S. Ling & J. Oesterlé, The Shimura subgroup of Jo(N). Astérisque196 – 197, 171 – 203 (1991)
S. Ling, Congruences between cusp forms and the geometry of Jacobians of modular curves. Mathematische Annalen295, 111 – 133 (1993)
Y.M. Chee & S. Ling, Projective covering designs. Bulletin of the London Mathematical Society25, 231 – 239 (1993)
S. Ling, Shimura subgroups of Jacobians of Shimura curves. Proceedings of the American Mathematical Society118, 385 – 390 (1993)
S. Ling, The old subvariety of Jo(pq) and the Eisenstein kernel in Jacobians. Israel Journal of Mathematics84, 365 – 384 (1993)
S. Ling, The Fitting ideal of Jo(q)(Fp^n) over the Hecke algebra. Journal of Algebra164, 563 – 575 (1994)
S. Ling, Shimura subgroups and degeneracy maps. Journal of Number Theory54, 39 – 59 (1995)
S. Ling, On the Q-rational cuspidal subgroup and the component group of Jo(pr). Israel Journal of Mathematics 99, 29 – 54 (1997)
S.K. Chua & S. Ling, On the rational cuspidal subgroup and the rational torsion points of Jo(pq). Proceedings of the American Mathematical Society125, 2255 – 2263 (1997)
K.H. Leung, S. Ling, S.L. Ma, K.B. Tay, Almost perfect sequences with q = 2. Archiv der Mathematik70, 128 – 131 (1998)
S. Ling, On component groups of Jo(N) and degeneracy maps. Proceedings of the American Mathematical Society126, 3201 – 3210 (1998)
Y.M. Chee & S. Ling, Combinatorial coverings from geometries over principal ideal rings. Journal of Combinatorial Designs7, 247 – 268 (1999)
S.K. Chua, K.H. Leung & S. Ling, Attack on RSA-type cryptosystems based on singular cubic curves over Z/nZ. Theoretical Computer Science226, 19 – 27 (1999)
K.H. Leung & S. Ling, The rank of a Latin square associated to an abelian group. Communications in Algebra28, 1141 – 1155 (2000)
C. Ding, D.R. Kohel & S. Ling, Elementary 2-group character codes. IEEE Transactions on Information Theory 46, 280 – 284 (2000)
C. Ding, D.R. Kohel & S. Ling, Split group codes. IEEE Transactions on Information Theory46, 485 – 495 (2000)
S. Ling, Component group of the p-new subvariety of Jo(Mp).Israel Journal of Mathematics116, 117 – 123 (2000)
C. Xing & S. Ling, A class of linear codes with good parameters from algebraic curves. IEEE Transactions on Information Theory 46, 1527 – 1532 (2000)
C. Xing & S. Ling, A class of linear codes with good parameters. IEEE Transactions on Information Theory46, 2184 – 2188 (2000)
C. Ding, D.R. Kohel & S. Ling, Secret sharing with a class of ternary codes. Theoretical Computer Science 246, 285 – 298 (2000)
S. Ling, H. Niederreiter & C. Xing, Symmetric polynomials and some good codes. Finite Fields and Their Applications7, 142 – 148 (2001)
C. Khare & S. Ling, Maps between Jacobians of Shimura curves and congruence kernels. Mathematische Annalen319, 383 – 394 (2001)
K.H. Leung, S. Ling & S.L. Ma, Construction of semi-regular relative difference sets. Finite Fields and Their Applications7, 397 – 414 (2001)
S. Ling & P. Solé, Duadic codes over Z2k. IEEE Transactions on Information Theory47, 1581 – 1589 (2001)
H. Chen, S. Ling & C. Xing, Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound. IEEE Transactions on Information Theory47, 2055 – 2058 (2001)
S. Ling & P. Solé, Type II codes over F4 + uF4. European Journal of Combinatorics22, 983 – 997 (2001)
S. Ling & P. Solé, Duadic codes over F2 + uF2. Applicable Algebra in Engineering, Communication and Computing12, 365 – 379 (2001)
S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes I: finite fields. IEEE Transactions on Information Theory47, 2751 – 2760 (2001)
