Professor LING San

| Home | Research Interest | Publications | Book Publications | Links |

Papers in Journals

1.           S. Ling & J. Oesterlé, The Shimura subgroup of Jo(N). Astérisque 196197, 171 – 203 (1991)

2.           S. Ling, Congruences between cusp forms and the geometry of Jacobians of modular curves. Mathematische Annalen 295, 111 – 133 (1993)

3.           Y.M. Chee & S. Ling, Projective covering designs. Bulletin of the London Mathematical Society 25, 231 – 239 (1993)

4.           S. Ling, Shimura subgroups of Jacobians of Shimura curves. Proceedings of the American Mathematical Society 118, 385 – 390 (1993)

5.           S. Ling, The old subvariety of Jo(pq) and the Eisenstein kernel in Jacobians. Israel Journal of Mathematics 84, 365 – 384 (1993)

6.           S. Ling, The Fitting ideal of Jo(q)(Fp^n) over the Hecke algebra. Journal of Algebra 164, 563 – 575 (1994)

7.           S. Ling, Shimura subgroups and degeneracy maps. Journal of Number Theory 54, 39 – 59  (1995)

8.           S. Ling, On the Q-rational cuspidal subgroup and the component group of Jo(pr). Israel Journal of Mathematics 99, 29 – 54 (1997)

9.           S.K. Chua & S. Ling, On the rational cuspidal subgroup and the rational torsion points of Jo(pq).  Proceedings of the American Mathematical Society 125, 2255 – 2263  (1997)

10.         K.H. Leung, S. Ling, S.L. Ma, K.B. Tay, Almost perfect sequences with q = 2. Archiv der Mathematik 70, 128 – 131 (1998)

11.         S. Ling, On component groups of Jo(N) and degeneracy maps. Proceedings of the American Mathematical Society 126, 3201 – 3210 (1998)

12.         Y.M. Chee & S. Ling, Combinatorial coverings from geometries over principal ideal rings. Journal of Combinatorial Designs 7, 247 – 268 (1999)

13.         S.K. Chua, K.H. Leung & S. Ling, Attack on RSA-type cryptosystems based on singular cubic curves over Z/nZ. Theoretical Computer Science 226, 19 – 27 (1999)

14.         K.H. Leung & S. Ling, The rank of a Latin square associated to an abelian group. Communications in Algebra 28, 1141 – 1155 (2000)

15.         C. Ding, D.R. Kohel & S. Ling, Elementary 2-group character codes. IEEE Transactions on Information Theory 46, 280 – 284 (2000)

16.         C. Ding, D.R. Kohel & S. Ling, Split group codes. IEEE Transactions on Information Theory 46, 485 – 495 (2000)

17.         S. Ling, Component group of the p-new subvariety of Jo(Mp). Israel Journal of Mathematics 116, 117 – 123 (2000)

18.         C. Xing & S. Ling, A class of linear codes with good parameters from algebraic curves. IEEE Transactions on Information Theory 46, 1527 – 1532 (2000)

19.         C. Xing & S. Ling, A class of linear codes with good parameters. IEEE Transactions on Information Theory 46, 2184 – 2188 (2000)

20.         C. Ding, D.R. Kohel & S. Ling, Secret sharing with a class of ternary codes. Theoretical Computer Science 246, 285 – 298 (2000)

21.         S. Ling, H. Niederreiter & C. Xing, Symmetric polynomials and some good codes. Finite Fields and Their Applications 7, 142 – 148 (2001)

22.         C. Khare & S. Ling, Maps between Jacobians of Shimura curves and congruence kernels. Mathematische Annalen 319, 383 – 394 (2001)

23.         K.H. Leung, S. Ling & S.L. Ma, Construction of semi-regular relative difference sets. Finite Fields and Their Applications 7, 397 – 414 (2001)

24.         S. Ling & P. Solé, Duadic codes over Z2k. IEEE Transactions on Information Theory 47, 1581 – 1589 (2001)

25.         H. Chen, S. Ling & C. Xing, Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound. IEEE Transactions on Information Theory 47, 2055 – 2058 (2001)

26.         S. Ling & P. Solé, Type II codes over F4 + uF4. European Journal of Combinatorics 22, 983 – 997 (2001)

27.         S. Ling & P. Solé, Duadic codes over F2 + uF2. Applicable Algebra in Engineering, Communication and Computing 12, 365 – 379 (2001)

28.         S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes I: finite fields. IEEE Transactions on Information Theory 47, 2751 – 2760 (2001) 

29.         K.H. Leung, S. Ling & C. Xing, New binary linear codes from algebraic curves. IEEE Transactions on Information Theory 48, 285 – 287 (2002)

