
|
Publications 2014
Journal Papers
- S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, and H. Wang. (2014). The Resistance of PRESENT-80 Against Related-Key Differential Attacks. Cryptography and Communications, September 2014.
- D. Khovratovich, I. Nikolić, and C. Rechberger. (2014). Rotational Rebound Attacks on Reduced Skein. Journal of Cryptology, July 2014.
- T. Peyrin. (2014). Collision Attack on Grindahl. Journal of Cryptology, May 2014.
- Y. Sasaki and L. Wang. (2014). Comprehensive Study of Integral Analysis on LBlock. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, January 2014.
- Y. Sasaki and L. Wang. (2014). Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, January 2014.
- W. Kositwattanarerk and F. Oggier. (2014). Connections Between Construction D and Related Constructions of Lattices. Designs, Codes and Cryptography, vol. 73, no. 2, pp 441-455, Nov. 2014.
- S.S. Ong and F. Oggier. (2014). Wiretap Lattice Codes from Number Fields with no Small Norm Elements. Designs, Codes and Cryptography, vol. 73, Issue 2, pp 425-440, Nov. 2014.
- E. Thomas, N. Markin, and F. Oggier. (2014). On Abelian Group Representability of Finite Groups. Advances in Mathematics of Communication , Volume 8, No. 2, pp. 139-152, 2014.
- J. Chen, H. W. Lim, S. Ling, H. Wang. (2014). The relation and transformation between hierarchical inner product encryption and spatial encryption. Des. Codes Cryptography vol. 71 no. 2, pp. 347-364, 2014.
- J. Chen, H. W. Lim, S. Ling, L. Su, H. Wang. (2014). Spatial encryption supporting non-monotone access structure. Des. Codes Cryptography vol. 73 no. 3, pp. 731-746, 2014.
- J. Chen, H. W. Lim, S. Ling, H. Wang, H. Wee. (2014). Shorter identity-based encryption via asymmetric pairings. Des. Codes Cryptography vol. 73 no. 3, pp. 911-947, 2014.
- S. Ling, I. Shparlinski, H. Wang. (2014). On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random Function. Math. Comput. vol. 83, no. 289, pp. 2429-2434, Sep. 2014.
- Y. Fan, S. Ling, H. Liu. (2014). Matrix product codes over finite commutative Frobenius rings. Des. Codes Cryptography vol. 71, no. 2, pp. 201-227, 2014.
- Y. Fan, S. Ling, H. Liu. (2014). Homogeneous weights of matrix product codes over finite principal ideal rings. Finite Fields and Their Applications vol. 29, pp 247-267, 2014.
- S. Ling, E. Ozdemir, C. Xing. (2014). A relation between embedding degrees and class numbers of binary quadratic forms. Math. Comput. vol. 83, no. 290, 2014.
- S. Jitman, S. Ling, P. Solé. (2014). Hermitian Self-Dual Abelian Codes. IEEE Transactions on Information Theory vol. 60, no.3, pp. 1496-1507, 2014.
- X. Yi, E. Bertino, J. Vaidya, C. Xing. (2014). Private Searching on Streaming Data Based on Keyword Frequency. IEEE Trans. Dependable Sec. Comput. vol. 11, no. 2, pp. 155-167, 2014.
- O. Farràs, C. Padró, C. Xing, A. Yang. (2014). Natural Generalizations of Threshold Secret Sharing. IEEE Transactions on Information Theory vol. 60, no. 3, pp. 1652-1664, 2014.
- L. Jin, C. Xing. (2014). A Construction of New Quantum MDS Codes. IEEE Transactions on Information Theory vol. 60, no. 5, pp. 2921-2925, 2014.
- I. Cascudo, R. Cramer, C. Xing. (2014). Torsion Limits and Riemann-Roch Systems for Function Fields and Applications. IEEE Transactions on Information Theory vol. 60, no. 7, pp. 3871-3888, 2014.
- Y. Ding, L. Jin, C. Xing. (2014). Erasure List-Decodable Codes From Random and Algebraic Geometry Codes. IEEE Transactions on Information Theory vol. 60, no. 7, pp. 3889-3894, 2014.
- H. Niederreiter, C. Xing. (2014). Sequences With High Nonlinear Complexity. IEEE Transactions on Information Theory vol. 60, no.10, pp. 6696-6701, 2014.
Conference Papers
- N. Anandakumar, T. Peyrin, and A. Poschmann. (2014). A Very Compact FPGA Implementation of LED and PHOTON. (INDOCRYPT 2014).
- J. Guo, J. Jean, I. Nikolić, and Y. Sasaki. (2014). Meet-in-the-Middle Attacks on Generic Feistel Constructions. (ASIACRYPT 2014).
- S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, and H. Wang. (2014). Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. (ASIACRYPT 2014).
- J. Jean, I. Nikolić, and T. Peyrin. (2014). Tweaks and Keys for Block Ciphers: the TWEAKEY Framework. (ASIACRYPT 2014).
- Y. Sasaki and L. Wang. (2014). Message Extension Attack against Authenticated Encryptions: Application to PANDA. (CANS 2014).