K.H. Leung, S. Ling & C. Xing, New binary linear codes from algebraic curves. IEEE Transactions on Information Theory48, 285 – 287 (2002)
Y.M. Chee & S. Ling, Highly symmetric expanders. Finite Fields and Their Applications8, 294 – 310 (2002)
S. Ling & J.T. Blackford, Zp^{k+1}-linear codes. IEEE Transactions on Information Theory48, 2592 – 2605 (2002)
S. Ling & P. Solé, Good self-dual quasi-cyclic codes exist. IEEE Transactions on Information Theory49, 1052 – 1053 (2003)
S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes II: chain rings. Designs, Codes and Cryptography30, 113 – 130 (2003)
S. Ling & P. Solé, Nonlinear p-ary sequences. Applicable Algebra in Engineering, Communication and Computing14, 117 – 125 (2003)
K.H.D. Chua, A. Tyagi, S. Ling & S.H. Bok, Process-parameter-interface model for design management. Journal of Construction Engineering and Management, ASCE129, 653 – 663 (2003)
F.-W. Fu, S. Ling & C. Xing, New lower bounds and constructions for binary codes correcting asymmetric errors. IEEE Transactions on Information Theory49, 3294 – 3299 (2003)
K. Betsumiya, S. Ling & F. Nemenzo, Type II codes over F2^m + uF2^m. Discrete Mathematics275, 43 – 65 (2004)
S. Ling & C. Xing, Polyadic codes revisited. IEEE Transactions on Information Theory50, 200 – 207 (2004)
S. Ling, A family of group character codes. European Journal of Combinatorics25, 579 – 590 (2004)
J. Lahtonen, S. Ling, P. Solé & D. Zinoviev, Z8-Kerdock codes and pseudorandom binary sequences. J. Complexity20, 318 – 330 (2004)
Y. Tang & S. Ling, On Viterbi-like algorithms and their applications to Reed-Muller codes. J. Complexity20, 438 – 457 (2004)
S. Ling & F. Özbudak, An improvement on the bounds of Weil exponential sums over Galois rings with some applications. IEEE Transactions on Information Theory50, 2529 – 2539 (2004)
F.-W. Fu, S. Ling & C. Xing, On the variance of average distance of subsets in the Hamming space. Discrete Applied Math145, 465 – 478 (2005)
S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes III: generator theory. IEEE Transactions on Information Theory51, 2692 – 2700 (2005)
H. Chen, S. Ling & C. Xing, Quantum codes from concatenated algebraic-geometric codes. IEEE Transactions on Information Theory51, 2915 – 2920 (2005)
S.-T. Xia, F.-W. Fu, Y. Jiang & S. Ling, The probability of undetected error for binary constant weight codes. IEEE Transactions on Information Theory51, 3364 – 3373 (2005)
S. Ling, H. Stichtenoth & S. Yang, A class of Artin-Schreier towers with finite genus, Bull. Brazilian Math. Soc. 36, 393 – 401 (2005)
S. Ling, F. Özbudak & C. Xing, An explicit class of codes with good parameters and their duals, Discrete Applied Math.154, no. 2,346 – 356 (2006)
S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings of characteristic p2, SIAM J Discrete Math. 19, no. 4, 1011 – 1028 (2006)
S. Ling, H. Niederreiter & P. Solé, On the algebraic structure of quasi-cyclic codes IV: repeated roots, Designs, Codes and Cryptography38, no. 3, 337 – 361 (2006)
S. Dougherty & S. Ling, Cyclic codes over Z4 of even length, Designs, Codes and Cryptography39, no. 2, 127 – 153 (2006)
Y. Tang, F.-W. Fu & S. Ling, On the reliability-order-based decoding algorithm for binary linear block codes, IEEE Transactions on Information Theory52, no. 1, 328 – 336 (2006)
K. Feng, S. Ling & C. Xing, Asymptotic bounds on quantum codes from algebraic geometry codes, IEEE Transactions on Information Theory52, no. 3, 986 – 991 (2006)
