Professor LING San

| Home | Research Interest | Publications | Book Publications | Links |

Papers in Journals

1.       S. Ling & J. Oesterlé, The Shimura subgroup of Jo(N). Astérisque 196197, 171 – 203 (1991)

2.       S. Ling, Congruences between cusp forms and the geometry of Jacobians of modular curves. Mathematische Annalen 295, 111 – 133 (1993)

3.       Y.M. Chee & S. Ling, Projective covering designs. Bulletin of the London Mathematical Society 25, 231 – 239 (1993)

4.       S. Ling, Shimura subgroups of Jacobians of Shimura curves. Proceedings of the American Mathematical Society 118, 385 – 390 (1993)

5.       S. Ling, The old subvariety of Jo(pq) and the Eisenstein kernel in Jacobians. Israel Journal of Mathematics 84, 365 – 384 (1993)

6.       S. Ling, The Fitting ideal of Jo(q)(Fp^n) over the Hecke algebra. Journal of Algebra 164, 563 – 575 (1994)

7.       S. Ling, Shimura subgroups and degeneracy maps. Journal of Number Theory 54, 39 – 59  (1995)

8.       S. Ling, On the Q-rational cuspidal subgroup and the component group of Jo(pr). Israel Journal of Mathematics 99, 29 – 54 (1997)

9.       S.K. Chua & S. Ling, On the rational cuspidal subgroup and the rational torsion points of Jo(pq).  Proceedings of the American Mathematical Society 125, 2255 – 2263  (1997)

10.     K.H. Leung, S. Ling, S.L. Ma, K.B. Tay, Almost perfect sequences with q = 2. Archiv der Mathematik 70, 128 – 131 (1998)

11.     S. Ling, On component groups of Jo(N) and degeneracy maps. Proceedings of the American Mathematical Society 126, 3201 – 3210 (1998)

12.     Y.M. Chee & S. Ling, Combinatorial coverings from geometries over principal ideal rings. Journal of Combinatorial Designs 7, 247 – 268 (1999)

13.     S.K. Chua, K.H. Leung & S. Ling, Attack on RSA-type cryptosystems based on singular cubic curves over Z/nZ. Theoretical Computer Science 226, 19 – 27 (1999)

14.     K.H. Leung & S. Ling, The rank of a Latin square associated to an abelian group. Communications in Algebra 28, 1141 – 1155 (2000)

15.     C. Ding, D.R. Kohel & S. Ling, Elementary 2-group character codes. IEEE Transactions on Information Theory 46, 280 – 284 (2000)

16.     C. Ding, D.R. Kohel & S. Ling, Split group codes. IEEE Transactions on Information Theory 46, 485 – 495 (2000)

17.     S. Ling, Component group of the p-new subvariety of Jo(Mp). Israel Journal of Mathematics 116, 117 – 123 (2000)

18.     C. Xing & S. Ling, A class of linear codes with good parameters from algebraic curves. IEEE Transactions on Information Theory 46, 1527 – 1532 (2000)

19.     C. Xing & S. Ling, A class of linear codes with good parameters. IEEE Transactions on Information Theory 46, 2184 – 2188 (2000)

20.     C. Ding, D.R. Kohel & S. Ling, Secret sharing with a class of ternary codes. Theoretical Computer Science 246, 285 – 298 (2000)

21.     S. Ling, H. Niederreiter & C. Xing, Symmetric polynomials and some good codes. Finite Fields and Their Applications 7, 142 – 148 (2001)

22.     C. Khare & S. Ling, Maps between Jacobians of Shimura curves and congruence kernels. Mathematische Annalen 319, 383 – 394 (2001)

23.     K.H. Leung, S. Ling & S.L. Ma, Construction of semi-regular relative difference sets. Finite Fields and Their Applications 7, 397 – 414 (2001)

24.     S. Ling & P. Solé, Duadic codes over Z2k. IEEE Transactions on Information Theory 47, 1581 – 1589 (2001)

25.     H. Chen, S. Ling & C. Xing, Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound. IEEE Transactions on Information Theory 47, 2055 – 2058 (2001)

26.     S. Ling & P. Solé, Type II codes over F4 + uF4. European Journal of Combinatorics 22, 983 – 997 (2001)

27.     S. Ling & P. Solé, Duadic codes over F2 + uF2. Applicable Algebra in Engineering, Communication and Computing 12, 365 – 379 (2001)

28.     S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes I: finite fields. IEEE Transactions on Information Theory 47, 2751 – 2760 (2001) 

29.     K.H. Leung, S. Ling & C. Xing, New binary linear codes from algebraic curves. IEEE Transactions on Information Theory 48, 285 – 287 (2002)