- A. Biryukov and I. Nikolić. (2014). Colliding Keys for SC2000-256. In Selected Areas in Cryptography (SAC 2014).
- D. Augot, P-A. Fouque, and P. Karpman. (2014). Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation. In Selected Areas in Cryptography (SAC 2014).
- J. Jean, I. Nikolić, Y. Sasaki, and L. Wang. (2014). Practical Cryptanalysis of PAES. In Selected Areas in Cryptography (SAC 2014).
- J. Guo, J. Jean, G. Leurent, T. Peyrin and L. Wang. (2014). The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. In Selected Areas in Cryptography (SAC 2014).
- Y. Sasaki and L. Wang. (2014). Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. (SCN 2014).
- K. Khoo, T. Peyrin, A. Poschmann and H. Yap. (2014). FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. (CHES 2014).
- J. Guo, T. Peyrin, Y. Sasaki and L. Wang. (2014). Updates on Generic Attacks against HMAC and NMAC. In Advances in Cryptology (CRYPTO 2014).
- T. Peyrin and L. Wang. (2014). Generic Universal Forgery Attack on Iterative Hash-based MACs. In Advances in Cryptology (EUROCRYPT 2014).
- I. Dinur and J. Jean. (2014). Cryptanalysis of FIDES. (FSE 2014).
- T. Iwata and L. Wang. (2014). Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs. (FSE 2014).
- J. Guo, Y. Sasaki, L. Wang, M. Wang, and L. Wen. (2014). Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. (FSE 2014).
- T. Iwata, K. Minematsu, J. Guo, and S. Morioka. (2014). CLOC: Authenticated Encryption for Short Input. (FSE 2014).
- J. Guo, P. Karpman, I. Nikolić, L. Wang, and S. Wu. (2014). Analysis of BLAKE2. In RSA Conference Cryptographers' Track (CT-RSA 2014).
- Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, and K. Ohta. (2014). An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl. In RSA Conference Cryptographers' Track - (CT-RSA 2014).
- X. Hou, F. Lin, and F. Oggier. (2014). Construction and Secrecy Gain of a Family of 5-modular Lattices. (ITW 2014).
- J. Ducoat and F. Oggier. (2014). Rank weight hierarchy of some classes of cyclic codes. (ITW 2014).
- J. Ducoat and F. Oggier. (2014). Lattice Encoding of Cyclic Codes from Skew-polynomial Rings. (4ICMCTA).
- F. Lin, C. Ling, and J.-C. Belfiore. (2014). Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices. (ISIT 2014).
- J. Ducoat and F. Oggier. (2014). An Analysis of Small Dimensional Fading Wiretap Lattice Codes. (ISIT 2014).
- R. Vehkalahti, W. Kositwattanarerk and F. Oggier. (2014). Constructions A of Lattices from Number Fields and Division Algebras. (ISIT 2014).
- E. Thomas and F. Oggier. Applications of Quasi-uniform Codes to Storage. Invited Paper. (SPCOM 2014).
- M. A. Vázquez-Castro and F. Oggier. (2014). Lattice Network Coding over Euclidean Domains. (EUSIPCO 2014).
- F. Oggier. (2014). Some Constructions of Storage Codes from Grassmann Graphs. International Zurich Seminar on Communications (Invited Paper) 2014.
- S. Liu and F. Oggier. (2014). On Storage Codes Allowing Partially Collaborative Repairs. (ISIT 2014).
- S. Liu and F. Oggier. (2014). Two Storage Code Constructions Allowing Partially Collaborative Repairs. (ISITA 2014).
- S. Liu and F. Oggier. (2014). On the Design of Storage Orbit Codes. (4ICMCTA).
- S. Emami, S. Ling, I. Nikolic, J. Pieprzyk, H. Wang. (2014). Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. (ASIACRYPT 2014) pp. 141-157.
- A. Langlois, S. Ling, K. Nguyen, H. Wang. (2014). Lattice-Based Group Signature Scheme with Verifier-Local Revocation. (PKC 2014) pp 345-361.
- C. Bösch, A. Peter, B. Leenders, H. W. Lim, Q. Tang, H. Wang, P. H. Hartel, W. Jonker. (2014). Distributed Searchable Symmetric Encryption. (PST 2014), pp. 330-337.
- S. Ling, D. H. Phan, D. Stehlé, R. Steinfeld. (2014). Hardness of k-LWE and Applications in Traitor Tracing. (CRYPTO 2014) pp. 315-334.
- A. Zeh, S. Ling. (2014).Decoding of quasi-cyclic codes up to a new lower bound on the minimum distance. (ISIT 2014), pp. 2584-2588.
- V. Guruswami, C. Xing. (2014). Hitting Sets for Low-Degree Polynomials with Optimal Density. IEEE Conference on Computational Complexity 2014, pp. 161-168.
- Y. M. Chee, L. Wu, C. Xing. (2014). Correcting on curves and highly sound locally correctable codes of high rate. (ISIT 2014), pp. 2964-2966.
- V. Guruswami, C. Xing. (2014). Optimal rate list decoding of folded algebraic-geometric codes over constant-sized alphabets. (SODA 2014), pp. 1858-1866.
Journal Papers
-
To be updated
|
|
|