What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
San Ling
Google Scholar
ORCID:
0000-0002-1978-3557
39
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
Everlasting Fully Dynamic Group Signatures.
Yimeng He
San Ling
Khai Hanh Tang
Huaxiong Wang
2024
conf/pkc
Fully Dynamic Attribute-Based Signatures for Circuits from Codes.
San Ling
Khoa Nguyen
Duong Hieu Phan
Khai Hanh Tang
Huaxiong Wang
Yanhong Xu
2023
journals/joc
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
Benoît Libert
San Ling
Khoa Nguyen
Huaxiong Wang
2019
journals/tosc
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.
Zhenzhen Bao
Jian Guo
San Ling
Yu Sasaki
2019
conf/ctrsa
Accountable Tracing Signatures from Lattices.
San Ling
Khoa Nguyen
Huaxiong Wang
Yanhong Xu
2019
conf/cans
Threshold Changeable Ramp Secret Sharing.
Fuchun Lin
San Ling
Huaxiong Wang
Neng Zeng
2018
conf/crypto
Lattice-Based Zero-Knowledge Arguments for Integer Relations.
Benoît Libert
San Ling
Khoa Nguyen
Huaxiong Wang
2018
conf/pkc
Constant-Size Group Signatures from Lattices.
San Ling
Khoa Nguyen
Huaxiong Wang
Yanhong Xu
2018
conf/asiacrypt
New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions.
Ling Song
Jian Guo
Danping Shi
San Ling
2017
conf/acns
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease.
San Ling
Khoa Nguyen
Huaxiong Wang
Yanhong Xu
2017
conf/provsec
Revocable Predicate Encryption from Lattices.
San Ling
Khoa Nguyen
Huaxiong Wang
Juanyang Zhang
2017
conf/asiacrypt
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash.
Benoît Libert
San Ling
Khoa Nguyen
Huaxiong Wang
2017
conf/asiacrypt
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.
Benoît Libert
San Ling
Fabrice Mouhartem
Khoa Nguyen
Huaxiong Wang
2016
conf/eurocrypt
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
Benoît Libert
San Ling
Khoa Nguyen
Huaxiong Wang
2016
conf/asiacrypt
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
Benoît Libert
San Ling
Fabrice Mouhartem
Khoa Nguyen
Huaxiong Wang
2016
conf/asiacrypt
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.
Benoît Libert
San Ling
Fabrice Mouhartem
Khoa Nguyen
Huaxiong Wang
2015
conf/pkc
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.
San Ling
Khoa Nguyen
Huaxiong Wang
2015
conf/asiacrypt
A Provably Secure Group Signature Scheme from Code-Based Assumptions.
Martianus Frederic Ezerman
Hyung Tae Lee
San Ling
Khoa Nguyen
Huaxiong Wang
2014
conf/crypto
Hardness of k-LWE and Applications in Traitor Tracing.
San Ling
Duong Hieu Phan
Damien Stehlé
Ron Steinfeld
2014
conf/pkc
Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Adeline Langlois
San Ling
Khoa Nguyen
Huaxiong Wang
2014
conf/asiacrypt
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
Sareh Emami
San Ling
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2013
conf/pkc
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.
San Ling
Khoa Nguyen
Damien Stehlé
Huaxiong Wang
2013
conf/ctrsa
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Cheng Chen
Jie Chen
Hoon Wei Lim
Zhenfeng Zhang
Dengguo Feng
San Ling
Huaxiong Wang
2012
conf/fse
On the (In)Security of IDEA in Various Hashing Modes.
Lei Wei
Thomas Peyrin
Przemyslaw Sokolowski
San Ling
Josef Pieprzyk
Huaxiong Wang
2012
conf/acisp
Revocable Identity-Based Encryption from Lattices.
Jie Chen
Hoon Wei Lim
San Ling
Huaxiong Wang
Khoa Nguyen
2012
conf/pkc
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Ron Steinfeld
San Ling
Josef Pieprzyk
Christophe Tartary
Huaxiong Wang
2012
conf/iwsec
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU.