30.         Y.M. Chee & S. Ling, Highly symmetric expanders. Finite Fields and Their Applications 8, 294 – 310 (2002)

31.         S. Ling & J.T. Blackford, Zp^{k+1}-linear codes. IEEE Transactions on Information Theory 48, 2592 – 2605 (2002)

32.         S. Ling & P. Solé, Good self-dual quasi-cyclic codes exist. IEEE Transactions on Information Theory 49, 1052 – 1053 (2003) 

33.         S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes II: chain rings. Designs, Codes and Cryptography 30, 113 – 130 (2003)

34.         S. Ling & P. Solé, Nonlinear p-ary sequences. Applicable Algebra in Engineering, Communication and Computing 14, 117 – 125 (2003) 

35.         K.H.D. Chua, A. Tyagi, S. Ling & S.H. Bok, Process-parameter-interface model for design management. Journal of Construction Engineering and Management, ASCE 129, 653 – 663 (2003)

36.         F.-W. Fu, S. Ling & C. Xing, New lower bounds and constructions for binary codes correcting asymmetric errors. IEEE Transactions on Information Theory 49, 3294 – 3299 (2003)

37.         K. Betsumiya, S. Ling & F. Nemenzo, Type II codes over F2^m + uF2^m. Discrete Mathematics 275, 43 – 65 (2004)

38.         S. Ling & C. Xing, Polyadic codes revisited. IEEE Transactions on Information Theory 50, 200 – 207 (2004)

39.         S. Ling, A family of group character codes. European Journal of Combinatorics 25, 579 – 590 (2004)

40.         J. Lahtonen, S. Ling, P. Solé & D. Zinoviev, Z8-Kerdock codes and pseudorandom binary sequences. J. Complexity 20, 318 – 330 (2004)

41.         Y. Tang & S. Ling, On Viterbi-like algorithms and their applications to Reed-Muller codes. J. Complexity 20, 438 – 457 (2004)

42.         S. Ling & F. Özbudak, An improvement on the bounds of Weil exponential sums over Galois rings with some applications. IEEE Transactions on Information Theory 50, 2529 – 2539 (2004)  

43.         F.-W. Fu, S. Ling & C. Xing, On the variance of average distance of subsets in the Hamming space. Discrete Applied Math 145, 465 – 478 (2005)  

44.         S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes III: generator theory. IEEE Transactions on Information Theory 51, 2692 – 2700 (2005)

45.         H. Chen, S. Ling & C. Xing, Quantum codes from concatenated algebraic-geometric codes. IEEE Transactions on Information Theory 51, 2915 – 2920 (2005)

46.         S.-T. Xia, F.-W. Fu, Y. Jiang & S. Ling, The probability of undetected error for binary constant weight codes. IEEE Transactions on Information Theory 51, 3364 – 3373 (2005)

47.         S. Ling, H. Stichtenoth & S. Yang, A class of Artin-Schreier towers with finite genus, Bull. Brazilian Math. Soc. 36, 393 – 401 (2005)

48.         S. Ling, F. Özbudak & C. Xing, An explicit class of codes with good parameters and their duals, Discrete Applied Math. 154, no. 2, 346 – 356 (2006)  

49.         S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings of characteristic p2, SIAM J Discrete Math. 19, no. 4, 1011 – 1028 (2006)

50.         S. Ling, H. Niederreiter & P. Solé, On the algebraic structure of quasi-cyclic codes IV: repeated roots, Designs, Codes and Cryptography 38, no. 3, 337 – 361 (2006)

51.         S. Dougherty & S. Ling, Cyclic codes over Z4 of even length, Designs, Codes and Cryptography 39, no. 2, 127 – 153 (2006)

52.         Y. Tang, F.-W. Fu & S. Ling, On the reliability-order-based decoding algorithm for binary linear block codes, IEEE Transactions on Information Theory 52, no. 1, 328 – 336 (2006)

53.         K. Feng, S. Ling & C. Xing, Asymptotic bounds on quantum codes from algebraic geometry codes, IEEE Transactions on Information Theory 52, no. 3, 986 – 991 (2006)

54.         S. Ling & F. Özbudak, Aperiodic and odd correlations of some p-ary sequences from Galois rings, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 9, 2258 – 2263 (2006)

55.         S.-T. Xia, F.-W. Fu & S. Ling, A lower bound on the probability of undetected error for binary constant weight codes, IEEE Transactions on Information Theory 52, no. 9, 4235 – 4243 (2006)

56.         Y.M. Chee & S. Ling, Constructions for q-ary constant weight codes, IEEE Transactions on Information Theory 53, no. 1, 135 – 146 (2007)  

57.         Y.M. Chee, A.C.H. Ling, S. Ling & H. Shen, The PBD-closure of constant composition codes, IEEE Transactions on Information Theory 53, no. 8, 2685 – 2692 (2007)