30.     Y.M. Chee & S. Ling, Highly symmetric expanders. Finite Fields and Their Applications 8, 294 – 310 (2002)

31.     S. Ling & J.T. Blackford, Zp^{k+1}-linear codes. IEEE Transactions on Information Theory 48, 2592 – 2605 (2002)

32.     S. Ling & P. Solé, Good self-dual quasi-cyclic codes exist. IEEE Transactions on Information Theory 49, 1052 – 1053 (2003) 

33.     S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes II: chain rings. Designs, Codes and Cryptography 30, 113 – 130 (2003)

34.     S. Ling & P. Solé, Nonlinear p-ary sequences. Applicable Algebra in Engineering, Communication and Computing 14, 117 – 125 (2003) 

35.     K.H.D. Chua, A. Tyagi, S. Ling & S.H. Bok, Process-parameter-interface model for design management. Journal of Construction Engineering and Management, ASCE 129, 653 – 663 (2003)

36.     F.-W. Fu, S. Ling & C. Xing, New lower bounds and constructions for binary codes correcting asymmetric errors. IEEE Transactions on Information Theory 49, 3294 – 3299 (2003)

37.     K. Betsumiya, S. Ling & F. Nemenzo, Type II codes over F2^m + uF2^m. Discrete Mathematics 275, 43 – 65 (2004)

38.     S. Ling & C. Xing, Polyadic codes revisited. IEEE Transactions on Information Theory 50, 200 – 207 (2004)

39.     S. Ling, A family of group character codes. European Journal of Combinatorics 25, 579 – 590 (2004)

40.     J. Lahtonen, S. Ling, P. Solé & D. Zinoviev, Z8-Kerdock codes and pseudorandom binary sequences. J. Complexity 20, 318 – 330 (2004)

41.     Y. Tang & S. Ling, On Viterbi-like algorithms and their applications to Reed-Muller codes. J. Complexity 20, 438 – 457 (2004)

42.     S. Ling & F. Özbudak, An improvement on the bounds of Weil exponential sums over Galois rings with some applications. IEEE Transactions on Information Theory 50, 2529 – 2539 (2004)  

43.     F.-W. Fu, S. Ling & C. Xing, On the variance of average distance of subsets in the Hamming space. Discrete Applied Math 145, 465 – 478 (2005)  

44.     S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes III: generator theory. IEEE Transactions on Information Theory 51, 2692 – 2700 (2005)

45.     H. Chen, S. Ling & C. Xing, Quantum codes from concatenated algebraic-geometric codes. IEEE Transactions on Information Theory 51, 2915 – 2920 (2005)

46.     S.-T. Xia, F.-W. Fu, Y. Jiang & S. Ling, The probability of undetected error for binary constant weight codes. IEEE Transactions on Information Theory 51, 3364 – 3373 (2005)

47.     S. Ling, H. Stichtenoth & S. Yang, A class of Artin-Schreier towers with finite genus, Bull. Brazilian Math. Soc. 36, 393 – 401 (2005)

48.     S. Ling, F. Özbudak & C. Xing, An explicit class of codes with good parameters and their duals, Discrete Applied Math. 154, no. 2, 346 – 356 (2006)  

49.     S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings of characteristic p2, SIAM J Discrete Math. 19, no. 4, 1011 – 1028 (2006)

50.     S. Ling, H. Niederreiter & P. Solé, On the algebraic structure of quasi-cyclic codes IV: repeated roots, Designs, Codes and Cryptography 38, no. 3, 337 – 361 (2006)

51.     S. Dougherty & S. Ling, Cyclic codes over Z4 of even length, Designs, Codes and Cryptography 39, no. 2, 127 – 153 (2006)

52.     Y. Tang, F.-W. Fu & S. Ling, On the reliability-order-based decoding algorithm for binary linear block codes, IEEE Transactions on Information Theory 52, no. 1, 328 – 336 (2006)

53.     K. Feng, S. Ling & C. Xing, Asymptotic bounds on quantum codes from algebraic geometry codes, IEEE Transactions on Information Theory 52, no. 3, 986 – 991 (2006)

54.     S. Ling & F. Özbudak, Aperiodic and odd correlations of some p-ary sequences from Galois rings, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 9, 2258 – 2263 (2006)

55.     S.-T. Xia, F.-W. Fu & S. Ling, A lower bound on the probability of undetected error for binary constant weight codes, IEEE Transactions on Information Theory 52, no. 9, 4235 – 4243 (2006)

56.     Y.M. Chee & S. Ling, Constructions for q-ary constant weight codes, IEEE Transactions on Information Theory 53, no. 1, 135 – 146 (2007)  