Chien-Ning Chen
Nisha Jacob
Sebastian Kutzner
San Ling
Axel Poschmann
Sirote Saetang
2012
conf/asiacrypt
Differential Attacks against Stream Cipher ZUC.
Hongjun Wu
Tao Huang
Phuong Ha Nguyen
Huaxiong Wang
San Ling
2012
conf/sacrypt
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers.
Nisha Jacob
Sirote Saetang
Chien-Ning Chen
Sebastian Kutzner
San Ling
Axel Poschmann
2011
journals/joc
Side-Channel Resistant Crypto for Less than 2, 300 GE.
Axel Poschmann
Amir Moradi
Khoongming Khoo
Chu-Wee Lim
Huaxiong Wang
San Ling
2011
conf/acisp
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster).
Lei Wei
Christian Rechberger
Jian Guo
Hongjun Wu
Huaxiong Wang
San Ling
2011
conf/eurocrypt
Pushing the Limits: A Very Compact and a Threshold Implementation of AES.
Amir Moradi
Axel Poschmann
San Ling
Christof Paar
Huaxiong Wang
2010
conf/acisp
On Multidimensional Linear Cryptanalysis.
Phuong Ha Nguyen
Lei Wei
Huaxiong Wang
San Ling
2010
conf/ches
256 Bit Standardized Crypto for 650 GE - GOST Revisited.
Axel Poschmann
San Ling
Huaxiong Wang
2010
conf/asiacrypt
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
Jian Guo
San Ling
Christian Rechberger
Huaxiong Wang
2009
conf/fse
Cryptanalysis of the LAKE Hash Family.
Alex Biryukov
Praveen Gauravaram
Jian Guo
Dmitry Khovratovich
San Ling
Krystian Matusiewicz
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2009
conf/sacrypt
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.
Jian Guo
Krystian Matusiewicz
Lars R. Knudsen
San Ling
Huaxiong Wang
2008
conf/fse
Cryptanalysis of LASH.
Ron Steinfeld
Scott Contini
Krystian Matusiewicz
Josef Pieprzyk
Jian Guo
San Ling
Huaxiong Wang
2008
conf/asiacrypt
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
Zhifang Zhang
Mulan Liu
Yeow Meng Chee
San Ling
Huaxiong Wang
Coauthors
Adeline Langlois
(1)
Alex Biryukov
(1)
Amir Moradi
(2)
Axel Poschmann
(5)
Benoît Libert
(7)
Cheng Chen
(1)
Chien-Ning Chen
(2)
Christian Rechberger
(2)
Christof Paar
(1)
Christophe Tartary
(1)
Chu-Wee Lim
(1)
Damien Stehlé
(2)
Danping Shi
(1)
Dengguo Feng
(1)
Dmitry Khovratovich
(1)
Duong Hieu Phan
(2)
Fabrice Mouhartem
(3)
Fuchun Lin
(1)
Hongjun Wu
(2)
Hoon Wei Lim
(2)
Huaxiong Wang
(34)
Hyung Tae Lee
(1)
Ivica Nikolic
(2)
Jian Guo
(7)
Jie Chen
(2)
Josef Pieprzyk
(5)
Juanyang Zhang
(1)
Khai Hanh Tang
(2)
Khoa Nguyen
(17)
Khoongming Khoo
(1)
Krystian Matusiewicz
(3)
Lars R. Knudsen
(1)
Lei Wei
(3)
Ling Song
(1)
Martianus Frederic Ezerman
(1)
Mulan Liu
(1)
Neng Zeng
(1)
Nisha Jacob
(2)
Phuong Ha Nguyen
(2)
Praveen Gauravaram
(1)
Przemyslaw Sokolowski
(1)
Ron Steinfeld
(3)
San Ling
(39)
Sareh Emami
(1)
Scott Contini
(1)
Sebastian Kutzner
(2)
Sirote Saetang
(2)
Tao Huang
(1)
Thomas Peyrin
(1)
Yanhong Xu
(4)
Yeow Meng Chee
(1)
Yimeng He
(1)
Yu Sasaki
(1)
Zhenfeng Zhang
(1)
Zhenzhen Bao
(1)
Zhifang Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to