S. Ling & F. Özbudak, Aperiodic and odd correlations of some p-ary sequences from Galois rings, IEICE Transactions on Fundamentals of Electronics, Communications and Computer SciencesE89-A, no. 9, 2258 – 2263 (2006)
S.-T. Xia, F.-W. Fu & S. Ling, A lower bound on the probability of undetected error for binary constant weight codes, IEEE Transactions on Information Theory52, no. 9, 4235 – 4243 (2006)
Y.M. Chee & S. Ling, Constructions for q-ary constant weight codes, IEEE Transactions on Information Theory53, no. 1, 135 – 146 (2007)
Y.M. Chee, A.C.H. Ling, S. Ling & H. Shen, The PBD-closure of constant composition codes, IEEE Transactions on Information Theory53, no. 8, 2685 – 2692 (2007)
S. Ling & F. Özbudak, Constructions and bounds on linear error-block codes, Designs, Codes and Cryptography45, 297 – 316 (2007)
L. Pu, H. Shen, J. Ma & S. Ling, Cycle systems in the complete bipartite graph plus one factor, SIAM J Discrete Math. 21, no. 4, 1083 – 1092 (2007)
Y.M. Chee & S. Ling, Improved lower bounds for constant GC-content DNA codes, IEEE Transactions on Information Theory54, no. 1, 391 – 394 (2008)
H. Chen, S. Ling & C. Xing, Access structures of elliptic secret sharing schemes, IEEE Transactions on Information Theory 54, no. 2, 850 – 852 (2008)
Y.M. Chee, S.H. Dau, A.C.H. Ling & S. Ling, The sizes of optimal q-ary codes of weight three and distance four: a complete solution, IEEE Transactions on Information Theory54, no. 3, 1291 – 1295 (2008)
S. Ling & F. Özbudak, Some constructions of (t,m,s)-nets with improved parameters, Finite Fields and Their Applications14, 658 – 675 (2008)
H.M. Kiah, K.H. Leung & S. Ling, Cyclic codes over GR(pe, m) of length pk, Finite Fields and Their Applications14, 834 – 846 (2008)
C. Li, Q. Li & S. Ling, Properties and applications of preimage distributions of perfect nonlinear functions, IEEE Transactions on Information Theory55, no. 1, 64 – 69 (2009)
C. Li, S. Ling & L. Qu, On the covering structures of two classes of linear codes from perfect nonlinear functions, IEEE Transactions on Information Theory55, no. 1, 70 – 82 (2009)
C. Li, Q. Li & S. Ling, On the constructions of constant-composition codes from perfect nonlinear functions, Science in ChinaSeries F: Information Sciences 52, no. 6, 964 – 973 (2009)
Y.M. Chee, S.H. Dau, A.C.H. Ling & S. Ling, Linear size optimal q-ary constant-weight codes and constant-composition codes, IEEE Transactions on Information Theory56, no. 1, 140 – 151 (2010)
L. Wang, K. Feng, S. Ling & C. Xing, Asymmetric quantum codes: characterization and constructions, IEEE Transactions on Information Theory 56, no. 6, 2938 – 2945 (2010)
S. Ling, J. Luo & C. Xing, Generalization of Steane’s enlargement construction of quantum codes and applications, IEEE Transactions on Information Theory56, no. 8, 4080 – 4084 (2010)
L. Jin, S. Ling, J. Luo & C. Xing, Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes, IEEE Transactions on Information Theory56, no. 9, 4735 – 4740 (2010)
A. Poschmann, A. Moradi, K. Khoo, C.-W. Lim, H. Wang & S. Ling, Side-channel resistant crypto for less than 2,300 GE, J Cryptology24, no. 2, 322 – 345 (2011)
M.F. Ezerman, S. Ling, P. Solé & O. Yemen, From skew-cyclic codes to asymmetric quantum codes, Advances in Mathematics of Communications5, no. 1, 41 – 57 (2011)
Y. Jia, S. Ling & C. Xing, On self-dual cyclic codes over finite fields, IEEE Transactions on Information Theory57, no. 4, 2243 – 2251 (2011)
A. Pott, Y. Tan, T. Feng & S. Ling, Association schemes arising from bent functions, Designs, Codes and Cryptography59, 319 – 331 (2011)