58.         S. Ling & F. Özbudak, Constructions and bounds on linear error-block codes, Designs, Codes and Cryptography 45, 297 – 316 (2007)

59.         L. Pu, H. Shen, J. Ma & S. Ling, Cycle systems in the complete bipartite graph plus one factor, SIAM J Discrete Math. 21, no. 4, 1083 – 1092 (2007)

60.         Y.M. Chee & S. Ling, Improved lower bounds for constant GC-content DNA codes, IEEE Transactions on Information Theory 54, no. 1, 391 – 394 (2008)

61.         H. Chen, S. Ling & C. Xing, Access structures of elliptic secret sharing schemes, IEEE Transactions on Information Theory 54, no. 2, 850 – 852 (2008)   

62.         Y.M. Chee, S.H. Dau, A.C.H. Ling & S. Ling, The sizes of optimal q-ary codes of weight three and distance four: a complete solution, IEEE Transactions on Information Theory 54, no. 3, 1291 – 1295 (2008)

63.         S. Ling & F. Özbudak, Some constructions of (t,m,s)-nets with improved parameters, Finite Fields and Their Applications 14, 658 – 675 (2008)  

64.         H.M. Kiah, K.H. Leung & S. Ling, Cyclic codes over GR(pe, m) of length pk, Finite Fields and Their Applications 14, 834 – 846 (2008)

65.         C. Li, Q. Li & S. Ling, Properties and applications of preimage distributions of perfect nonlinear functions, IEEE Transactions on Information Theory 55, no. 1, 64 – 69 (2009)

66.         C. Li, S. Ling & L. Qu, On the covering structures of two classes of linear codes from perfect nonlinear functions, IEEE Transactions on Information Theory 55, no. 1, 70 – 82 (2009)    

67.         C. Li, Q. Li & S. Ling, On the constructions of constant-composition codes from perfect nonlinear functions, Science in China Series F: Information Sciences 52, no. 6, 964 – 973 (2009)

68.         Y.M. Chee, S.H. Dau, A.C.H. Ling & S. Ling, Linear size optimal q-ary constant-weight codes and constant-composition codes, IEEE Transactions on Information Theory 56, no. 1, 140 – 151 (2010) 

69.         L. Wang, K. Feng, S. Ling & C. Xing, Asymmetric quantum codes: characterization and constructions, IEEE Transactions on Information Theory 56, no. 6, 2938 – 2945 (2010)

70.         S. Ling, J. Luo & C. Xing, Generalization of Steane’s enlargement construction of quantum codes and applications, IEEE Transactions on Information Theory 56, no. 8, 4080 – 4084 (2010) 

71.         L. Jin, S. Ling, J. Luo & C. Xing, Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes, IEEE Transactions on Information Theory 56, no. 9, 4735 – 4740 (2010)

72.         A. Poschmann, A. Moradi, K. Khoo, C.-W. Lim, H. Wang & S. Ling, Side-channel resistant crypto for less than 2,300 GE, J Cryptology 24, no. 2, 322 – 345 (2011)

73.         M.F. Ezerman, S. Ling, P. Solé & O. Yemen, From skew-cyclic codes to asymmetric quantum codes, Advances in Mathematics of Communications 5, no. 1, 41 – 57 (2011)

74.         Y. Jia, S. Ling & C. Xing, On self-dual cyclic codes over finite fields, IEEE Transactions on Information Theory 57, no. 4, 2243 – 2251 (2011)

75.         A. Pott, Y. Tan, T. Feng & S. Ling, Association schemes arising from bent functions, Designs, Codes and Cryptography 59, 319 – 331 (2011)

76.         A.B.F. Edoukou, S. Ling & C. Xing, Structure of functional codes defined on non-degenerate Hermitian varieties, J. Comb Theory, Series A 118, 2436 – 2444 (2011)

77.         M.F. Ezerman, S. Ling & P. Solé, Additive asymmetric quantum codes, IEEE Transactions on Information Theory 57, no. 8, 5536 – 5550 (2011)

78.         Y.M. Chee, G. Ge, L. Ji, S. Ling & J. Yin, List decodability at small radii, Designs, Codes and Cryptography 61, no. 2, 151 – 166 (2011) 

79.         C. Tartary, H. Wang & S. Ling, Authentication of digital streams, IEEE Transactions on Information Theory 57, no. 9, 6285 – 6303 (2011)

80.         S. Jitman, S. Ling & P. Udomkavanich, Skew constacyclic codes over finite chain rings, Advances in Mathematics of Communications 6, no. 1, 29-63 (2012)

81.         H.M. Kiah, K.H. Leung & S. Ling, A note on cyclic codes over GR(p2, m) of length pk, Designs, Codes and Cryptography 63, no. 1, 105-112 (2012)

