Journal Papers

  1. Y. M. Chee, A. C. H. Ling, J. Yin. (2010). Optimal partitioned cyclic difference packings for frequency hopping and code synchronization. IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5738–5746. [PDF]

  2. E. Byrne, M. Greferath, A. Kohnert, V. Skachek. (2010). New Bounds for Codes over Finite Frobenius Rings. Designs, Codes and Cryptography, 57(2), 169-179.

  3. L. Jin, S. Ling, J. Luo, C. Xing. (2010). Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes. IEEE Transactions on Information Theory 56, no. 9, 4735 – 4740.  

  4. S. Ling, J. Luo, C. Xing. (2010). Generalization of Steane’s enlargement construction of quantum codes and applications. IEEE Transactions on Information Theory 56, no. 8, 4080 – 4084. 

  5. A. Ostafe, I. E. Shparlinski, A. Winterhof. (2010). On the Generalized Joint Linear Complexity Profile of a Class of Nonlinear Pseudorandom Multisequences. Advances in Mathematics of Communications, vol. 4, pp. 369-379.

  6. L. Wang, K. Feng, S. Ling, C. Xing. (2010). Asymmetric quantum codes: characterization and constructions. IEEE Transactions on Information Theory 56, no. 6, 2938 – 2945.

  7. H-M. Sun, H. Wang, B-H. Ku, J. Pieprzyk. (2010). Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time. SIAM J. on Discrete Math, pp. 617- 638.

  8. Y. M. Chee, C. Xing, S. L. Yeo. (2010). New constant weight codes from propagation rules. IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1596-1599. [PDF]

  9. I. E. Shparlinski, R. R. Farashahi, F. Voloch. (2010). On hashing into elliptic curves. Journal of Mathematical Cryptology, vol. 3, 353-360.

  10. A. Poschmann, M. Robshaw, F. Vater, C. Paar. (2010). Lightweight Cryptography and RFID: Tackling the Hidden Overheads. KSII Transactions on Internet and Information Systems, vol. 4, no. 2, pp. 98-116.

  11. V. Skachek. (2010). Recursive Code Construction for Random Networks. IEEE Transactions on Information Theory, 56, 1378-1382.

  12. Y. M. Chee, G. Ge, A. C. H. Ling. (2010). Spectrum of sizes for perfect deletion-correcting codes. SIAM Journal on Discrete Mathematics, vol. 24, no. 1, pp. 33-55. [ PDF]

  13. Y. M. Chee, S. H. Dau, A. C. H. Ling, S. Ling. (2010). Linear size optimal q-ary constant-weight codes and constant-composition codes. IEEE Transactions on Information Theory, vol. 56, no. 1, pp. 140-151. MR2589435 [ PDF]

  14. F. Oggier, B. Hassibi. (2010). Cyclic Distributed Space-Time Codes for Wireless Networks with no Channel Information. IEEE Transactions on Information Technology Theory, vol. 56, no 1.

  15. H. Jin, J. Lotspiech, S. Pehlivanoglu. (2010). Defending Against the Pirate Evolution Attack. Int. J. Applied cryptography, vol. 1, pp. 64-74.

  16. K. Cai, K.A.S. Immink, Y. X. Lee, Z. Qin. (2010). Art of Combining Distance-Enhancing Constrained Codes with Parity-Check Codes for Data Storage Channels. IEEE Journal on Selected Areas of Communications, Special Issue on Signal Processing and Coding for Digital Storage, vol. 28, pp. 208-217.

  17. K.A.S. Immink. (2010). Any Song, Anytime, Anywhere. Audio Engineering Society Journal, vol. 59, pp. 73-79.

  18. K.A.S. Immink, J. Weber. (2010). Very Efficient Balancing of Codewords. IEEE Journal on Selected Areas of Communications, Special Issue on Signal Processing and Coding for Digital Storage, vol. 28, pp. 188-192.

  19. I. E. Shparlinski, L. Glebsky. (2010). Short cycles in repeated exponentiation modulo a prime. Designs, Codes and Cryptography, vol. 56, 35-42.

  20. A. J. Van Wijngaarden, K.A.S. Immink. (2010). Construction of Maximum Run-Length Limited Codes using Sequence Replacement Techniques. IEEE Journal on Selected Areas of Communications, Special Issue on Signal Processing and Coding for Digital Storage, vol. 28, pp. 200-207.

Conference Papers

  1. J. Guo, S. Ling, C. Rechberger, H. Wang. (2010). Advanced meet-in-the-middle preimage attacks: first results on full Tiger and improved results on MD4 and SHA-2. In proceedings of ASIACRYPT 2010, M. Abe (Ed.), LNCS 6477, Springer, pp. 56-75

  2. J.-C. Belfiore, F. Oggier. (2010). Secrecy Gain: a Wiretap Lattice Code Design. Proceedings of the International Symposium on Information Theory and its Applications (ISITA 2010), pp. 174 – 178.

  3. K.A.S. Immink. (2010). High-Rate Maximum Runlength Constrained Coding Schemes Using Base Conversion. In Proceedings of the ISITA 2010, Taichung, Korea, pp. 469-472.

