
|
Journal Papers
- K. A. S. Immink. (2012). High-Rate Maximum Runlength Constrained Coding Schemes Using Nibble Replacement. IEEE Transactions on Information Theory, vol. 58, no. 10, pp. 6572 - 6580.
- J. Cilleruelo, I. E. Shparlinski, A. Zumalacarregui. (2012). Isomorphism classes of elliptic curves over a finite field in some thin families. Mathematical Research Letters, vol. 19, pp. 335 - 343.
- R. R. Farashahi, P. A. Fouque, I. E. Shparlinski, M. Tibouchi, F. Voloch. (2012). Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. Mathematics of Computation, vol. 82, pp. 491 - 512.
- L. Jin, C. Xing. (2012). Euclidean and Hermitian Self-Orthogonal Algebraic Geometry Codes and Their Application to Quantum Codes. IEEE Transactions on Information Theory, vol. 58, no. 8, pp. 5484 - 5489.
- Y. M. Chee, X. Zhang. (2012). Improved constructions of frameproof codes. IEEE Transactions on Information Theory, vol. 58, no. 8, pp. 5449 - 5453. [PDF]
- I. Cascudo, R. Cramer, C. Xing, A. Yang. (2012). Asymptotic Bound for Multiplication Complexity in the Extensions of Small Finite Fields. IEEE Transactions on Information Theory, vol. 58, no. 7, pp. 4930 - 4935.
- S. H. Dau, V. Skachek, Y. M. Chee. (2012). On the security of index coding with side information. IEEE Transactions on Information Theory, vol. 58, no. 6, pp. 3975 – 3988. [PDF]
- H. W. Lim, F. Kerschbaum, H. Wang. (2012). Workflow signatures for business process compliance. IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 9, no. 5, pp. 756-769.
- O. Farràs, I. Gracia, S. Martin, C. Padro. (2012). Linear threshold multisecret sharing schemes. Information Processing Letters, vol. 112, pp. 667 – 673.
- O. Farràs, C. Padró. (2012). Ideal Hierarchical Secret Sharing Schemes. IEEE Transactions on Information Theory, vol. 58, no. 5, pp. 3273 - 3286.
- Y. Desmedt, J. Pieprzyk, R. Steinfeld, X. Sun, C. Tartary, H. Wang, Andrew C.-C. Yao. (2012). Graph Coloring Applied to Secure Computation in Non-Abelian Groups. Journal of Cryptology, vol. 25, no. 4, pp. 557 - 600.
- A. Beimel, Y. M. Chee, H. Wang, L. F. Zhang. (2012). Communication-efficient distributed oblivious transfer. Journal of Computer and System Sciences, vol. 78, no. 4, pp. 1142–1157. [PDF]
- S. Ling, E. Ozdemir, C. Xing. (2012). Constructing Irreducible Polynomials over Finite Fields. Mathematics of Computation, vol. 81, no. 279, pp. 1663-1668.
- S. Ling, I. E. Shparlinski, R. Steinfeld, H. Wang. (2012). On the Modular Inversion Hidden Number Problem. Journal of Symbolic Computation, vol. 47, no. 4, pp. 358 - 367.
- R. Vehkalahti, C. Hollanti, F. Oggier. (2012). Fast-Decodable Asymmetric Space-Time Codes from Division Algebras. IEEE Transactions on Information Theory, vol. 58, no. 4, pp. 2362-2385.
- O. Farràs, J. Martí-Farré, C. Padró. (2012). Ideal Multipartite Secret Sharing Schemes. Journal of Cryptology, vol. 25, no. 3, pp. 434 - 463.
- Y. Ding, L. Jin, C. Xing. (2012). Good Linear Codes From Polynomial Evaluations. IEEE Transactions on Communications, vol. 60, no. 2, pp. 357 – 363.
- O. Farràs, J. R. Metcalf-Burton, C. Padró, L. Vázquez. (2012). On the Optimization of Bipartite Secret Sharing Schemes. Designs, Codes and Cryptography, vol. 63, no. 2, pp. 255 - 271.
- F. Oggier, P. Sole, J.-C. Belfiore. (2012). Codes over Matrix Rings for Space-Time Coded Modulations. IEEE Transactions on Information Theory, vol. 58, no. 2, pp. 734-746
- A. Ostafe, I. E. Shparlinski. (2012). Multiplicative character sums and products of sparse integers in residue classes. Periodica Mathematica Hungarica, vol. 64, no. 2, pp. 247 – 255.
- S. Ling, L. Qu. (2012). A note on linearized polynomials and the dimension of their kernels. Finite Fields and their Applications, vol. 18, no. 1, pp. 56 – 62.
- H. M. Kiah, K. H. Leung, S. Ling. (2012). A note on cyclic codes over GR(p^2, m) of length p^k. Designs, Codes and Cryptography, vol. 63, issue 1, pp. 105-112.