82.         S. Ling, I.E. Shparlinski, R. Steinfeld & H. Wang, On the modular inversion hidden number problem, J Symbolic Computation 47, no. 4, 358 – 367 (2012)

83.         Y.M. Chee, S. Ling, Y. Tan & X. Zhang, Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences, Mathematics of Computation 81, 585 – 603 (2012)

84.         E. Ozdemir, S. Ling & C. Xing, Constructing irreduciable polynomials over finite fields, Mathematics of Computation 81, no. 279, 1663 – 1668 (2012)

85.         Z. Zhang, Y.M.Chee, S. Ling, M. Liu & M. Wang, Threshold changeable secret sharing schemes revisited, Theoretical Computer Science 418, 106 – 115 (2012)

86.         S. Ling & L. Qu, A note on linearized polynomials and the dimension of their kernels, Finite Fields and their Applications 18, no. 1, 56 – 62 (2012)

87.         C. Ding & S. Ling, A q-polynomial approach to cyclic codes, Finite Fields and Their Applications 20, no. 1, 1 – 14 (2013)

88.         Y.M. Chee, T. Feng, S. Ling, H. Wang & L.F. Zhang, Query-efficient locally decodable codes of subexponential length, Computational Complexity 22, no. 1, 159 – 189 (2013)

89.         S. Jitman, S.Ling, H. Liu & X. Xie, Abelian codes in principal ideal group algebras, IEEE Transactions on Information Theory 59, no. 5, 3046 – 3058 (2013)

90.         M.F. Ezerman, S. Jitman, H.M. Kiah & S. Ling, Pure asymmetric quantum MDS codes from CSS construction: a complete characterization, International Journal of Quantum Information 11, no. 3, 1350027 (10 pages) (2013)

91.         Y.M. Chee, S. Ling, H. Wang & L.F. Zhang, Upper bounds on matching families in Zpqn, IEEE Transactions on Information Theory 59, no.8, 5131 – 5139 (2013)

92.         X. Yi, S. Ling & H. Wang, Efficient two-server password-only authenticated key exchange, IEEE Transactions on Parallel and Distributed Systems 24, no. 9, 1773 – 1782 (2013)

93.         M.F. Ezerman, S. Jitman, S. Ling & D.V. Pasechnik, CSS-like constructions of asymmetric quantum codes, IEEE Transactions on Information Theory 59, no. 10, 6732 – 6754 (2013)

94.         F.-W. Fu, S. Ling & C. Xing, New results on two hypercube coloring problems, Discrete Applied Mathematics 161, no. 18, 2937 – 2945 (2013)

95.         Y. Tan, L. Qu, S. Ling & C.H. Tan, On the Fourier spectra of new APN functions, SIAM Journal on Discrete Mathematics 27, no. 2, 791 – 801 (2013)

96.         J. Chen, H.W. Lim, S. Ling & H. Wang, The relation and transformation between hierarchical inner product encryption and spatial encryption, Designs, Codes and Cryptography 71, no. 2, 347 – 364 (2014)

97.         Y. Fan, S. Ling & H. Liu, Matrix product codes over finite commutative Frobenius rings, Designs, Codes and Cryptography 71, no. 2, 201 – 227 (2014)

98.         S. Jitman, S. Ling & P. Solé, Hermitian self-dual abelian codes, IEEE Transactions on Information Theory 60, no. 3, 1496 – 1507 (2014)              

99.         Y. Fan, S. Ling & H. Liu, Homogeneous weights of matrix product codes over finite principal ideal rings, Finite Fields and Their Applications 29, 247 – 267 (2014)

100.       J. Chen, H.W. Lim, S. Ling, L. Su & H. Wang, Spatial encryption supporting non-monotone access structure, Designs, Codes and Cryptography 73, no. 3, 731 – 746 (2014)

101.       J. Chen, H.W. Lim, S. Ling, H. Wang & H. Wee, Shorter identity-based encryption via asymmetric pairings, Designs, Codes and Cryptography 73, no. 3, 911 – 947 (2014)

102.       S. Ling, I. Shparlinski & H. Wang, On the multidimensional distribution of the Naor-Reingold pseudo-random function, Mathematics of Computation 83, no. 289, 2429 – 2434 (2014)

103.       S. Ling, E. Ozdemir & C. Xing, A relation between embedding degrees and class numbers of binary quadratic forms, Mathematics of Computation 83, no. 290, 3001 – 3004 (2014)

104.       S. Emami, S. Ling, I. Nikolic, J. Pieprzyk & H. Wang, The resistance of PRESENT-80 against related-key differential attacks, Cryptography & Communications – Discrete Structures, Boolean Functions & Sequences 6, no. 3, 171 – 187 (2014)