  4. Y. M. Chee, Y. Tan, Y. Zhou. (2010). Almost p-ary perfect sequences. In SETA 2010 - Proceedings of the 6th Conference on Sequences and Their Applications, C. Carlet and A. Pott, eds., vol. 6338 of Lecture Notes in Computer Science, pp. 399–415, Springer-Verlag. [PDF]

  5. A. Poschmann, S. Ling, H. Wang. (2010). 256 bit standardized crypto for 650 GE – GOST revisited, In: Cryptographic Hardware and Embedded Systems – CHES 2010, 12th International Workshop, S. Mangard, F.-X. Standaert eds., Lecture Notes in Computer Science 6225, Springer, pp. 219 – 233. 

  6. V. Skachek. (2010). Characterization of Graph-cover Pseudocodewords of Codes over F_3. Information Theory Workshop (ITW 2010).

  7. R. dela Cruz, A. Meyer, P. Sole. (2010). An extension of Massey scheme for secret sharing. ITW 2010.

  8. L. Knudsen, G. Leander,  A. Poschmann, M.J.B. Robshaw. (2010). PRINTcipher: A Block Cipher for IC-Printing. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Santa Barbara, CA, USA. LNCS 6225, pp 16-32, Springer-Verlag.

  9. F. Oggier, C. Hollanti, R. Vehkalahti. (2010). An Algebraic MIDO-MISO Code Construction. SPCOM 2010.

  10. P. H. Nguyen, L. Wei, H. Wang, S. Ling. (2010). On multidimensional linear cryptanalysis, In: Information Security and Privacy, 15th Australasian Conference, R. Steinfeld, P. Hawkes eds., Lecture Notes in Computer Science 6168, Springer, pp. 37 – 52.  

  11. J. Zumbragel, M. F. Flanagan, V. Skachek (2010). Exploration of AWGN and BSC Pseudocodeword Redundancy. 19th International Symposium on Mathematical Theory of Networks and Systems (MTNS) 2010.

  12. F. Oggier, R. Vehkalahti, C. Hollanti. (2010). Fast Decodable MIDO Codes from Crossed Product Algebras. ISIT 2010.

  13. H. J. Asghar, J. Pieprzyk, H. Wang. (2010). A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), LNCS, vol. 6123, pp. 349 – 366.

  14. A. Kiayias, S. Pehlivanoglu. (2010). Improving the Round Complexity of Traitor Tracing Schemes. 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, LNCS, Vol. 6123, pp. 273-290.

  15. H. Yap, K. Khoo, A. Poschmann. (2010). Parallelizing the Camellia and SMS4 Block Ciphers. International Conference on Cryptology in Africa, AfricaCRYPT 2010, Stellenbosch, South Africa, LNCS 6055, pp. 387-406, Springer-Verlag.

  16. J. Zumbragel, M. F. Flanagan, V. Skachek (2010). On the Pseudocodeword Redundancy. IEEE International Symposium on Information Theory (ISIT) 2010.

  17. M. Mihaljevic, F. Oggier. (2010). A Wire-tap Approach to Enhance Security in Communication Systems using the Encoding-Encryption Paradigm. ICT 2010.

  18. S. Jiang, H. Wang. (2010). Plaintext-Awareness of Hybrid Encryption. RSA Conference 2010, Cryptographers' Track (CT-RSA 2010), San Francisco, CA, USA, LNCS, Springer vol. 5985, pp. 57-72.

  19. J.-P. Aumasson, J. Guo, S. Knellwolf, K. Matusiewicz, W. Meier. (2010). Differential and Invertibility Properties of BLAKE. In Proceedings of Fast Software Encryption (FSE 2010), S. Hong and T. Iwata ed., LNCS, Vol. 6147, pp. 318-332, Springer.

  20. M. Robshaw, A. Poschmann. (2010). The Case for Dynamic RFID Tag Authentication. Workshop on RFID Security, RFIDsec'2010 Asia, CIS, pp. 19-32, IOS press.

  21. H. Chen, S. Ling, C. Padro, H. Wang, C. Xing. (2010). Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. 12th IMA International Conference on Cryptography and Coding (IMACCC 2009), M. Parker ed, LNCS, Vol. 5921, pp. 263-277.

  22. S. Li, H. Jameel, J. Pieprzyk, A. R. Sadeghi, R. Schmitz, H. Wang. (2010). On the Security of PAS (Predicate-based Authentication Service). 25th Annual Computer Security Applications Conference (ACSAC 2009), Honolulu, Hawaii, USA, pp. 209-218.

  23. A. Moradi, A. Poschmann. (2010). Lightweight Cryptography and DPA Countermeasures: A Survey. Financial Cryptography Workshops – WLC'2010, Tenerife, Canary Islands, Spain, 2010, LNCS 6052, pp. 68-79, Springer-Verlag.

  24. Q. Ye, R. Steinfeld, J. Pieprzyk, H. Wang. (2010). Efficient Fuzzy Matching and Intersection on Private Datasets. International Conference on Information Security and Cryptology (ICISC 2009), LNCS, vol. 5984, pp. 211 – 228.


  1. A. Kiayias, S. Pehlivanoglu. (2010). Encryption for Digital Content. ISBN: 978-1-4419-0043-2. Springer Advances in Information Security, Vol. 52.

Book Chapter

  1. S. Pehlivanoglu. Broadcast and Content Distribution in Burton Rosenberg (Ed.). Handbook of Financial Cryptography and Security. ISBN: 9781420059816. Chapman \& Hall/CRC Cryptography and Network Security Series.