A.B.F. Edoukou, S. Ling & C. Xing, Structure of functional codes defined on non-degenerate Hermitian varieties, J. Comb Theory, Series A118, 2436 – 2444 (2011)
M.F. Ezerman, S. Ling & P. Solé, Additive asymmetric quantum codes, IEEE Transactions on Information Theory57, no. 8, 5536 – 5550 (2011)
Y.M. Chee, G. Ge, L. Ji, S. Ling & J. Yin, List decodability at small radii, Designs, Codes and Cryptography61, no. 2, 151 – 166 (2011)
C. Tartary, H. Wang & S. Ling, Authentication of digital streams, IEEE Transactions on Information Theory57, no. 9, 6285 – 6303 (2011)
S. Jitman, S. Ling & P. Udomkavanich, Skew constacyclic codes over finite chain rings, Advances in Mathematics of Communications6, no. 1, 39 – 63 (2012)
H.M. Kiah, K.H. Leung & S. Ling, A note on cyclic codes over GR(p2, m) of length pk, Designs, Codes and Cryptography63, no. 1, 105 – 112 (2012)
S. Ling, I.E. Shparlinski, R. Steinfeld & H. Wang, On the modular inversion hidden number problem, J Symbolic Computation47, no. 4, 358 – 367 (2012)
Y.M. Chee, S. Ling, Y. Tan & X. Zhang, Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences, Mathematics of Computation81, 585 – 603 (2012)
E. Ozdemir, S. Ling & C. Xing, Constructing irreducible polynomials over finite fields, Mathematics of Computation 81, no. 279, 1663 – 1668 (2012)
Z. Zhang, Y.M. Chee, S. Ling, M. Liu & H. Wang, Threshold changeable secret sharing schemes revisited, Theoretical Computer Science 418, 106 – 115 (2012)
S. Ling & L. Qu, A note on linearized polynomials and the dimension of their kernels, Finite Fields and their Applications18, no. 1, 56 – 62 (2012)
C. Ding & S. Ling, A q-polynomial approach to cyclic codes, Finite Fields and Their Applications20, no. 1, 1 – 14 (2013)
Y.M. Chee, T. Feng, S. Ling, H. Wang & L.F. Zhang, Query-efficient locally decodable codes of subexponential length, Computational Complexity22, no. 1, 159 – 189 (2013)
S. Jitman, S. Ling, H. Liu & X. Xie, Abelian codes in principal ideal group algebras, IEEE Transactions on Information Theory59, no. 5, 3046 – 3058 (2013)
M.F. Ezerman, S. Jitman, H.M. Kiah & S. Ling, Pure asymmetric quantum MDS codes from CSS construction: a complete characterization, International Journal of Quantum Information11, no. 3, 1350027 (10 pages) (2013)
Y.M. Chee, S. Ling, H. Wang & L.F. Zhang, Upper bounds on matching families in Zpqn, IEEE Transactions on Information Theory59, no. 8, 5131 – 5139 (2013)
X. Yi, S. Ling & H. Wang, Efficient two-server password-only authenticated key exchange, IEEE Transactions on Parallel and Distributed Systems24, no. 9, 1773 – 1782 (2013)
M.F. Ezerman, S. Jitman, S. Ling & D.V. Pasechnik, CSS-like constructions of asymmetric quantum codes, IEEE Transactions on Information Theory59, no. 10, 6732 – 6754 (2013)
F.-W. Fu, S. Ling & C. Xing, New results on two hypercube coloring problems, Discrete Applied Mathematics161, no. 18, 2937 – 2945 (2013)
Y. Tan, L. Qu, S. Ling & C.H. Tan, On the Fourier spectra of new APN functions, SIAM Journal on Discrete Mathematics27, no. 2, 791 – 801 (2013)
J. Chen, H.W. Lim, S. Ling & H. Wang, The relation and transformation between hierarchical inner product encryption and spatial encryption, Designs, Codes and Cryptography71, no. 2, 347 – 364 (2014)
Y. Fan, S. Ling & H. Liu, Matrix product codes over finite commutative Frobenius rings, Designs, Codes and Cryptography 71, no. 2, 201 – 227 (2014)
S. Jitman, S. Ling & P. Solé, Hermitian self-dual abelian codes, IEEE Transactions on Information Theory60, no. 3, 1496 – 1507 (2014)
