Chik How Tan
Orcid: 0000-0001-7550-3890
According to our database1,
Chik How Tan
authored at least 129 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Quantum Inf. Process., April, 2024
Inf. Process. Lett., January, 2024
IACR Cryptol. ePrint Arch., 2024
2023
Adv. Math. Commun., 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences.
IEEE Trans. Inf. Theory, 2022
Des. Codes Cryptogr., 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Appl. Algebra Eng. Commun. Comput., 2021
2020
Inf. Process. Lett., 2020
Des. Codes Cryptogr., 2020
IEEE Access, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
Proceedings of the Code-Based Cryptography - 8th International Workshop, 2020
2019
Des. Codes Cryptogr., 2019
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
More New Classes of Differentially 4-Uniform Permutations with Good Cryptographic Properties.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Des. Codes Cryptogr., 2018
Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation.
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Int. J. Comput. Math., 2017
New differentially 4-uniform permutations by modifying the inverse function on subfields.
Cryptogr. Commun., 2017
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Breaking an ID-based encryption based on discrete logarithm and factorization problems.
Inf. Process. Lett., 2016
IACR Cryptol. ePrint Arch., 2016
New explicit constructions of differentially 4-uniform permutations via special partitions of F<sub>2<sup>2k</sup></sub>.
Finite Fields Their Appl., 2016
Discret. Appl. Math., 2016
Discret. Appl. Math., 2016
Appl. Algebra Eng. Commun. Comput., 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
2015
Int. J. Comput. Math., 2015
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Theor. Comput. Sci., 2014
IEEE Trans. Computers, 2014
On a class of quadratic polynomials with no zeros and its application to APN functions.
Finite Fields Their Appl., 2014
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity.
Discret. Appl. Math., 2014
Discret. Appl. Math., 2014
CoRR, 2014
Concatenations of the hidden weighted bit function and their cryptographic properties.
Adv. Math. Commun., 2014
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
2013
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method.
IEEE Trans. Inf. Theory, 2013
Inf. Process. Lett., 2013
IACR Cryptol. ePrint Arch., 2013
A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2012
Inf. Process. Lett., 2012
IACR Cryptol. ePrint Arch., 2012
Finite Fields Their Appl., 2012
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Certificateless public key encryption: A new generic construction and two pairing-free schemes.
Theor. Comput. Sci., 2011
Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting".
IEEE Trans. Inf. Theory, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings.
Int. J. Reconfigurable Comput., 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks.
Telecommun. Syst., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Denial-of-service resilience password-based group key agreement for wireless networks.
Proceedings of the Q2SWinet'07, 2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Int. J. Secur. Networks, 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Authenticated Dynamic Group Key Agreement for Autoconfigurable Mobile Ad Hoc Networks.
IEICE Trans. Commun., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Chosen Ciphertext Security from Identity-Based Encryption Without <i>Strong</i> Condition.
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
Proceedings of the Advances in Computer Science, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
2003
IEEE Trans. Wirel. Commun., 2003
IEEE Trans. Veh. Technol., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEEE Trans. Consumer Electron., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
1998
Proceedings of the Sequences and their Applications, 1998