San Ling
Orcid: 0000-0002-1978-3557Affiliations:
- National University of Singapore, Department of Mathematics, Singapore
According to our database1,
San Ling
authored at least 237 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on ntu.edu.sg
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, November, 2024
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols.
IEEE Trans. Inf. Theory, August, 2024
IEEE Trans. Inf. Theory, July, 2024
Constructing quantum error-correcting codes that require a variable amount of entanglement.
Quantum Inf. Process., January, 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Characterization of Nearly Self-Orthogonal Quasi-Twisted Codes and Related Quantum Codes.
CoRR, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
J. Cryptol., July, 2023
A Construction of Maximum Distance Profile Convolutional Codes With Small Alphabet Sizes.
IEEE Trans. Inf. Theory, May, 2023
IEEE Trans. Inf. Theory, March, 2023
IEEE Trans. Inf. Theory, February, 2023
J. Appl. Math. Comput., February, 2023
Discret. Math. Algorithms Appl., February, 2023
Three New Constructions of Optimal Locally Repairable Codes From Matrix-Product Codes.
IEEE Trans. Inf. Theory, 2023
Bounds and Constructions of Quantum Locally Recoverable Codes from Quantum CSS Codes.
CoRR, 2023
CoRR, 2023
A Construction of Asymptotically Optimal Cascaded CDC Schemes via Combinatorial Designs.
CoRR, 2023
Four New Families of Quantum Stabilizer Codes from Hermitian Self-Orthogonal MDS codes.
Proceedings of the 12th International Symposium on Topics in Coding, 2023
Proceedings of the 12th International Symposium on Topics in Coding, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
2022
Discret. Math., 2022
Application of optimal p-ary linear codes to alphabet-optimal locally repairable codes.
Des. Codes Cryptogr., 2022
Entanglement-Assisted and Subsystem Quantum Codes: New Propagation Rules and Constructions.
CoRR, 2022
On the construction of self-dual cyclic codes over $\mathbb {Z}_{4}$ with arbitrary even length.
Cryptogr. Commun., 2022
Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications.
Adv. Math. Commun., 2022
2021
IEEE Trans. Inf. Theory, 2021
Theor. Comput. Sci., 2021
An explicit expression for Euclidean self-dual cyclic codes of length 2<sup><i>k</i></sup> over Galois ring GR(4, <i>m</i>).
Finite Fields Their Appl., 2021
New Interleaving Constructions of Asymptotically Optimal Periodic Quasi-Complementary Sequence Sets.
CoRR, 2021
Three New Infinite Families of Optimal Locally Repairable Codes from Matrix-Product Codes.
CoRR, 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
2020
On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications.
IEEE Trans. Inf. Theory, 2020
IEEE Trans. Inf. Theory, 2020
IEEE Trans. Inf. Theory, 2020
Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience.
IEEE Trans. Circuits Syst. I Regul. Pap., 2020
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
IACR Cryptol. ePrint Arch., 2020
An explicit expression for Euclidean self-dual cyclic codes of length 2<sup>k</sup> over Galois ring GR(4, m).
CoRR, 2020
Electron. J. Comb., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories.
IEEE Trans. Inf. Theory, 2019
IEEE Trans. Dependable Secur. Comput., 2019
Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease.
Theor. Comput. Sci., 2019
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption.
Theor. Comput. Sci., 2019
Public key encryption with equality test from generic assumptions in the random oracle model.
Inf. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes.
Des. Codes Cryptogr., 2019
Des. Codes Cryptogr., 2019
Construction and enumeration for self-dual cyclic codes over Z<sub>4</sub> of oddly even length.
Des. Codes Cryptogr., 2019
CoRR, 2019
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation.
Comput. J., 2019
Binary Robust Positioning Patterns with Low Redundancy and Efficient Locating Algorithms.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Dependable Secur. Comput., 2018
Theor. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields.
Cryptogr. Commun., 2018
Cryptogr. Commun., 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Proceedings of the Provable Security, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
Theor. Comput. Sci., 2016
Semi-generic construction of public key encryption and identity-based encryption with equality test.
Inf. Sci., 2016
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
IACR Cryptol. ePrint Arch., 2016
CCA2 Attack and Modification of Huang <i>et al</i>.'s Public Key Encryption with Authorized Equality Test.
Comput. J., 2016
Adv. Math. Commun., 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Efficient encoding/decoding of capacity-achieving constant-composition ICI-free codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
IEEE Trans. Inf. Theory, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Finite Fields Their Appl., 2015
2014
Math. Comput., 2014
Math. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
Finite Fields Their Appl., 2014
Des. Codes Cryptogr., 2014
Des. Codes Cryptogr., 2014
The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014
Des. Codes Cryptogr., 2014
Cryptogr. Commun., 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Inf. Theory, 2013
IACR Cryptol. ePrint Arch., 2013
Comput. Complex., 2013
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
2012
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences.
Math. Comput., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2012
Finite Fields Their Appl., 2012
CoRR, 2012
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
J. Comb. Theory A, 2011
IACR Cryptol. ePrint Arch., 2011
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IEEE Trans. Inf. Theory, 2010
Generalization of Steane's enlargement construction of quantum codes and applications.
IEEE Trans. Inf. Theory, 2010
IEEE Trans. Inf. Theory, 2010
IEEE Trans. Inf. Theory, 2010
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions.
IEEE Trans. Inf. Theory, 2009
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions.
IEEE Trans. Inf. Theory, 2009
IACR Cryptol. ePrint Arch., 2009
Sci. China Ser. F Inf. Sci., 2009
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes.
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
IEEE Trans. Inf. Theory, 2008
The Sizes of Optimal q -Ary Codes of Weight Three and Distance Four: A Complete Solution.
IEEE Trans. Inf. Theory, 2008
SIAM J. Discret. Math., 2008
Finite Fields Their Appl., 2008
Finite Fields Their Appl., 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Advances in Cryptology, 2008
2007
2006
A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes.
IEEE Trans. Inf. Theory, 2006
IEEE Trans. Inf. Theory, 2006
IEEE Trans. Inf. Theory, 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Des. Codes Cryptogr., 2006
Discret. Appl. Math., 2006
2005
IEEE Trans. Inf. Theory, 2005
IEEE Trans. Inf. Theory, 2005
IEEE Trans. Inf. Theory, 2005
Improved <i>p</i>-ary Codes and Sequence Families from Galois Rings of Characteristic <i>p</i><sup>2</sup>.
SIAM J. Discret. Math., 2005
Discret. Appl. Math., 2005
Proceedings of the Coding and Cryptography, International Workshop, 2005
2004
An improvement on the bounds of Weil exponential sums over Galois rings with some applications.
IEEE Trans. Inf. Theory, 2004
J. Complex., 2004
Discret. Math., 2004
Proceedings of the Sequences and Their Applications, 2004
2003
IEEE Trans. Inf. Theory, 2003
Des. Codes Cryptogr., 2003
2002
2001
IEEE Trans. Inf. Theory, 2001
IEEE Trans. Inf. Theory, 2001
Appl. Algebra Eng. Commun. Comput., 2001
2000
IEEE Trans. Inf. Theory, 2000
1999
Theor. Comput. Sci., 1999
1998
Proceedings of the Sequences and their Applications, 1998
1997
A Rabin-Type Scheme Based on y<sup>2</sup> equiv x<sup>3</sup> + bx<sup>2</sup> mod n.
Proceedings of the Computing and Combinatorics, Third Annual International Conference, 1997
1996
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996