Y. Fan, S. Ling & H. Liu, Homogeneous weights of matrix product codes over finite principal ideal rings, Finite Fields and Their Applications29, 247 – 267 (2014)
J. Chen, H.W. Lim, S. Ling, L. Su & H. Wang, Spatial encryption supporting non-monotone access structure, Designs, Codes and Cryptography73, no. 3, 731 – 746 (2014)
J. Chen, H.W. Lim, S. Ling, H. Wang & H. Wee, Shorter identity-based encryption via asymmetric pairings, Designs, Codes and Cryptography73, no. 3, 911 – 947 (2014)
S. Ling, I. Shparlinski & H. Wang, On the multidimensional distribution of the Naor-Reingold pseudo-random function, Mathematics of Computation83, no. 289, 2429 – 2434 (2014)
S. Ling, E. Ozdemir & C. Xing, A relation between embedding degrees and class numbers of binary quadratic forms, Mathematics of Computation83, no. 290, 3001 – 3004 (2014)
S. Emami, S. Ling, I. Nikolic, J. Pieprzyk & H. Wang, The resistance of PRESENT-80 against related-key differential attacks, Cryptography & Communications – Discrete Structures, Boolean Functions & Sequences6, no. 3, 171 – 187 (2014)
S. Jitman & S. Ling, Quasi-abelian codes, Designs, Codes and Cryptography 74, no. 3, 511 – 531 (2015)
B. Chen, S. Ling & G. Zhang, Application of constacyclic codes to quantum MDS codes, IEEE Transactions on Information Theory61, no. 3, 1474 – 1484 (2015)
E. Sangwisut, S. Jitman, S. Ling & P. Udomkavanich, Hulls of cyclic and negacyclic codes over finite fields, Finite Fields and Their Applications33, 232 – 257 (2015)
B. Chen, H. Dinh, Y. Fan & S. Ling, Polyadic constacyclic codes, IEEE Transactions on Information Theory61, no. 9, 4895 – 4904 (2015)
S. Jitman, S. Ling & E. Sangwisut, On self-dual cyclic codes of length pa over GR(p2,s), Advances in Mathematics of Communications10, no. 2, 255 – 273 (2016)
A. Zeh & S. Ling, Spectral analysis of quasi-cyclic product codes, IEEE Transactions on Information Theory62, no. 10, 5359 – 5374 (2016)
H.T. Lee, S. Ling, J.H. Seo & H. Wang, CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test, The Computer Journal59, no. 11, 1689 – 1694 (2016)
H.T. Lee, S. Ling & H. Wang, Analysis of Gong et al.’s CCA2-secure homomorphic encryption, Theoretical Computer Science640, 104 – 114 (2016)
H.T. Lee, S. Ling, J.H. Seo & H. Wang, Semi-generic construction of public key encryption and identity-based encryption with equality test, Information Sciences373, 419 – 440 (2016)
B. Chen, L. Lin, S. Ling & H. Liu, Three new classes of optimal frequency-hopping sequence sets, Designs, Codes and Cryptography83, no. 1, 219 – 232 (2017)
B. Chen, L. Lin & S. Ling, External difference families from finite fields, Journal of Combinatorial Designs 25, no. 1, 36 – 48 (2017)
S. Ling, D.H. Phan, D. Stehlé & R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, Algorithmica 79, no. 4, 1318 – 1352 (2017)
M. Kim, H.T. Lee, S. Ling & H. Wang, On the efficiency of FHE-based private queries, IEEE Transactions on Dependable and Secure Computing15, no. 2, 357 – 363 (2018)
Z. Chang, M.F. Ezerman, S. Ling & H. Wang, Construction of de Bruijn sequences from product of two irreducible polynomials, Cryptography and Communications10, no. 2, 251 – 274 (2018)
Z. Chang, M.F. Ezerman, S. Ling & H. Wang, The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields, Cryptography and Communications10, no. 6, 1183 – 1202 (2018)
Y.M. Chee, H.M. Kiah, S. Ling & H. Wei, Geometric orthogonal codes of size larger than optical orthogonal codes, IEEE Transactions on Information Theory64, no. 4, 2883 – 2895 (2018)