57.     Y.M. Chee, A.C.H. Ling, S. Ling & H. Shen, The PBD-closure of constant composition codes, IEEE Transactions on Information Theory 53, no. 8, 2685 – 2692 (2007)

58.     S. Ling & F. Özbudak, Constructions and bounds on linear error-block codes, Designs, Codes and Cryptography 45, 297 – 316 (2007)

59.     L. Pu, H. Shen, J. Ma & S. Ling, Cycle systems in the complete bipartite graph plus one factor, SIAM J Discrete Math. 21, no. 4, 1083 – 1092 (2007)

60.     Y.M. Chee & S. Ling, Improved lower bounds for constant GC-content DNA codes, IEEE Transactions on Information Theory 54, no. 1, 391 – 394 (2008)

61.     H. Chen, S. Ling & C. Xing, Access structures of elliptic secret sharing schemes, IEEE Transactions on Information Theory 54, no. 2, 850 – 852 (2008)   

62.     Y.M. Chee, S.H. Dau, A.C.H. Ling & S. Ling, The sizes of optimal q-ary codes of weight three and distance four: a complete solution, IEEE Transactions on Information Theory 54, no. 3, 1291 – 1295 (2008)

63.     S. Ling & F. Özbudak, Some constructions of (t,m,s)-nets with improved parameters, Finite Fields and Their Applications 14, 658 – 675 (2008)  

64.     H.M. Kiah, K.H. Leung & S. Ling, Cyclic codes over GR(pe, m) of length pk, Finite Fields and Their Applications 14, 834 – 846 (2008)

65.     C. Li, Q. Li & S. Ling, Properties and applications of preimage distributions of perfect nonlinear functions, IEEE Transactions on Information Theory 55, no. 1, 64 – 69 (2009)

66.     C. Li, S. Ling & L. Qu, On the covering structures of two classes of linear codes from perfect nonlinear functions, IEEE Transactions on Information Theory 55, no. 1, 70 – 82 (2009)    

67.     C. Li, Q. Li & S. Ling, On the constructions of constant-composition codes from perfect nonlinear functions, Science in China Series F: Information Sciences 52, no. 6, 964 – 973 (2009)

68.     Y.M. Chee, S.H. Dau, A.C.H. Ling & S. Ling, Linear size optimal q-ary constant-weight codes and constant-composition codes, IEEE Transactions on Information Theory 56, no. 1, 140 – 151 (2010) 

69.     L. Wang, K. Feng, S. Ling & C. Xing, Asymmetric quantum codes: characterization and constructions, IEEE Transactions on Information Theory 56, no. 6, 2938 – 2945 (2010)

70.     S. Ling, J. Luo & C. Xing, Generalization of Steane’s enlargement construction of quantum codes and applications, IEEE Transactions on Information Theory 56, no. 8, 4080 – 4084 (2010) 

71.     L. Jin, S. Ling, J. Luo & C. Xing, Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes, IEEE Transactions on Information Theory 56, no. 9, 4735 – 4740 (2010)

72.     A. Poschmann, A. Moradi, K. Khoo, C.-W. Lim, H. Wang & S. Ling, Side-channel resistant crypto for less than 2,300 GE, J Cryptology 24, no. 2, 322 – 345 (2011)

73.     M.F. Ezerman, S. Ling, P. Solé & O. Yemen, From skew-cyclic codes to asymmetric quantum codes, Advances in Mathematics of Communications 5, no. 1, 41 – 57 (2011)

74.     Y. Jia, S. Ling & C. Xing, On self-dual cyclic codes over finite fields, IEEE Transactions on Information Theory 57, no. 4, 2243 – 2251 (2011)

75.     A. Pott, Y. Tan, T. Feng & S. Ling, Association schemes arising from bent functions, Designs, Codes and Cryptography 59, 319 – 331 (2011)

76.     A.B.F. Edoukou, S. Ling & C. Xing, Structure of functional codes defined on non-degenerate Hermitian varieties, J. Comb Theory, Series A 118, 2436 – 2444 (2011)

77.     M.F. Ezerman, S. Ling & P. Solé, Additive asymmetric quantum codes, IEEE Transactions on Information Theory 57, no. 8, 5536 – 5550 (2011)

78.     Y.M. Chee, G. Ge, L. Ji, S. Ling & J. Yin, List decodability at small radii, Designs, Codes and Cryptography 61, no. 2, 151 – 166 (2011) 

79.     C. Tartary, H. Wang & S. Ling, Authentication of digital streams, IEEE Transactions on Information Theory 57, no. 9, 6285 – 6303 (2011)

