Sze Ling Yeo

According to our database1, Sze Ling Yeo authored at least 24 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Field Instruction Multiple Data.
IACR Cryptol. ePrint Arch., 2022

2021
Improved algebraic attacks on lightweight block ciphers.
J. Cryptogr. Eng., 2021

H-Stegonet: A Hybrid Deep Learning Framework for Robust Steganalysis.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

2020
On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications.
IEEE Trans. Inf. Theory, 2020

Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem.
J. Math. Cryptol., 2020

A New Code Based Signature Scheme without Trapdoors.
IACR Cryptol. ePrint Arch., 2020

2019
Algebraic Differential Fault Analysis on SIMON Block Cipher.
IEEE Trans. Computers, 2019

Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

2018
On the last fall degree of zero-dimensional Weil descent systems.
J. Symb. Comput., 2018

Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via Permutations.
IACR Cryptol. ePrint Arch., 2018

BIFF: A Blockchain-based IoT Forensics Framework with Identity Privacy.
Proceedings of the TENCON 2018, 2018

2017
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2017

An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis.
Proceedings of the Applied Cryptography and Network Security, 2017

An Experimental Study of the BDD Approach for the Search LWE Problem.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016

2015
Last fall degree, HFE, and Weil descent attacks on ECDLP.
IACR Cryptol. ePrint Arch., 2015

2014
Parallelizable MAC revisited.
Secur. Commun. Networks, 2014

Security analysis of GCM for communication.
Secur. Commun. Networks, 2014

2013
Towards a characterization of subfields of the Deligne-Lusztig function fields.
J. Comb. Theory A, 2013

Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions".
IEEE Commun. Lett., 2013

2011
A Gilbert-Varshamov-type bound for lattice packings.
J. Comb. Theory A, 2011

Cryptanalysis of the full CHAIN cipher.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
New constant-weight codes from propagation rules.
IEEE Trans. Inf. Theory, 2010

2007
New Linear Codes and Algebraic Function Fields Over Finite Fields.
IEEE Trans. Inf. Theory, 2007


  Loading...