Journal Papers

  1. S. Ling, F. Özbudak, C. Xing. (2006). An explicit class of codes with good parameters and their duals. Discrete Applied Mathematics, 154, 346-356.

  2. S. Ling, F. Özbudak. (2006). Improved p-ary codes and sequence families from Galois rings of characteristic p2. SIAM Journal on Discrete Mathematics, 19, 1011-1028.

  3. S. Ling, H. Niederreiter, P. Solé. (2006). On the algebraic structure of quasi-cyclic codes IV: repeated roots. Designs Codes and Cryptography, 38, 337-361.

  4. S. Dougherty, S. Ling. (2006). Cyclic codes over Z4of even length. Designs Codes and Cryptography, 39, 127-153.

  5. Y. Tang, F.-W. Fu, S. Ling. (2006). On the reliability-order-based decoding algorithm for binary linear block codes. IEEE Transactions on Information Theory, 52, 328-336.

  6. K. Feng, S. Ling, C. Xing. (2006). Asymptotic bounds on quantum codes from algebraic geometry codes. IEEE Transactions on Information Theory, 52, 986-991.

  7. S. Ling, F. Özbudak. (2006). Aperiodic and odd correlations of some p-ary sequences from Galois rings. IEICE - Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A(9), 2258-2263.

  8. S.-T. Xia, F.-W. Fu, S. Ling. (2006). A lower bound on the probability of undetected error for binary constant weight codes. IEEE Transactions on Information Theory, 52(9), 4235-4243.

  9. R. Safavi-Naini, H. Wang, D. S. Wong. (2006). Resilient LKH: Secure Multicast Key Distribution Schemes. International Journal of Foundations of Computer Science,17(5), 1205 -1221.

  10. R. Safavi-Naini, H. Wang. (2006). Secret Sharing Schemes with Partial Broadcast Channels, Designs. Designs Codes and Cryptography, 41(1), 5-22.

  11. S. Long, J. Pieprzyk, H. Wang, D. S. Wong. (2006). Generalised Cumulative Arrays in Secret Sharing. Designs Codes and Cryptography, 40(3),191-209.

  12. R. Steinfeld, J. Pieprzyk, H. Wang. (2006). Lattice-Based Threshold-Changeability for Standard CRT Secret-Sharing Schemes. Finite Fields and Their Applications, 12(2), 653-680.

Conference Papers

  1. S. Ling, F. Özbudak. (2006). Improved bounds on Weil sums over Galois rings and homogeneous weights. Coding and Cryptography, WCC 2005,  Lecture Notes in Computer Science, vol. 3969, pp. 412-426, Springer.

  2. S.-T. Xia, F.-W. Fu, S. Ling. (2006). A lower bound on the probability of undetected error for binary constant weight codes. International Symposium on Information Theory,  ISIT 2006, pp. 302-306.

  3. G. Gupta, J. Pieprzyk, H. Wang. (2006). An attack-localizing watermarking scheme for natural language documents. The ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006), pp. 157 – 165. ACM Press.

  4. R. Steinfeld, J. Pieprzyk, H. Wang. (2006). On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Advances in Cryptology (ASIACRYPT 2006), Lecture Notes in Computer Science, vol. 4284, pp. 194 - 209, Springer-Verlag.

  5. G. Yang, D. S. Wong, H. Wang, X. Deng. (2006). Anonymous Signature Schemes. International Workshop on Practice and Theory in Public Key Cryptography (PKC 2006), Lecture Notes in Computer Science, vol. 3958, pp. 347 - 343, Springer-Verlag.

  6. R. Steinfeld, J. Pieprzyk, H. Wang. (2006). Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. International Workshop on Practice and Theory in Public Key Cryptography (PKC 2006), Lecture Notes in Computer Science, vol. 3958, pp. 157 - 173, Springer-Verlag.

  7. C. Tartary, H. Wang. (2006). Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. 2nd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2006), Lecture Notes in Computer Science, vol. 4318, pp. 103 - 117, Springer-Verlag.

  8. C. Tartary, H. Wang. (2006). Rateless Codes for the Multicast Stream Authentication Problem. The 1st International Workshop on Security ( IWSEC2006), Lecture Notes in Computer Science, vol. 3786, pp. 108 - 125, Springer-Verlag.

  9. G. Yang, D. S. Wong, H. Wang, X. Deng. (2006). Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme. 8th International Conference on Information and Communications Security (ICICS 2006), Lecture Notes in Computer Science, vol. 4307, pp. 82 - 91, Springer-Verlag.