80.     S. Jitman, S. Ling & P. Udomkavanich, Skew constacyclic codes over finite chain rings, Advances in Mathematics of Communications 6, no. 1, 29-63 (2012)

81.     H.M. Kiah, K.H. Leung & S. Ling, A note on cyclic codes over GR(p2, m) of length pk, Designs, Codes and Cryptography 63, no. 1, 105-112 (2012)

82.     S. Ling, I.E. Shparlinski, R. Steinfeld & H. Wang, On the modular inversion hidden number problem, J Symbolic Computation 47, no. 4, 358 – 367 (2012)

83.     Y.M. Chee, S. Ling, Y. Tan & X. Zhang, Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences, Mathematics of Computation 81, 585 – 603 (2012)

84.     E. Ozdemir, S. Ling & C. Xing, Constructing irreduciable polynomials over finite fields, Mathematics of Computation 81, no. 279, 1663 – 1668 (2012)

85.     Z. Zhang, Y.M.Chee, S. Ling, M. Liu & M. Wang, Threshold changeable secret sharing schemes revisited, Theoretical Computer Science 418, 106 – 115 (2012)

86.     S. Ling & L. Qu, A note on linearized polynomials and the dimension of their kernels, Finite Fields and their Applications 18, no. 1, 56 – 62 (2012)

87.     C. Ding & S. Ling, A q-polynomial approach to cyclic codes, Finite Fields and Their Applications 20, no. 1, 1 – 14 (2013)

88.     Y.M. Chee, T. Feng, S. Ling, H. Wang & L.F. Zhang, Query-efficient locally decodable codes of subexponential length, Computational Complexity 22, no. 1, 159 – 189 (2013)

89.     S. Jitman, S.Ling, H. Liu & X. Xie, Abelian codes in principal ideal group algebras, IEEE Transactions on Information Theory 59, no. 5, 3046 – 3058 (2013)

90.     M.F. Ezerman, S. Jitman, H.M. Kiah & S. Ling, Pure asymmetric quantum MDS codes from CSS construction: a complete characterization, International Journal of Quantum Information 11, no. 3, 1350027 (10 pages) (2013)

91.     Y.M. Chee, S. Ling, H. Wang & L.F. Zhang, Upper bounds on matching families in Zpqn, IEEE Transactions on Information Theory 59, no.8, 5131 – 5139 (2013)

92.     X. Yi, S. Ling & H. Wang, Efficient two-server password-only authenticated key exchange, IEEE Transactions on Parallel and Distributed Systems 24, no. 9, 1773 – 1782 (2013)

93.     M.F. Ezerman, S. Jitman, S. Ling & D.V. Pasechnik, CSS-like constructions of asymmetric quantum codes, IEEE Transactions on Information Theory 59, no. 10, 6732 – 6754 (2013)

94.     F.-W. Fu, S. Ling & C. Xing, New results on two hypercube coloring problems, Discrete Applied Mathematics 161, no. 18, 2937 – 2945 (2013)

95.     Y. Tan, L. Qu, S. Ling & C.H. Tan, On the Fourier spectra of new APN functions, SIAM Journal on Discrete Mathematics 27, no. 2, 791 – 801 (2013)

96.     J. Chen, H.W. Lim, S. Ling & H. Wang, The relation and transformation between hierarchical inner product encryption and spatial encryption, Designs, Codes and Cryptography 71, no. 2, 347 – 364 (2014)

97.     Y. Fan, S. Ling & H. Liu, Matrix product codes over finite commutative Frobenius rings, Designs, Codes and Cryptography 71, no. 2, 201 – 227 (2014)

98.     S. Jitman, S. Ling & P. Solé, Hermitian self-dual abelian codes, IEEE Transactions on Information Theory 60, no. 3, 1496 – 1507 (2014)              

99.     Y. Fan, S. Ling & H. Liu, Homogeneous weights of matrix product codes over finite principal ideal rings, Finite Fields and Their Applications 29, 247 – 267 (2014)

100.   J. Chen, H.W. Lim, S. Ling, L. Su & H. Wang, Spatial encryption supporting non-monotone access structure, Designs, Codes and Cryptography 73, no. 3, 731 – 746 (2014)

101.   J. Chen, H.W. Lim, S. Ling, H. Wang & H. Wee, Shorter identity-based encryption via asymmetric pairings, Designs, Codes and Cryptography 73, no. 3, 911 – 947 (2014)

102.    S. Ling, I. Shparlinski & H. Wang, On the multidimensional distribution of the Naor-Reingold pseudo-random function, Mathematics of Computation 83, no. 289, 2429 – 2434 (2014)