105.       S. Jitman & S. Ling, Quasi-abelian codes, Designs, Codes and Cryptography 74, no. 3, 511 – 531 (2015)

106.       B. Chen, S. Ling & G. Zhang, Application of constacyclic codes to quantum MDS codes, IEEE Transactions on Information Theory 61, no. 3, 1474 – 1484 (2015)

107.       E. Sangwisut, S. Jitman, S. Ling & P. Udomkavanich, Hulls of cyclic and negacyclic codes over finite fields, Finite Fields and Their Applications 33, 232 – 257 (2015)

108.       B. Chen, H. Dinh, Y. Fan & S. Ling, Polyadic constacyclic codes, IEEE Transactions on Information Theory 61, no. 9, 4895 – 4904 (2015)

109.       S. Jitman, S. Ling & E. Sangwisut, On self-dual cyclic codes of length pa over GR(p2,s), Advances in Mathematics of Communications 10, no. 2, 255 – 273 (2016)

110.       A. Zeh & S. Ling, Spectral analysis of quasi-cyclic product codes, IEEE Transactions on Information Theory 62, no. 10, 5359 – 5374 (2016)

111.       B. Chen, L. Lin, S. Ling & H. Liu, Three new classes of optimal frequency-hopping sequence sets, Designs, Codes and Cryptography 83, no. 1, 219 – 232 (2017)

112.       H.T. Lee, S. Ling, J.H. Seo & H. Wang, CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test, The Computer Journal, to appear

113.       M. Kim, H.T. Lee, S. Ling & H. Wang, On the efficiency of FHE-based private queries, IEEE Transactions on Dependable and Secure Computing, to appear

114.       H.T. Lee, S. Ling & H. Wang, Analysis of Gong et al.’s CCA2-secure homomorphic encryption, Theoretical Computer Science, to appear

115.       B. Chen, L. Lin & S. Ling, External difference families from finite fields, Journal of Combinatorial Designs, to appear

116.       H.T. Lee, S. Ling, J.H. Seo & H. Wang, Semi-generic construction of public key encryption and identity-based encryption with equality test, Information Sciences, to appear

117.       S. Ling, D.H. Phan, D. Stehlé & R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, Algorithmica, to appear

118.       Z. Chang, M.F. Ezerman, S. Ling & H. Wang, Construction of de Bruijn sequences from product of two irreducible polynomials, Cryptography and Communications, to appear  

Papers in Proceedings of Conferences

1.     S. Ling, B.H. Seah, E.C. Tan, S.P., Tan Frequency assignment problems with various constraints. In: Proceedings of International Conference on Communication Systems 94, Singapore, pp. 1085 – 1089 (1994)

2.     K.Y. Lam, L.C.K. Hui & S. Ling, Generating secure elliptic curves for public key cryptosystems. In: Proceedings of Chinacrypt 96, eds. D.Y. Pei, R.J. Zhao and J.J. Zhou, pp. 60 – 64 (1996)

3.     K.Y. Lam, S. Ling & L.C.K. Hui, Efficient generation of elliptic curve cryptosystems. In: Proceedings of 2nd Annual International Computing and Combinatorics Conference, eds. J.Y. Cai and C.-K. Wong, pp. 411 – 416 (1996)

4.     S.K. Chua & S. Ling, A Rabin-type scheme based on y2 = x3 + bx2 mod n. In Computing and Combinatorics, Proceedings of 3rd Annual International Computing and Combinatorics Conference, T. Jiang & D.T. Lee eds, Springer, pp. 186 – 191 (1997)

5.     Y.M. Chee & S. Ling, Algebraic constructions of Ramanujan graphs and highly symmetric expanders. In: Proceedings of the Second Asian Mathematical Conference 1995, S Tangmanee & E Schulz eds, World Scientific, pp. 276 – 282 (1998) 

6.     D.R. Kohel, S. Ling & C. Xing, Explicit sequence expansions. In: Sequences and their Applications, Proceedings of International Conference on Sequences and their Applications (Singapore, 14 -- 17 Dec 1998), C. Ding, T. Helleseth and H. Niederreiter eds, Springer, pp. 308 – 317 (1999)

7.     C. Ding, D.R. Kohel & S. Ling, Counting the number of points on affine diagonal curves. In: Cryptography and Computational Number Theory, K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing eds., Progress in Computer Science and Applied Logic 20, Birkhäuser Verlag, pp. 15 – 24 (2001)

8.     S. Ling & P. Solé, Decomposing quasi-cyclic codes. In: Proceedings of International Workshop on Coding and Cryptography 2001, D. Augot and C. Carlet eds., pp. 507 – 517 (2001)

9.     S. Ling, Duadic codes. In: Proceedings of 3rd Asian Mathematical Conference 2000, T. Sunada, P.W. Sy and Y. Lo eds., pp. 324 – 336 (2002)

