Cayley graph on symmetric group generated by elements fixing k points CY Ku, T Lau, KB Wong Linear Algebra and its Applications 471, 405-426, 2015 | 29 | 2015 |
Key recovery attack on McNie based on low rank parity check codes and its reparation TSC Lau, CH Tan Advances in Information and Computer Security: 13th International Workshop …, 2018 | 16 | 2018 |
A new encryption scheme for multivariate quadratic systems J Chen, J Ning, J Ling, TSC Lau, Y Wang Theoretical Computer Science 809, 372-383, 2020 | 14 | 2020 |
Security issues of novel RSA variant A Nitaj, MRBK Ariffin, NNH Adenan, TSC Lau, J Chen IEEE Access 10, 53788-53796, 2022 | 12 | 2022 |
Key recovery attacks on some rank metric code-based signatures TSC Lau, CH Tan, TF Prabowo IMA International Conference on Cryptography and Coding, 215-235, 2019 | 12 | 2019 |
A new technique in rank metric code-based encryption TSC Lau, CH Tan Cryptography 2 (4), 32, 2018 | 12 | 2018 |
Cryptanalysis of a rank-based signature with short public keys N Aragon, O Blazy, JC Deneuville, P Gaborit, TSC Lau, CH Tan, ... Designs, Codes and Cryptography 88, 643-653, 2020 | 11 | 2020 |
New rank codes based encryption scheme using partial circulant matrices TSC Lau, CH Tan Designs, Codes and Cryptography 87 (12), 2979-2999, 2019 | 11 | 2019 |
Largest independent sets of certain regular subgraphs of the derangement graph CY Ku, T Lau, KB Wong Journal of Algebraic Combinatorics 44, 81-98, 2016 | 11 | 2016 |
The smallest eigenvalues of the 1-point fixing graph CY Ku, T Lau, KB Wong Linear Algebra and its Applications 493, 433-446, 2016 | 10 | 2016 |
On the security of the modified Dual-ouroboros PKE using Gabidulin codes TSC Lau, CH Tan, TF Prabowo Applicable Algebra in Engineering, Communication and Computing 32 (6), 681-699, 2021 | 9 | 2021 |
REDOG and its performance analysis JL Kim, J Hong, TSC Lau, YJ Lim, BS Won Cryptology ePrint Archive, 2022 | 8 | 2022 |
MURAVE: A new rank code-based signature with multiple rank verification TSC Lau, CH Tan Code-Based Cryptography Workshop, 94-116, 2020 | 8 | 2020 |
A new Gabidulin-like code and its application in cryptography TSC Lau, CH Tan International Conference on Codes, Cryptology, and Information Security, 269-287, 2019 | 5 | 2019 |
Rank metric code-based signature CH Tan, TF Prabowo, TSC Lau 2018 International Symposium on Information Theory and Its Applications …, 2018 | 5 | 2018 |
A new encryption scheme based on rank metric codes TSC Lau, CH Tan Australasian conference on information security and privacy, 750-758, 2018 | 5 | 2018 |
The spectrum of eigenvalues for certain subgraphs of the k-point fixing graph CY Ku, T Lau, KB Wong Linear Algebra and its Applications 543, 72-91, 2018 | 5 | 2018 |
On the partition associated to the smallest eigenvalues of the k-point fixing graph CY Ku, T Lau, KB Wong European Journal of Combinatorics 63, 70-94, 2017 | 5 | 2017 |
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems. TSC Lau, CH Tan Adv. Math. Commun. 17 (2), 353-366, 2023 | 4 | 2023 |
An IND-CPA analysis of a cryptosystem based on bivariate polynomial reconstruction problem SN Yusof, MR Kamel Ariffin, TSC Lau, NR Salim, SC Yip, TTV Yap Axioms 12 (3), 304, 2023 | 3 | 2023 |