945.
- H-M. Sun, H. Wang, B-H. Ku, J. Pieprzyk. (2010). Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time. SIAM J. on Discrete Math, pp. 617- 638.
- Y. M. Chee, C. Xing, S. L. Yeo. (2010). New constant weight codes from propagation rules. IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1596-1599. [PDF]
- I. E. Shparlinski, R. R. Farashahi, F. Voloch. (2010). On hashing into elliptic curves. Journal of Mathematical Cryptology, vol. 3, 353-360.
- A. Poschmann, M. Robshaw, F. Vater, C. Paar. (2010). Lightweight Cryptography and RFID: Tackling the Hidden Overheads. KSII Transactions on Internet and Information Systems, vol. 4, no. 2, pp. 98-116.
- V. Skachek. (2010). Recursive Code Construction for Random Networks. IEEE Transactions on Information Theory, 56, 1378-1382.
- Y. M. Chee, G. Ge, A. C. H. Ling. (2010). Spectrum of sizes for perfect deletion-correcting codes. SIAM Journal on Discrete Mathematics, vol. 24, no. 1, pp. 33-55. [ PDF]
- Y. M. Chee, S. H. Dau, A. C. H. Ling, S. Ling. (2010). Linear size optimal q-ary constant-weight codes and constant-composition codes. IEEE Transactions on Information Theory, vol. 56, no. 1, pp. 140-151. MR2589435 [ PDF]
- F. Oggier, B. Hassibi. (2010). Cyclic Distributed Space-Time Codes for Wireless Networks with no Channel Information. IEEE Transactions on Information Technology Theory, vol. 56, no 1.
- H. Jin, J. Lotspiech, S. Pehlivanoglu. (2010). Defending Against the Pirate Evolution Attack. Int. J. Applied cryptography, vol. 1, pp. 64-74.
- K. Cai, K.A.S. Immink, Y. X. Lee, Z. Qin. (2010). Art of Combining Distance-Enhancing Constrained Codes with Parity-Check Codes for Data Storage Channels. IEEE Journal on Selected Areas of Communications, Special Issue on Signal Processing and Coding for Digital Storage, vol. 28, pp. 208-217.
- K.A.S. Immink. (2010). Any Song, Anytime, Anywhere. Audio Engineering Society Journal, vol. 59, pp. 73-79.
- K.A.S. Immink, J. Weber. (2010). Very Efficient Balancing of Codewords. IEEE Journal on Selected Areas of Communications, Special Issue on Signal Processing and Coding for Digital Storage, vol. 28, pp. 188-192.
- I. E. Shparlinski, L. Glebsky. (2010). Short cycles in repeated exponentiation modulo a prime. Designs, Codes and Cryptography, vol. 56, 35-42.
- A. J. Van Wijngaarden, K.A.S. Immink. (2010). Construction of Maximum Run-Length Limited Codes using Sequence Replacement Techniques. IEEE Journal on Selected Areas of Communications, Special Issue on Signal Processing and Coding for Digital Storage, vol. 28, pp. 200-207.
Conference Papers
- J. Guo, S. Ling, C. Rechberger, H. Wang. (2010). Advanced meet-in-the-middle preimage attacks: first results on full Tiger and improved results on MD4 and SHA-2. In proceedings of ASIACRYPT 2010, M. Abe (Ed.), LNCS 6477, Springer, pp. 56-75
- J.-C. Belfiore, F. Oggier. (2010). Secrecy Gain: a Wiretap Lattice Code Design. Proceedings of the International Symposium on Information Theory and its Applications (ISITA 2010), pp. 174 – 178.
- K.A.S. Immink. (2010). High-Rate Maximum Runlength Constrained Coding Schemes Using Base Conversion. In Proceedings of the ISITA 2010, Taichung, Korea, pp. 469-472.
- Y. M. Chee, Y. Tan, Y. Zhou. (2010). Almost p-ary perfect sequences. In SETA 2010 - Proceedings of the 6th Conference on Sequences and Their Applications, C. Carlet and A. Pott, eds., vol. 6338 of Lecture Notes in Computer Science, pp. 399–415, Springer-Verlag. [PDF]
- A. Poschmann, S. Ling, H. Wang. (2010). 256 bit standardized crypto for 650 GE – GOST revisited, In: Cryptographic Hardware and Embedded Systems – CHES 2010, 12th International Workshop, S. Mangard, F.-X. Standaert eds., Lecture Notes in Computer Science 6225, Springer, pp. 219 – 233.
- V. Skachek. (2010). Characterization of Graph-cover Pseudocodewords of Codes over F_3. Information Theory Workshop (ITW 2010).