10.   S. Ling, F. Özbudak & C. Xing, An explicit construction of a class of good codes and their duals. In: Proceedings of International Workshop on Coding and Cryptography 2003, D. Augot, P. Charpin and G. Kabatianski eds., pp. 299 – 306 (2003)

11.   S. Ling & P. Solé, Good self-dual quasi-cyclic codes over Fq, q odd. In: Proceedings of Coding, Cryptography and Combinatorics, K. Feng, H. Niederreiter and C. Xing, eds., Progress in Computer Science and Applied Logic 23, Birkhäuser Verlag, pp. 223 – 226 (2004)

12.   F.-W. Fu, S. Ling & C. Xing, Constructions of nonbinary codes correcting t-symmetric errors and detecting all unidirectional errors: magnitude error criterion. In: Proceedings of Coding, Cryptography and Combinatorics, K. Feng, H. Niederreiter and C. Xing, eds., Progress in Computer Science and Applied Logic 23, Birkhäuser Verlag, pp. 139 – 152 (2004)

13.   S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings (Extended Abstract). In: Proceedings of Sequences and Their Applications 2004, pp. 79 – 83 (2004)

14.   S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings (Full Paper). In: Sequences and Their Applications – SETA 2004, T. Helleseth, D. Sarwate, H.-Y. Song, et al eds., LNCS 3486, Springer, pp. 236 – 242 (2005)

15.   S. Ling & F. Özbudak, Improved bounds on Weil sums over Galois rings and homogeneous weights. In: Proceedings of Workshop on Coding and Cryptography 2005, pp. 445 – 453 (2005)

16.   S. Ling & F. Özbudak, On the aperiodic and odd correlations of some p-ary sequences from Galois rings. In: Proceedings of Second International Workshop on Sequence Design and its Applications – IWSDA 05, S. Matsufuji & W.H. Mow eds., pp. 21 – 23 (2005)

17.   S. Ling & F. Özbudak , Improved bounds on Weil sums over Galois rings and homogeneous weights. In: Coding and Cryptography – WCC 2005, Ř Ytrehus ed., Lecture Notes in Computer Science 3969, Springer, pp. 412 – 426 (2006)

18.   S.-T. Xia, F.-W. Fu & S. Ling, A lower bound on the probability of undetected error for binary constant weight codes. In: Proceedings of International Symposium on Information Theory – ISIT 2006, pp. 302 – 306 (2006)

19.   S. Contini, K. Matusiewicz, J. Pieprzyk, R. Steinfeld, J. Guo, S. Ling and H. Wang, Cryptanalysis of LASH. In: Fast Software Encryption 2008, K. Nyberg ed., Lecture Notes in Computer Science 5086, Springer, pp. 207 – 223 (2008)

20.   Y. Lu, H. Wang and S. Ling, Cryptanalysis of Rabbit. In: Information Security, Proceedings of 11th Information Security Conference 2008, T.-C. Wu, C.-L. Lei, V. Rijmen, D.-T. Lee, eds., Lecture Notes in Computer Science 5222, Springer, pp. 204 – 214 (2008)  

21.   Z. Zhang, M. Liu, Y.M. Chee, S. Ling and H. Wang, Strongly multiplicative and 3-multiplicative linear secret sharing schemes. In: Advances in CryptologyAsiacrypt 2008, J. Pieprzyk ed., Lecture Notes in Computer Science 5350, Springer, pp. 19 – 36 (2008)

22.   A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk & H. Wang, Cryptanalysis of the LAKE hash family, In: Fast Software Encryption, 16th International Workshop, O. Dunkelman ed., Lecture Notes in Computer Science 5665, Springer, pp. 156 – 179 (2009)  

23.   A. Pott, Y. Tan, T. Feng & S. Ling, Association schemes arising from bent functions. In: Workshop on Coding and Cryptography – WCC 2009, A. Kholosha, E. Rosnes & M. Parker eds., pp. 48 – 61 (2009) 

24.   J. Guo, K. Matusiewicz, L.R. Knudsen, S. Ling & H. Wang, Practical pseudo-collisions for hash functions ARIRANG-224/384, In: Selected Areas in Cryptography, 16th International Workshop, M.J. Jacobson, V. Rijmen, R. Safavi-Naini eds., Lecture Notes in Computer Science 5867, Springer, pp. 141 – 156 (2009)  

25.   H. Chen, S. Ling, C. Padro, H. Wang & C. Xing, Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes, In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, M. Parker ed., Lecture Notes in Computer Science 5921, Springer, pp. 263 – 277 (2009)  

