default search action
Sze Ling Yeo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c8]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. EUROCRYPT (1) 2022: 611-641 - [i9]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. IACR Cryptol. ePrint Arch. 2022: 771 (2022) - 2021
- [j13]Sze Ling Yeo, Duc-Phong Le, Khoongming Khoo:
Improved algebraic attacks on lightweight block ciphers. J. Cryptogr. Eng. 11(1): 1-19 (2021) - [c7]Soumik Mondal, Sze Ling Yeo, Arulmurugan Ambikapathi:
H-Stegonet: A Hybrid Deep Learning Framework for Robust Steganalysis. ICME 2021: 1-6 - [i8]Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo:
Algebraic Differential Fault Analysis on SIMON block cipher. IACR Cryptol. ePrint Arch. 2021: 436 (2021) - 2020
- [j12]Ming-Deh A. Huang, Michiel Kosters, Christophe Petit, Sze Ling Yeo, Yang Yun:
Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem. J. Math. Cryptol. 14(1): 25-38 (2020) - [j11]Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo:
On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications. IEEE Trans. Inf. Theory 66(4): 2588-2598 (2020) - [i7]Zhe Li, Chaoping Xing, Sze Ling Yeo:
A New Code Based Signature Scheme without Trapdoors. IACR Cryptol. ePrint Arch. 2020: 1250 (2020)
2010 – 2019
- 2019
- [j10]Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo:
Algebraic Differential Fault Analysis on SIMON Block Cipher. IEEE Trans. Computers 68(11): 1561-1572 (2019) - [c6]Zhe Li, Chaoping Xing, Sze Ling Yeo:
Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations. Public Key Cryptography (2) 2019: 599-617 - 2018
- [j9]Ming-Deh A. Huang, Michiel Kosters, Yun Yang, Sze Ling Yeo:
On the last fall degree of zero-dimensional Weil descent systems. J. Symb. Comput. 87: 207-226 (2018) - [c5]Duc-Phong Le, Huasong Meng, Le Su, Sze Ling Yeo, Vrizlynn L. L. Thing:
BIFF: A Blockchain-based IoT Forensics Framework with Identity Privacy. TENCON 2018: 2372-2377 - [i6]Zhe Li, Chaoping Xing, Sze Ling Yeo:
Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via Permutations. IACR Cryptol. ePrint Arch. 2018: 1029 (2018) - 2017
- [c4]Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. ACNS 2017: 253-272 - [c3]Sze Ling Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low:
An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis. ACNS 2017: 518-536 - [i5]Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo:
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications. CoRR abs/1710.02265 (2017) - [i4]Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo:
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications. IACR Cryptol. ePrint Arch. 2017: 1002 (2017) - 2016
- [j8]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - 2015
- [c2]Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP. CRYPTO (1) 2015: 581-600 - [i3]Ming-Deh A. Huang, Michiel Kosters, Yun Yang, Sze Ling Yeo:
On the last fall degree of zero-dimensional Weil descent systems. CoRR abs/1505.02532 (2015) - [i2]Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:
Last fall degree, HFE, and Weil descent attacks on ECDLP. IACR Cryptol. ePrint Arch. 2015: 573 (2015) - 2014
- [j7]Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng, Matt Henricksen:
Security analysis of GCM for communication. Secur. Commun. Networks 7(5): 854-864 (2014) - [j6]Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng, Matt Henricksen:
Parallelizable MAC revisited. Secur. Commun. Networks 7(7): 1115-1127 (2014) - 2013
- [j5]Sze Ling Yeo, Wun-She Yap, Joseph K. Liu, Matt Henricksen:
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions". IEEE Commun. Lett. 17(8): 1521-1523 (2013) - [j4]Alp Bassa, Liming Ma, Chaoping Xing, Sze Ling Yeo:
Towards a characterization of subfields of the Deligne-Lusztig function fields. J. Comb. Theory A 120(7): 1351-1371 (2013) - 2011
- [j3]Chaoping Xing, Sze Ling Yeo:
A Gilbert-Varshamov-type bound for lattice packings. J. Comb. Theory A 118(3): 938-948 (2011) - [c1]Wun-She Yap, Sze Ling Yeo, Chee Hoo Yian:
Cryptanalysis of the full CHAIN cipher. IAS 2011: 40-45 - 2010
- [j2]Yeow Meng Chee, Chaoping Xing, Sze Ling Yeo:
New constant-weight codes from propagation rules. IEEE Trans. Inf. Theory 56(4): 1596-1599 (2010) - [i1]Yeow Meng Chee, Chaoping Xing, Sze Ling Yeo:
New Constant-Weight Codes from Propagation Rules. CoRR abs/1008.1610 (2010)
2000 – 2009
- 2007
- [j1]Chaoping Xing, Sze Ling Yeo:
New Linear Codes and Algebraic Function Fields Over Finite Fields. IEEE Trans. Inf. Theory 53(12): 4822-4825 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-27 17:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint