S Ling
S Ling
Unknown affiliation
Verified email at
Cited by
Cited by
Pushing the limits: A very compact and a threshold implementation of AES
A Moradi, A Poschmann, S Ling, C Paar, H Wang
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
Coding theory: a first course
S Ling, C Xing
Cambridge University Press, 2004
On the algebraic structure of quasi-cyclic codes. I. Finite fields
S Ling, P Solé
IEEE Transactions on Information Theory 47 (7), 2751-2760, 2001
Side-channel resistant crypto for less than 2,300 GE
A Poschmann, A Moradi, K Khoo, CW Lim, H Wang, S Ling
Journal of Cryptology 24, 322-345, 2011
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
B Libert, S Ling, K Nguyen, H Wang
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
Lattice-based group signature scheme with verifier-local revocation
A Langlois, S Ling, K Nguyen, H Wang
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
S Ling, K Nguyen, D Stehlé, H Wang
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
Application of constacyclic codes to quantum MDS codes
B Chen, S Ling, G Zhang
IEEE Transactions on Information Theory 61 (3), 1474-1484, 2015
Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions
B Libert, S Ling, F Mouhartem, K Nguyen, H Wang
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
Group signatures from lattices: simpler, tighter, shorter, ring-based
KN San Ling, H Wang
Proc. of 18th IACR International Conference on Practice and Theory in Public …, 2015
Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2
J Guo, S Ling, C Rechberger, H Wang
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
On self-dual cyclic codes over finite fields
Y Jia, S Ling, C Xing
IEEE Transactions on Information Theory 57 (4), 2243-2251, 2011
Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes
L Jin, S Ling, J Luo, C Xing
IEEE Transactions on Information Theory 56 (9), 4735-4740, 2010
Skew constacyclic codes over finite chain rings
S Jitman, S Ling, P Udomkavanich
arXiv preprint arXiv:1008.0327, 2010
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
Cyclic codes over of even length
ST Dougherty, S Ling
Designs, codes and cryptography 39 (2), 127-153, 2006
256 bit standardized crypto for 650 GE–GOST revisited
A Poschmann, S Ling, H Wang
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
On the algebraic structure of quasi-cyclic codes II: chain rings
S Ling, P Solé
Designs, Codes and Cryptography 30, 113-130, 2003
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
CT-RSA 7779, 50-67, 2013
Asymmetric quantum codes: characterization and constructions
L Wang, K Feng, S Ling, C Xing
IEEE Transactions on Information Theory 56 (6), 2938-2945, 2010
The system can't perform the operation now. Try again later.
Articles 1–20