26.   P.H. Nguyen, L. Wei, H. Wang & S. Ling, On multidimensional linear cryptanalysis, In: Information Security and Privacy, 15th Australasian Conference, R. Steinfeld, P. Hawkes eds., Lecture Notes in Computer Science 6168, Springer, pp. 37 – 52 (2010)  

27.   A. Poschmann, S. Ling & H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, In: Cryptographic Hardware and Embedded Systems – CHES 2010, 12th International Workshop, S. Mangard, F.-X. Standaert eds., Lecture Notes in Computer Science 6225, Springer, pp. 219 – 233 (2010) 

28.   J. Guo, S. Ling, C. Rechberger & H. Wang, Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2, In: Advances in CryptologyAsiacrypt 2010, M. Abe ed., Lecture Notes in Computer Science 6477, Springer, pp. 56 – 75 (2010)

29.   A. Moradi, A. Poschmann, S. Ling, C. Paar & H. Wang, Pushing the limits: A very compact and a threshold implementation of AES, In: Advances in Cryptology – Eurocrypt 2011, K.G. Patterson ed., Lecture Notes in Computer Science 6632, Springer, pp. 69 – 88 (2011)

30.   L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang & S. Ling, Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster), In: Information Security and Privacy, 16th Australasian Conference, U. Parampalli, P. Hawkes eds., Lecture Notes in Computer Science 6812, Springer, pp. 433 – 438 (2011)

31.   L. Wei, T. Peyrin, P. Sokolowski, S. Ling, J. Pieprzyk & H. Wang, On the (in) security of IDEA in various hashing modes, In: FSE 2012, A. Canteaut ed., Lecture Notes in Computer Science 7549, Springer, pp. 163 – 179 (2012)

32.   R. Steinfeld, S. Ling, J. Pieprzyk, C. Tartary & H. Wang, NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model, In: PKC 2012, M. Fischlin, J. Buchmann & M. Manulis eds., Lecture Notes in Computer Science 7293, Springer, pp. 353 – 371 (2012)

33.   J. Chen, H. Wee, H.W. Lim, S. Ling & H. Wang, Shorter IBE and signatures via asymmetric pairings, In: Pairing-Based Cryptography – Pairing 2012, M. Abdalla & T. Lange eds., Lecture Notes in Computer Science 7708, Springer, pp. 122 – 140 (2012) 

34.   J. Chen, H.W Lim, S. Ling, H. Wang & K. Nguyen, Revocable identity-based encryption from lattices, In: ACISP 2012, W. Susilo, Y. Mu & J. Seberry eds., Lecture Notes in Computer Science 7372, Springer, pp. 390 – 403 (2012)

35.   C.-N. Chen, N. Jacob, S. Kutzner, S. Ling, A. Poschmann & S. Saetang:  Standardized signature algorithms on ultra-constrained 4-bit MCU, In: IWSEC 2012, G. Hanaoka & T. Yamauchi eds., Lecture Notes in Computer Science 7631, Springer, pp. 37 – 50 (2012)

36.   H. Wu, T. Huang, P.H. Nguyen, H. Wang & S. Ling, Differential attacks against stream cipher ZUC, In: Advances in Cryptology – Asiacrypt 2012, X. Wang & K Sako eds., Lecture Notes in Computer Science 7658, Springer, pp. 262 – 277 (2012)

37.   C. Chen, J. Chen, H.W. Lim, Z. Zhang, D. Feng, S. Ling & H. Wang, Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures, In: CT-RSA 2013, E. Dawson ed., Lecture Notes in Computer Science 7779, Springer, pp. 50 – 67 (2013)

38.   N. Jacob, S. Saetang, C.-N. Chen, S. Kutzner, S. Ling & A. Poschmann, Feasibility and practicability of standardized cryptography on 4-bit micro controllers, In: Conference on Selected Areas in Cryptography, 19th International Conference (SAC 2012), L.R. Knudsen & H. Wu eds., Lecture Notes in Computer Science 7707, Springer, pp. 184 – 201 (2013)

39.   S. Ling, K. Nguyen, D. Stehlé & H. Wang: Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications, In: PKC2013, K. Kurosawa & G. Hanaoka eds., Lecture Notes in Computer Science 7778, Springer, pp. 107 – 124 (2013)

40.   L. Su, H.W. Lim, S. Ling & H. Wang: Revocable IBE systems with almost constant-size key update, In: Pairing-based Cryptography – Pairing 2013, Z. Cao & F. Zhang eds., Lecture Notes in Computer Science 8365, Springer, pp. 168 – 185 (2013)

41.   A. Langlois, S. Ling, K. Nguyen & H. Wang, Lattice-based group signature scheme with verifier-local revocation, In: Public Key Cryptography – PKC2014, H. Krawczyk ed., Lecture Notes in Computer Science 8383, Springer, pp. 345 – 361 (2014)

