Journal Papers

  1. Q. Ye, H. Wang, J. Pieprzyk, X. M. Zhang. (2009).  Unconditionally Secure Disjointness Tests for Private Datasets,  Int. J. Applied Cryptography,1(3), 225-235.

  2. C. Xing. (2009). A Constructive bound of kissing numbers. Proceedings of Amer. Math. Soc., 137, 2953-2957.

  3. C. Xing, Y. Ding. (2009). Multisequences with large linear and k-error linear complexity from Hermitian function fields. IEEE Transactions on Information. Theory, 55(8),  3858-3863. 

  4. F. Oggier, E. Lequeu. (2009). Differential Distributed Cayley Space-Time Codes. IEEE Transactions on Wireless Communications, Vol. 8, no 7.

  5. C. Li, Q. Li, S. Ling. (2009). On the constructions of constant-composition codes from perfect nonlinear functions. Science in China - Series F: Information Sciences, 52(6), 964-973.

  6. G. Berhuy, F. Oggier. (2009). On the Existence of Perfect Space-Time Codes. IEEE Transactions on Information Theory, 55(5), vol. 55, no 5.

  7. C. Xing, S. L. Yeo. (2009). Construction of Global Function Fields from Linear Codes and Vice Versa. Transactions of the American Mathematical Society, 361, 1333-1349.  

  8. Y. M. Chee, A. C. H. Ling. (2009). Limit on the addressability of fault-tolerant nanowire decoders. IEEE Transactions on Computers, 58(1), 60-68.

  9. C. Li, Q. Li, S. Ling. (2009). Properties and applications of preimage distributions of perfect nonlinear functions. IEEE Transactions on Information Theory, 55(1), 64-69.

  10. C. Li, S. Ling, L. Qu. (2009). On the covering structures of two classes of linear codes from perfect nonlinear functions. IEEE Transactions on Information Theory, 55(1), 70-82.

  11. Y. Desmedt, N. Duif, H. van Tilborg, H. Wang. (2009). Bounds and constructions for key distribution schemes. Advances in Mathematics of Communications, 3(3),  273-293.

Conference Papers

  1. H. Chen, S. Ling, C. Padro, H. Wang, C. Xing. (2009). Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes. Twelfth IMA International Conference on Cryptography and Coding, IMACC 2009.

  2. S. Li, H. Jameel, J. Pieprzyk, A. R.  Sadeghi, R.  Schmitz, H. Wang. (2009).  On the Security of PAS (Predicate-based Authentication Service). 25th Annual Computer Security Applications Conference (ACSAC 2009).

  3. K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki, L. Wang. (2009). Preimages for Step-Reduced SHA-2. In proceedings of ASIACRYPT, M. Matsui ed., LNCS, Vol. 5912, pp. 578-597, Springer.

  4. T. Eisenbarth, A. Moradi, C. Paar, A. Poschmann.(2009). Power Analysis of Single-Rail Storage Elements as used in MDPL. International Conference on Information Security and Cryptology (ICISC 2009).

  5. A. Poschmann, M. Robshaw, F. Vater, C. Paar. (2009). Lightweight Cryptography and RFID: Tackling the Hidden Overheads. International Conference on Information Security and Cryptology (ICISC 2009).

  6. Q. Ye, R. Steinfeld, J. Pieprzyk, H. Wang. (2009). Efficient Fuzzy Matching and Intersection on Private Datasets.  International Conference on Information Security and Cryptology (ICISC 2009).

  7. I. Cascudo, H. Chen, R. Cramer, C. Xing. (2009). Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over  Any Fixed Finite Field,  Proceedings of  CRYPTO 2009, LNCS 5677, Springer, pp. 466-486.

  8. J. Guo, K. Matusiewicz, L. R. Knudsen, S. Ling, H. Wang. (2009). Practical pseudo-collisions for hash functions ARIRANG-224/384, SAC2009.

  9. F. Oggier, P. Sole. (2009). Higher Dimensional Perfect Space-Time Coded Modulation. ITW 2009.

  10. V. Pasupathinathan, J. Pieprzyk, H. Wang. (2009). Certified pseudonyms colligated with master secret key. International Conference on Security and Cryptography (SECRYPT 2009).

  11. F. Oggier, P. Sole, J.-C. Belfiore. (2009). Codes over M2(F2) and Applications to Golden Space-Time Modulation. International Symposium on Information Theory (ISIT 2009).

  12. A. Buryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolic, J. Pieprzyk,  H. Wang. (2009). Cryptanalysis of the LAKE hash family. 16th International Workshop on Fast Software Encryption.

  13. F. Oggier. (2009). A Survey of Algebraic Unitary Codes. International Workshop on Coding and Cryptography.

  14. A. Pott, Y. Tan, T. Feng, S. Ling. (2009). Association schemes arising from bent functions. Workshop on Coding and Cryptography – WCC 2009, A. Kholosha, E. Rosnes & M. Parker eds., pp. 48-61.

  15. M. Vogt, A. Poschmann, C. Paar. (2009). Cryptography is Feasible on 4-Bit Microcontrollers - A Proof of Concept. International IEEE Conference on RFID, pp. 241-248.

  16. M. Sbeiti, M. Silbermann, A. Poschmann, C. Paar. (2009). Design Space Exploration of PRESENT Implementations for FPGAs. 5th Southern Conference on Programmable Logic, pp. 141 - 145.

  17. D. Zhang, Y. M. Chee, A. Mondal, A. K. H. Tung, M. Kitsuregawa. (2009). Keyword search in spatial databases: towards searching by document. ICDE 2009 – Proceedings of the IEEE 25th International Conference on Data Engineering, pp. 388-399, IEEE Computer Society.

Books Editorial

  1. Y. M. Chee, C. Li, S. Ling, H. Wang, C. Xing (Eds.). (2009). Coding and Cryptology, vol.5557 of Lecture Notes in Computer Science, Springer-Verlag.


  1. H. Niederreiter, C. Xing. (2009). Algebraic Geometry in Coding Theory and Cryptography, Princeton University Press.