103.    S. Ling, E. Ozdemir & C. Xing, A relation between embedding degrees and class numbers of binary quadratic forms, Mathematics of Computation 83, no. 290, 3001 – 3004 (2014)

104.    S. Emami, S. Ling, I. Nikolic, J. Pieprzyk & H. Wang, The resistance of PRESENT-80 against related-key differential attacks, Cryptography & Communications – Discrete Structures, Boolean Functions & Sequences 6, no. 3, 171 – 187 (2014)

105.    S. Jitman & S. Ling, Quasi-abelian codes, Designs, Codes and Cryptography 74, no. 3, 511 – 531 (2015)

106.    B. Chen, S. Ling & G. Zhang, Application of constacyclic codes to quantum MDS codes, IEEE Transactions on Information Theory 61, no. 3, 1474 – 1484 (2015)

107.    E. Sangwisut, S. Jitman, S. Ling & P. Udomkavanich, Hulls of cyclic and negacyclic codes over finite fields, Finite Fields and Their Applications 33, 232 – 257 (2015)

108.    B. Chen, H. Dinh, Y. Fan & S. Ling, Polyadic constacyclic codes, IEEE Transactions on Information Theory 61, no. 9, 4895 – 4904 (2015)

109.    S. Jitman, S. Ling & E. Sangwisut, On self-dual cyclic codes of length pa over GR(p2,s), Advances in Mathematics of Communications 10, no. 2, 255 – 273 (2016)

110.    A. Zeh & S. Ling, Spectral analysis of quasi-cyclic product codes, IEEE Transactions on Information Theory 62, no. 10, 5359 – 5374 (2016)

111.    B. Chen, L. Lin, S. Ling & H. Liu, Three new classes of optimal frequency-hopping sequence sets, Designs, Codes and Cryptography, to appear

112.    H.T. Lee, S. Ling, J.H. Seo & H. Wang, CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test, The Computer Journal, to appear

113.    M. Kim, H.T. Lee, S. Ling & H. Wang, On the efficiency of FHE-based private queries, IEEE Transactions on Dependable and Secure Computing, to appear

114.    H.T. Lee, S. Ling & H. Wang, Analysis of Gong et al.’s CCA2-secure homomorphic encryption, Theoretical Computer Science, to appear

115.    B. Chen, L. Lin & S. Ling, External difference families from finite fields, Journal of Combinatorial Designs, to appear

116. H.T. Lee, S. Ling, J.H. Seo & H. Wang, Semi-generic construction of public key encryption and identity-based encryption with equality test, Information Sciences, to appear

117.    S. Ling, D.H. Phan, D. Stehlé & R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, Algorithmica, to appear            

 

       

Papers in Proceedings of Conferences

1.     S. Ling, B.H. Seah, E.C. Tan, S.P., Tan Frequency assignment problems with various constraints. In: Proceedings of International Conference on Communication Systems 94, Singapore, pp. 1085 – 1089 (1994)

2.     K.Y. Lam, L.C.K. Hui & S. Ling, Generating secure elliptic curves for public key cryptosystems. In: Proceedings of Chinacrypt 96, eds. D.Y. Pei, R.J. Zhao and J.J. Zhou, pp. 60 – 64 (1996)

3.     K.Y. Lam, S. Ling & L.C.K. Hui, Efficient generation of elliptic curve cryptosystems. In: Proceedings of 2nd Annual International Computing and Combinatorics Conference, eds. J.Y. Cai and C.-K. Wong, pp. 411 – 416 (1996)

4.     S.K. Chua & S. Ling, A Rabin-type scheme based on y2 = x3 + bx2 mod n. In Computing and Combinatorics, Proceedings of 3rd Annual International Computing and Combinatorics Conference, T. Jiang & D.T. Lee eds, Springer, pp. 186 – 191 (1997)

5.     Y.M. Chee & S. Ling, Algebraic constructions of Ramanujan graphs and highly symmetric expanders. In: Proceedings of the Second Asian Mathematical Conference 1995, S Tangmanee & E Schulz eds, World Scientific, pp. 276 – 282 (1998) 

6.     D.R. Kohel, S. Ling & C. Xing, Explicit sequence expansions. In: Sequences and their Applications, Proceedings of International Conference on Sequences and their Applications (Singapore, 14 -- 17 Dec 1998), C. Ding, T. Helleseth and H. Niederreiter eds, Springer, pp. 308 – 317 (1999)

7.     C. Ding, D.R. Kohel & S. Ling, Counting the number of points on affine diagonal curves. In: Cryptography and Computational Number Theory, K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing eds., Progress in Computer Science and Applied Logic 20, Birkhäuser Verlag, pp. 15 – 24 (2001)

