Tung Chou

Orcid: 0000-0003-3043-6190

According to our database1, Tung Chou authored at least 29 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Reducing Signature Size of Matrix-code-based Signature Schemes.
IACR Cryptol. ePrint Arch., 2024

CryptAttackTester: high-assurance attack analysis.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
On Linear Equivalence, Canonical Forms, and Digital Signatures.
IACR Cryptol. ePrint Arch., 2023

CryptAttackTester: formalizing attack analyses.
IACR Cryptol. ePrint Arch., 2023

2022
A Constant-time AVX2 Implementation of a Variant of ROLLO.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Complete and Improved FPGA Implementation of Classic McEliece.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Take your MEDS: Digital Signatures from Matrix Code Equivalence.
IACR Cryptol. ePrint Arch., 2022

2021
Rainbow on Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Optimizing BIKE for the Intel Haswell and ARM Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Classic McEliece on the ARM Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

CTIDH: faster constant-time CSIDH.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

2020
An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM.
IACR Cryptol. ePrint Arch., 2020

2019
QcBits: Constant-Time Small-Key Code-Based Cryptography.
IACR Cryptol. ePrint Arch., 2019

2018
McBits revisited: toward a fast constant-time code-based KEM.
J. Cryptogr. Eng., 2018

A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
McBits Revisited.
IACR Cryptol. ePrint Arch., 2017

2016
Solving Quadratic Equations with XL on Parallel Architectures - extended version.
IACR Cryptol. ePrint Arch., 2016

2015
The Simplest Protocol for Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015

Sandy2x: New Curve25519 Speed Records.
IACR Cryptol. ePrint Arch., 2015

McBits: fast constant-time code-based cryptography.
IACR Cryptol. ePrint Arch., 2015

How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

2014
How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014

Faster Binary-Field Multiplication and Faster Binary-Field MACs.
IACR Cryptol. ePrint Arch., 2014

2013
Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013

Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Solving Quadratic Equations with XL on Parallel Architectures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2010
Fast Exhaustive Search for Polynomial Systems in F<sub>2</sub>.
IACR Cryptol. ePrint Arch., 2010

Fast Exhaustive Search for Polynomial Systems in <i>F</i><sub>2</sub>.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010


  Loading...