- Y. M. Chee, H. Wang, L. F. Zhang. (2012). On the Bringer-Chabanne EPIR protocol for polynomial evaluation. Journal of Mathematical Cryptology, vol. 5, no. 3–4, pp. 277–301. [PDF]
- Z. Zhang, Y. M. Chee, S. Ling, M. Liu, H. Wang. (2012). Threshold changeable secret sharing schemes revisited. Theoretical Computer Science, vol. 418, pp. 106–115. [PDF]
- Y. M. Chee, L. Ji, A. Lim, A. K. H. Tung. (2012). Arboricity: an acyclic hypergraph decomposition problem motivated by database theory. Discrete Applied Mathematics, vol. 160, no. 1–2, pp. 100–107. [PDF]
- Y. M. Chee, S. Ling, Y. Tan, X. Zhang. (2012). Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences. Mathematics of Computation, vol. 81, no. 277, pp. 585–603. [PDF]
- S. Jitman, S. Ling, P. Udomkavanich. (2012). Skew constacyclic codes over finite chain rings. Advances in Mathematics of Communications, vol. 6, no. 1, pp. 39–63.
Conference Papers
- H. Wu, T. Huang, P. H. Nguyen, H. Wang, S. Ling. (2012). Differential Attacks Against Stream Cipher ZUC. In Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information (Asiacrypt 2012), LNCS, vol. 7658, pp. 262 - 277, Springer.
- C-N. Chen, N. Jacob, S. Kutzner, S. Ling, A. Poschmann, S. Saetang. (2012). Standardized Signature Algorithms on Ultra-Constrained 4-Bit MCU. In Proceedings of the 7th International Workshop on Security (IWSEC 2012), LNCS, vol. 7631, pp. 37 - 50, Springer.
- N. Markin, F. Oggier. (2012). Fast Decodable Codes for 6Tx-3Rx MIMO Systems. In Proceedings of the International Conference on Signal Processing and Communications (SPCOM 2012), pp. 1 – 5.
- J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan. (2012). SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks. In Proceedings of the 5th International Conference on Cryptology (Africacrypt 2012), LNCS, vol. 7374, pp. 270-286, Springer.
- J. Chen, H. W. Lim, S. Ling, H. Wang, T.T.K. Nguyen. (2012). Revocable identity-based encryption from lattices. In Proceedings of the 17th Australasian Conference on Information Security and Privacy (ACISP 2012), pp. 390-403.
- Y. M. Chee, H. M. Kiah, C. Wang. (2012). Maximum distance separable symbol-pair codes. In ISIT 2012 – Proceedings of the 2012 IEEE International Symposium on Information Theory, pp. 2896–2900. [PDF]
- S. H. Dau, V. Skachek, Y. M. Chee. (2012). Optimal index codes with near-extreme rates. In ISIT 2012 – Proceedings of the 2012 IEEE International Symposium on Information Theory, pp. 2251–2255. [PDF]
- Y. M. Chee, H. M. Kiah, A. C. H. Ling, C. Wang. (2012). Optimal equitable symbol weight codes for power line communications. In ISIT 2012 – Proceedings of the 2012 IEEE International Symposium on Information Theory, pp. 671–675. [PDF]
- Y. M. Chee, H. M. Kiah, P. Purkayastha, C. Wang. (2012). Importance of symbol equity in coded modulation for power line communications. In ISIT 2012 – Proceedings of the 2012 IEEE International Symposium on Information Theory, pp. 666–670. Student Paper Award finalist. [PDF]
- Y. M. Chee, P. Purkayastha. (2012). Efficient decoding of permutation codes obtained from distance preserving maps. In ISIT 2012 – Proceedings of the 2012 IEEE International Symposium on Information Theory, pp. 641–645. [PDF]
- C. Bracken, Y. M. Chee, P. Purkayastha. (2012). Optimal family of q-ary codes obtained from a substructure of generalised Hadamard matrices. In ISIT 2012 – Proceedings of the 2012 IEEE International Symposium on Information Theory, pp. 116–119. [PDF]
- C. Hollanti, N. Markin. (2012). Algebraic Fast-Decodable Relay Codes for Distributed Communications. In Proceedings of the 2012 IEEE International Symposium on Information Theory (ISIT 2012), pp. 940 – 944.
- L. Jin, C. Xing. (2012). A Construction of Quantum Codes via A Class of Classical Polynomial Codes. In Proceedings of the 2012 IEEE International Symposium on Information Theory (ISIT 2012), pp. 344-347.
- N. Markin, F. Oggier. (2012). A Class of Iterated Fast Decodable Space-Time Codes for 2n Tx Antennas. In Proceedings of the 2012 IEEE International Symposium on Information Theory (ISIT 2012), pp. 2836 – 2840.
- R. Steinfeld, S. Ling, J. Pieprzyk, C. Tartary, H. Wang. (2012). NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. In Proceedings of the 15th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2012), LNCS, vol. 7293, pp. 353-371, Springer.
- V. Guruswami, C. Xing. (2012). Folded codes from function fields and improved list decoding. In Proceedings of the 44th ACM Symposium on Theory of Computing (STOC 2012), pp. 339 – 350.
- J. Chen, H. Wee, H. W. Lim, S. Ling, H. Wang. (2012). Compact IBE and signatures via asymmetric pairings. In Proceedings of the 5th International Conference on Pairing-Based Cryptography (Pairing 2012), LNCS, vol. 7708, pp. 122-140, Springer.
- L. Wei, T. Peyrin, P. Sokolowski, S. Ling, J. Pieprzyk, H. Wang. (2012). On the (In)Security of IDEA in Various Hashing Modes. In Proceedings of the 19th International Workshop on Fast Software Encryption (FSE 2012), pp. 163 – 179.
|
|
|