S. Ling, K. Nguyen, A. Roux-Langlois & H. Wang, A lattice-based group signature scheme with verifier-local revocation, Theoretical Computer Science730, 1 – 20 (2018)
Z. Chang, M.F. Ezerman, S. Ling & H. Wang, On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials, Designs, Codes and Cryptography85, no. 5, 1137 – 1160 (2019)
Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Capacity-achieving codes that mitigate intercell interference and charge leakage in flash memories, IEEE Transactions on Information Theory60, no. 6, 3702 – 3712 (2019)
B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, Theoretical Computer Science759, 72 – 97 (2019)
Z. Bao, J. Guo, S. Ling & Y. Sasaki, SoK: PEIGEN – a platform for evaluation, implementation, and generation of S-boxes, IACR Transactions on Symmetric Cryptology2019, no. 1, 330 – 394 (2019)
H.T. Lee, S. Ling, J.H. Seo & H. Wang, Public key encryption with equality test from generic assumptions in the random oracle model, Information Sciences500, 15 – 33 (2019)
M. Kim, H.T. Lee, S. Ling, B.H.M. Tan & H. Wang, Private compound wildcard queries using fully homomorphic encryption, IEEE Transactions on Dependable and Secure Computing16, no. 5, 743 – 756 (2019)
Y. Cao, Y. Cao, S.T. Dougherty & S. Ling, Construction and enumeration for self-dual cyclic codes over of oddly even length, Designs, Codes and Cryptography87, no. 10, 2419 – 2446 (2019)
S. Ling & B. Özkaya, Multidimensional quasi-twisted codes: equivalent characterizations and their relationship to multidimensional convolutional codes, Designs, Codes and Cryptography87, no. 12, 2941 – 2965 (2019)
M. Kim, H.T. Lee, S. Ling, S.Q. Ren, B. Tan & H. Wang, Search condition-hiding query evaluation on encrypted databases, IEEE Access7, no. 1, 161283 – 161295 (2019)
S. Ling, K. Nguyen, H. Wang & J. Zhang, Server-aided revocable predicate encryption: formalization and lattice-based instantiation, The Computer Journal 62, no. 12, 1849 – 1862 (2019)
S. Ling, K. Nguyen, H. Wang & Y. Xu, Lattice-based group signatures: achieving full dynamicity (and deniability) with ease, Theoretical Computer Science783, 71 – 94 (2019)
S. Jitman & S. Ling, Self-dual and complementary dual abelian codes over Galois rings, Journal of Algebra Combinatorics Discrete Structures and Applications6, no. 2, 75 – 94 (2019)
Y.M. Chee, S. Ling, T.T. Nguyen, V.K. Vu, H. Wei & X. Zhang, Burst deletion-correction codes for permutations and multipermutations, IEEE Transactions on Information Theory66, no. 2, 957 – 969 (2020)
Z. Li, S. Ling, C. Xing & S.L. Yeo, On the bounded distance decoding problem for lattices constructed and their cryptographic applications, IEEE Transactions on Information Theory 66, no. 4, 2588 – 2598 (2020)
A.M. Bruckstein, M.F. Ezerman, A.A. Fahreza & S. Ling, Holographic sensing, Applied and Computational Harmonic Analysis49, no. 1, 296 – 315 (2020)
J. Hu, Y. Liu, R.C.C. Cheung, S. Bhasin, S. Ling & H. Wang, Compact code-based signature for reconfigurable devices with side channel resilience, IEEE Transactions on Circuits and Systems I: Regular Papers67, no. 7, 2305 – 2316 (2020)
M.F. Ezerman, H.T. Lee, S. Ling, K. Nguyen & H. Wang, Provably secure group signature schemes from code-based assumptions, IEEE Transactions on Information Theory66, no. 9, 5754 – 5773 (2020)
J. Hu, M. Baldi, P. Santini, N. Zeng, S. Ling & H. Wang, Lightweight key encapsulation using LDPC codes on FPGAs, IEEE Transactions on Computers69, no. 3, 327 – 341 (2020)
H.T. Lee, S. Ling, J.H. Seo & H. Wang, Public key encryption with equality test in the standard model, Information Sciences516, 89 – 108 (2020)