8.     S. Ling & P. Solé, Decomposing quasi-cyclic codes. In: Proceedings of International Workshop on Coding and Cryptography 2001, D. Augot and C. Carlet eds., pp. 507 – 517 (2001)

9.     S. Ling, Duadic codes. In: Proceedings of 3rd Asian Mathematical Conference 2000, T. Sunada, P.W. Sy and Y. Lo eds., pp. 324 – 336 (2002)

10.   S. Ling, F. Özbudak & C. Xing, An explicit construction of a class of good codes and their duals. In: Proceedings of International Workshop on Coding and Cryptography 2003, D. Augot, P. Charpin and G. Kabatianski eds., pp. 299 – 306 (2003)

11.   S. Ling & P. Solé, Good self-dual quasi-cyclic codes over Fq, q odd. In: Proceedings of Coding, Cryptography and Combinatorics, K. Feng, H. Niederreiter and C. Xing, eds., Progress in Computer Science and Applied Logic 23, Birkhäuser Verlag, pp. 223 – 226 (2004)

12.   F.-W. Fu, S. Ling & C. Xing, Constructions of nonbinary codes correcting t-symmetric errors and detecting all unidirectional errors: magnitude error criterion. In: Proceedings of Coding, Cryptography and Combinatorics, K. Feng, H. Niederreiter and C. Xing, eds., Progress in Computer Science and Applied Logic 23, Birkhäuser Verlag, pp. 139 – 152 (2004)

13.   S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings (Extended Abstract). In: Proceedings of Sequences and Their Applications 2004, pp. 79 – 83 (2004)

14.   S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings (Full Paper). In: Sequences and Their Applications – SETA 2004, T. Helleseth, D. Sarwate, H.-Y. Song, et al eds., LNCS 3486, Springer, pp. 236 – 242 (2005)

15.   S. Ling & F. Özbudak, Improved bounds on Weil sums over Galois rings and homogeneous weights. In: Proceedings of Workshop on Coding and Cryptography 2005, pp. 445 – 453 (2005)

16.   S. Ling & F. Özbudak, On the aperiodic and odd correlations of some p-ary sequences from Galois rings. In: Proceedings of Second International Workshop on Sequence Design and its Applications – IWSDA 05, S. Matsufuji & W.H. Mow eds., pp. 21 – 23 (2005)

17.   S. Ling & F. Özbudak , Improved bounds on Weil sums over Galois rings and homogeneous weights. In: Coding and Cryptography – WCC 2005, Ř Ytrehus ed., Lecture Notes in Computer Science 3969, Springer, pp. 412 – 426 (2006)

18.   S.-T. Xia, F.-W. Fu & S. Ling, A lower bound on the probability of undetected error for binary constant weight codes. In: Proceedings of International Symposium on Information Theory – ISIT 2006, pp. 302 – 306 (2006)

19.   S. Contini, K. Matusiewicz, J. Pieprzyk, R. Steinfeld, J. Guo, S. Ling and H. Wang, Cryptanalysis of LASH. In: Fast Software Encryption 2008, K. Nyberg ed., Lecture Notes in Computer Science 5086, Springer, pp. 207 – 223 (2008)

20.   Y. Lu, H. Wang and S. Ling, Cryptanalysis of Rabbit. In: Information Security, Proceedings of 11th Information Security Conference 2008, T.-C. Wu, C.-L. Lei, V. Rijmen, D.-T. Lee, eds., Lecture Notes in Computer Science 5222, Springer, pp. 204 – 214 (2008)  

21.   Z. Zhang, M. Liu, Y.M. Chee, S. Ling and H. Wang, Strongly multiplicative and 3-multiplicative linear secret sharing schemes. In: Advances in CryptologyAsiacrypt 2008, J. Pieprzyk ed., Lecture Notes in Computer Science 5350, Springer, pp. 19 – 36 (2008)

22.   A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk & H. Wang, Cryptanalysis of the LAKE hash family, In: Fast Software Encryption, 16th International Workshop, O. Dunkelman ed., Lecture Notes in Computer Science 5665, Springer, pp. 156 – 179 (2009)  

23.   A. Pott, Y. Tan, T. Feng & S. Ling, Association schemes arising from bent functions. In: Workshop on Coding and Cryptography – WCC 2009, A. Kholosha, E. Rosnes & M. Parker eds., pp. 48 – 61 (2009) 

24.   J. Guo, K. Matusiewicz, L.R. Knudsen, S. Ling & H. Wang, Practical pseudo-collisions for hash functions ARIRANG-224/384, In: Selected Areas in Cryptography, 16th International Workshop, M.J. Jacobson, V. Rijmen, R. Safavi-Naini eds., Lecture Notes in Computer Science 5867, Springer, pp. 141 – 156 (2009)  