- R. dela Cruz, A. Meyer, P. Sole. (2010). An extension of Massey scheme for secret sharing. ITW 2010.
- L. Knudsen, G. Leander, A. Poschmann, M.J.B. Robshaw. (2010). PRINTcipher: A Block Cipher for IC-Printing. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Santa Barbara, CA, USA. LNCS 6225, pp 16-32, Springer-Verlag.
- F. Oggier, C. Hollanti, R. Vehkalahti. (2010). An Algebraic MIDO-MISO Code Construction. SPCOM 2010.
- P. H. Nguyen, L. Wei, H. Wang, S. Ling. (2010). On multidimensional linear cryptanalysis, In: Information Security and Privacy, 15th Australasian Conference, R. Steinfeld, P. Hawkes eds., Lecture Notes in Computer Science 6168, Springer, pp. 37 – 52.
- J. Zumbragel, M. F. Flanagan, V. Skachek (2010). Exploration of AWGN and BSC Pseudocodeword Redundancy. 19th International Symposium on Mathematical Theory of Networks and Systems (MTNS) 2010.
- F. Oggier, R. Vehkalahti, C. Hollanti. (2010). Fast Decodable MIDO Codes from Crossed Product Algebras. ISIT 2010.
- H. J. Asghar, J. Pieprzyk, H. Wang. (2010). A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), LNCS, vol. 6123, pp. 349 – 366.
- A. Kiayias, S. Pehlivanoglu. (2010). Improving the Round Complexity of Traitor Tracing Schemes. 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, LNCS, Vol. 6123, pp. 273-290.
- H. Yap, K. Khoo, A. Poschmann. (2010). Parallelizing the Camellia and SMS4 Block Ciphers. International Conference on Cryptology in Africa, AfricaCRYPT 2010, Stellenbosch, South Africa, LNCS 6055, pp. 387-406, Springer-Verlag.
- J. Zumbragel, M. F. Flanagan, V. Skachek (2010). On the Pseudocodeword Redundancy. IEEE International Symposium on Information Theory (ISIT) 2010.
- M. Mihaljevic, F. Oggier. (2010). A Wire-tap Approach to Enhance Security in Communication Systems using the Encoding-Encryption Paradigm. ICT 2010.
- S. Jiang, H. Wang. (2010). Plaintext-Awareness of Hybrid Encryption. RSA Conference 2010, Cryptographers' Track (CT-RSA 2010), San Francisco, CA, USA, LNCS, Springer vol. 5985, pp. 57-72.
- J.-P. Aumasson, J. Guo, S. Knellwolf, K. Matusiewicz, W. Meier. (2010). Differential and Invertibility Properties of BLAKE. In Proceedings of Fast Software Encryption (FSE 2010), S. Hong and T. Iwata ed., LNCS, Vol. 6147, pp. 318-332, Springer.
- M. Robshaw, A. Poschmann. (2010). The Case for Dynamic RFID Tag Authentication. Workshop on RFID Security, RFIDsec'2010 Asia, CIS, pp. 19-32, IOS press.
- H. Chen, S. Ling, C. Padro, H. Wang, C. Xing. (2010). Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. 12th IMA International Conference on Cryptography and Coding (IMACCC 2009), M. Parker ed, LNCS, Vol. 5921, pp. 263-277.
- S. Li, H. Jameel, J. Pieprzyk, A. R. Sadeghi, R. Schmitz, H. Wang. (2010). On the Security of PAS (Predicate-based Authentication Service). 25th Annual Computer Security Applications Conference (ACSAC 2009), Honolulu, Hawaii, USA, pp. 209-218.
- A. Moradi, A. Poschmann. (2010). Lightweight Cryptography and DPA Countermeasures: A Survey. Financial Cryptography Workshops – WLC'2010, Tenerife, Canary Islands, Spain, 2010, LNCS 6052, pp. 68-79, Springer-Verlag.
- Q. Ye, R. Steinfeld, J. Pieprzyk, H. Wang. (2010). Efficient Fuzzy Matching and Intersection on Private Datasets. International Conference on Information Security and Cryptology (ICISC 2009), LNCS, vol. 5984, pp. 211 – 228.
Book
- A. Kiayias, S. Pehlivanoglu. (2010). Encryption for Digital Content. ISBN: 978-1-4419-0043-2. Springer Advances in Information Security, Vol. 52.
Book Chapter
- S. Pehlivanoglu. Broadcast and Content Distribution in Burton Rosenberg (Ed.). Handbook of Financial Cryptography and Security. ISBN: 9781420059816. Chapman \& Hall/CRC Cryptography and Network Security Series.
|
|
|