42.   A. Zeh & S. Ling, Decoding of quasi-cyclic codes up to a new lower bound on the minimum distance, International Symposium on Information Theory (ISIT) 2014, pp. 2584 – 2588 (2014) 

43.   S. Ling, D.H. Phan, D. Stehlé & R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, In: Advances in Cryptology – CRYPTO 2014, J. Garay & R Gennaro eds., Lecture Notes in Computer Science 8616, Springer, pp. 315 – 334 (2014) 

44.   S. Emami, S. Ling, I. Nikolic, J. Pieprzyk & H. Wang, Low probability differentials and the cryptanalysis of full-round CLEFIA-128, In: Asiacrypt 2014 Part I, P. Sarkar & T. Iwata eds., Lecture Notes in Computer Science 8873, pp. 141 – 157 (2014) 

45.   S. Ling, K. Nguyen & H. Wang, Group signatures from lattices: simpler, tighter, shorter, ring-based, In: PKC2015, J. Katz ed., Lecture Notes in Computer Science 9020, pp. 427 – 449 (2015) 

46.   A. Zeh & S. Ling, Construction of quasi-cyclic product codes, In: 10th International Conference on Systems, Communications and Coding 2015, to appear

47.   M.F. Ezerman, H.T. Lee, S. Ling, K. Nguyen & H. Wang, A provably secure group signature scheme from code-based assumptions, In: Asiacrypt 2015, T. Iwata & J.H. Cheon eds., Lecture Notes in Computer Science 9452, pp. 260 – 285 (2015)

48.   B. Libert, S. Ling, K. Nguyen & H. Wang, Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors, In: Eurocrypt 2016 Part II, J.-S. Coron & M. Fischlin eds., Lecture Notes in Computer Science 9666, pp. 1 – 31 (2016)   

49.   Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Rates of constant-composition codes that mitigate intercell interference, International Symposium on Information Theory (ISIT), 2016, pp. 200 – 204 (2016)

50.   Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Efficient encoding/decoding of capacity-achieving constant-composition ICI-free codes, International Symposium on Information Theory (ISIT), 2016, pp. 205 – 209 (2016)

51.   A. Zeh & S. Ling, Spectral analysis of quasi-cyclic product codes, International Symposium on Information Theory (ISIT), 2016, pp. 1113 – 1117 (2016) 

52.   Y.M. Chee, H.M. Kiah, S. Ling, T.T. Nguyen, V.K. Vu & X. Zhang, String concatenation construction for Chebyshev permutation channel codes, International Symposium on Information Theory (ISIT), 2016, pp. 2824 – 2828 (2016)

53.   Y. Deng, J. Garay, S. Ling, H. Wang & M. Yung, On the implausibility of constant-round public-coin zero-knowledge proofs, 10th Conference on Security and Cryptography for Networks, to appear

54.   Z. Chang, M.F. Ezerman, S. Ling & H. Wang, The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields, Sequences and Their Applications (SETA), 2016, to appear

55.   B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, In: Advances in Cryptology – Asiacrypt 2016 Part II, J.H. Cheon & T. Takagi eds., Lecture Notes in Computer Science 10032, pp. 101 – 131 (2016)  

56.   B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions, Advances in Cryptology – Asiacrypt 2016 Part II, J.H. Cheon & T. Takagi eds., Lecture Notes in Computer Science 10032, pp. 373 – 403 (2016)

57.   Y.M. Chee, H.M. Kiah, S. Ling & H. Wei, Geometric orthogonal codes better than optical orthogonal codes, International Symposium on Information Theory (ISIT), 2017, to appear

58.   Y.M. Chee, S. Ling, T.H. Nguyen, V.K. Vu & H. Wei, Permutation codes correcting a single burst deletion II: stable deletions, International Symposium on Information Theory (ISIT), 2017, to appear

59.   Y. Xu, S. Ling, K. Nguyen & H. Wang, Lattice-based group signatures: Achieving full dynamicity with ease, 15th International Conference on Applied Cryptography and Network Security, 2017, to appear

Book Chapters

1.     S. Ling, H. Wang & C. Xing, Cover-Free Families and Their Applications. In: Security in Distributed and Networking Systems, Yang Xiao and Yi Pan eds., World Scientific Publishing Co., 2007, pp. 75 – 98

2.     S. Ling, A New Garden of Science in Singapore: Science at Nanyang Technological University. In: 50 Years of Science in Singapore, BTG Tan, Hock Lim and KK Phua eds., World Scientific Publishing Co., 2016, pp. 227 – 235

 

Technology Disclosures & Patents

1.     Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Capacity-achieving constant-composition ICI-free codes. Singapore provisional application number 10201600274R, dated 14 January 2016

Best viewed with Microsoft IE 6.0 and above