25.   H. Chen, S. Ling, C. Padro, H. Wang & C. Xing, Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes, In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, M. Parker ed., Lecture Notes in Computer Science 5921, Springer, pp. 263 – 277 (2009)  

26.   P.H. Nguyen, L. Wei, H. Wang & S. Ling, On multidimensional linear cryptanalysis, In: Information Security and Privacy, 15th Australasian Conference, R. Steinfeld, P. Hawkes eds., Lecture Notes in Computer Science 6168, Springer, pp. 37 – 52 (2010)  

27.   A. Poschmann, S. Ling & H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, In: Cryptographic Hardware and Embedded Systems – CHES 2010, 12th International Workshop, S. Mangard, F.-X. Standaert eds., Lecture Notes in Computer Science 6225, Springer, pp. 219 – 233 (2010) 

28.   J. Guo, S. Ling, C. Rechberger & H. Wang, Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2, In: Advances in CryptologyAsiacrypt 2010, M. Abe ed., Lecture Notes in Computer Science 6477, Springer, pp. 56 – 75 (2010)

29.   A. Moradi, A. Poschmann, S. Ling, C. Paar & H. Wang, Pushing the limits: A very compact and a threshold implementation of AES, In: Advances in Cryptology – Eurocrypt 2011, K.G. Patterson ed., Lecture Notes in Computer Science 6632, Springer, pp. 69 – 88 (2011)

30.   L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang & S. Ling, Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster), In: Information Security and Privacy, 16th Australasian Conference, U. Parampalli, P. Hawkes eds., Lecture Notes in Computer Science 6812, Springer, pp. 433 – 438 (2011)

31.   L. Wei, T. Peyrin, P. Sokolowski, S. Ling, J. Pieprzyk & H. Wang, On the (in) security of IDEA in various hashing modes, In: FSE 2012, A. Canteaut ed., Lecture Notes in Computer Science 7549, Springer, pp. 163 – 179 (2012)

32.   R. Steinfeld, S. Ling, J. Pieprzyk, C. Tartary & H. Wang, NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model, In: PKC 2012, M. Fischlin, J. Buchmann & M. Manulis eds., Lecture Notes in Computer Science 7293, Springer, pp. 353 – 371 (2012)

33.   J. Chen, H. Wee, H.W. Lim, S. Ling & H. Wang, Shorter IBE and signatures via asymmetric pairings, In: Pairing-Based Cryptography – Pairing 2012, M. Abdalla & T. Lange eds., Lecture Notes in Computer Science 7708, Springer, pp. 122 – 140 (2012) 

34.   J. Chen, H.W Lim, S. Ling, H. Wang & K. Nguyen, Revocable identity-based encryption from lattices, In: ACISP 2012, W. Susilo, Y. Mu & J. Seberry eds., Lecture Notes in Computer Science 7372, Springer, pp. 390 – 403 (2012)

35.   C.-N. Chen, N. Jacob, S. Kutzner, S. Ling, A. Poschmann & S. Saetang:  Standardized signature algorithms on ultra-constrained 4-bit MCU, In: IWSEC 2012, G. Hanaoka & T. Yamauchi eds., Lecture Notes in Computer Science 7631, Springer, pp. 37 – 50 (2012)

36.   H. Wu, T. Huang, P.H. Nguyen, H. Wang & S. Ling, Differential attacks against stream cipher ZUC, In: Advances in Cryptology – Asiacrypt 2012, X. Wang & K Sako eds., Lecture Notes in Computer Science 7658, Springer, pp. 262 – 277 (2012)

37.   C. Chen, J. Chen, H.W. Lim, Z. Zhang, D. Feng, S. Ling & H. Wang, Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures, In: CT-RSA 2013, E. Dawson ed., Lecture Notes in Computer Science 7779, Springer, pp. 50 – 67 (2013)

38.   N. Jacob, S. Saetang, C.-N. Chen, S. Kutzner, S. Ling & A. Poschmann, Feasibility and practicability of standardized cryptography on 4-bit micro controllers, In: Conference on Selected Areas in Cryptography, 19th International Conference (SAC 2012), L.R. Knudsen & H. Wu eds., Lecture Notes in Computer Science 7707, Springer, pp. 184 – 201 (2013)

39.   S. Ling, K. Nguyen, D. Stehlé & H. Wang: Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications, In: PKC2013, K. Kurosawa & G. Hanaoka eds., Lecture Notes in Computer Science 7778, Springer, pp. 107 – 124 (2013)

40.   L. Su, H.W. Lim, S. Ling & H. Wang: Revocable IBE systems with almost constant-size key update, In: Pairing-based Cryptography – Pairing 2013, Z. Cao & F. Zhang eds., Lecture Notes in Computer Science 8365, Springer, pp. 168 – 185 (2013)

41.   A. Langlois, S. Ling, K. Nguyen & H. Wang, Lattice-based group signature scheme with verifier-local revocation, In: Public Key Cryptography – PKC2014, H. Krawczyk ed., Lecture Notes in Computer Science 8383, Springer, pp. 345 – 361 (2014)

42.   A. Zeh & S. Ling, Decoding of quasi-cyclic codes up to a new lower bound on the minimum distance, International Symposium on Information Theory (ISIT) 2014, pp. 2584 – 2588 (2014) 

43.   S. Ling, D.H. Phan, D. Stehlé & R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, In: Advances in Cryptology – CRYPTO 2014, J. Garay & R Gennaro eds., Lecture Notes in Computer Science 8616, Springer, pp. 315 – 334 (2014) 

44.   S. Emami, S. Ling, I. Nikolic, J. Pieprzyk & H. Wang, Low probability differentials and the cryptanalysis of full-round CLEFIA-128, In: Asiacrypt 2014 Part I, P. Sarkar & T. Iwata eds., Lecture Notes in Computer Science 8873, pp. 141 – 157 (2014) 

45.   S. Ling, K. Nguyen & H. Wang, Group signatures from lattices: simpler, tighter, shorter, ring-based, In: PKC2015, J. Katz ed., Lecture Notes in Computer Science 9020, pp. 427 – 449 (2015) 

46.   A. Zeh & S. Ling, Construction of quasi-cyclic product codes, In: 10th International Conference on Systems, Communications and Coding 2015, to appear

47.   M.F. Ezerman, H.T. Lee, S. Ling, K. Nguyen & H. Wang, A provably secure group signature scheme from code-based assumptions, In: Asiacrypt 2015, T. Iwata & J.H. Cheon eds., Lecture Notes in Computer Science 9452, pp. 260 – 285 (2015)

48.   B. Libert, S. Ling, K. Nguyen & H. Wang, Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors, In: Eurocrypt 2016 Part II, J.-S. Coron & M. Fischlin eds., Lecture Notes in Computer Science 9666, pp. 1 – 31 (2016)   

49.   Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Rates of constant-composition codes that mitigate intercell interference, International Symposium on Information Theory (ISIT), 2016, pp. 200 – 204 (2016)

50.   Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Efficient encoding/decoding of capacity-achieving constant-composition ICI-free codes, International Symposium on Information Theory (ISIT), 2016, pp. 205 – 209 (2016)

51.   A. Zeh & S. Ling, Spectral analysis of quasi-cyclic product codes, International Symposium on Information Theory (ISIT), 2016, pp. 1113 – 1117 (2016) 

52.   Y.M. Chee, H.M. Kiah, S. Ling, T.T. Nguyen, V.K. Vu & X. Zhang, String concatenation construction for Chebyshev permutation channel codes, International Symposium on Information Theory (ISIT), 2016, pp. 2824 – 2828 (2016)

53.   Y. Deng, J. Garay, S. Ling, H. Wang & M. Yung, On the implausibility of constant-round public-coin zero-knowledge proofs, 10th Conference on Security and Cryptography for Networks, to appear

54.   Z. Chang, M.F. Ezerman, S. Ling & H. Wang, The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields, Sequences and Their Applications (SETA), 2016, to appear

55.   B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, In: Advances in Cryptology – Asiacrypt 2016 Part II, J.H. Cheon & T. Takagi eds., Lecture Notes in Computer Science 10032, pp. 101 – 131 (2016)  

56.   B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions, Advances in Cryptology – Asiacrypt 2016 Part II, J.H. Cheon & T. Takagi eds., Lecture Notes in Computer Science 10032, pp. 373 – 403 (2016)

Book Chapters

1.     S. Ling, H. Wang & C. Xing, Cover-Free Families and Their Applications. In: Security in Distributed and Networking Systems, Yang Xiao and Yi Pan eds., World Scientific Publishing Co., 2007, pp. 75 – 98

2.     S. Ling, A New Garden of Science in Singapore: Science at Nanyang Technological University. In: 50 Years of Science in Singapore, BTG Tan, Hock Lim and KK Phua eds., World Scientific Publishing Co., 2016, pp. 227 – 235

 

Technology Disclosures & Patents

1.     Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Capacity-achieving constant-composition ICI-free codes. Singapore provisional application number 10201600274R, dated 14 January 2016

Best viewed with Microsoft IE 6.0 and above