Y.M. Chee, D.T. Dao, H.M. Kiah, S. Ling & H. Wei, Robust positioning patterns with low redundancy, SIAM Journal on Computing49, no. 2, 284 – 317 (2020)
X. Cao, B. Chen & S. Ling, Perfect state transfer on Cayley graphs over dihedral groups: the non-normal case, Electronic Journal of Combinatorics27, no. 2, P2.28 (2020)
S. Ling & B. Özkaya, New bounds on the minimum distance of cyclic codes, Advances in Mathematics of Communications15, no. 1, 1 – 8 (2021)
A.M. Bruckstein, M.F. Ezerman, A.A. Fahreza & S. Ling, Patch-based holographic image sensing, SIAM Journal on Imaging Sciences14, no. 1, 198 – 223 (2021)
M.F. Ezerman, J.M. Lampos, S. Ling, B. Ozkaya & J. Tharnnukhroh, A comparison of distance bounds for quasi-twisted codes, IEEE Transactions on Information Theory67, no. 10, 6476 – 6490 (2021)
M.F. Ezerman, Z. Chang, A.A. Fahreza, S. Ling, J. Szmidt & H. Wang, Binary de Bruijn sequences via Zech’s logarithm, SN Computer Science2, article no. 314 (2021)
Y. Cao, Y. Cao, S. Ling & G. Wang, An explicit expression for Euclidean self-dual cyclic codes of length 2k over Galois ring GR(4,m), Finite Fields and Their Applications, 72, 101817 (2021)
G.J. Luo & S. Ling, Application of optimal p-ary linear codes to alphabet-optimal locally recoverable codes, Designs, Codes and Cryptography90, 1271 – 1287 (2022)
B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Adaptive oblivious transfer with access control from lattice assumptions, Theoretical Computer Science891, 210 – 229 (2021)
Y. Cao, Y. Cao, S. Ling & G. Wang, On the construction of self-dual cyclic codes over Z4 with arbitrary even length, Cryptography and Communications14, 1117 – 1143 (2022)
S. Jiang, Y.M. Chee, S. Ling, H. Wang & C. Xing, A new framework for deniable secure key exchange, Information and Computation285, (Part B), 104866 (2022)
G. Luo, X. Cao, M.F. Ezerman & S. Ling, Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications, Advances in Mathematics of Communications16, no. 4, 921 – 933 (2022). DOI: 10.3934/amc.2022070
G. Luo, M.F. Ezerman & S. Ling, Asymmetric quantum Griesmer codes detecting a single bit-flip error, Discrete Mathematics345, no. 12, article 113088 (2022). DOI: 10.1016/j.disc.2022.113088
S. Jitman, S. Ling & J. Tharnnukhroh, Type-II polyadic constacyclic codes over finite fields, Discrete Mathematics, Algorithms and Applications15, no. 2, 2250072 (2023)
G. Luo, M.F. Ezerman & S. Ling, Three new constructions of optimal locally repairable codes from matrix-product codes, IEEE Transactions on Information Theory69, no. 1, 75 – 85 (2023)
B. Chen, S. Ling & H. Liu, Hulls of Reed-Solomon codes via algebraic geometry codes, IEEE Transactions on Information Theory69, no. 2, 1005 – 1014 (2023)
G. Luo, M.F. Ezerman, S. Ling & X. Pan, New families of MDS symbol-pair codes from matrix-product codes, IEEE Transactions on Information Theory 69, no. 3, 1567 – 1587 (2023)
G. Luo, X. Cao, M.F. Ezerman & S. Ling, A construction of maximum distance profile convolutional codes with small alphabet sizes, IEEE Transactions on Information Theory69, no. 5, 2983 – 2990 (2023)
S. Jitman, S. Ling & J. Tharnnukhroh, Generalized negacyclic codes over finite fields, Journal of Applied Mathematics and Computing69, 421 – 449 (2023)
B. Libert, S. Ling, K. Nguyen & H. Wang, Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors, J Cryptology23, no. 3, 23 pages (2023)
G. Luo, M.F. Ezerman, M. Grassl & S. Ling, Constructing quantum error-correcting codes that require a variable amount of entanglement, Quantum Information Processing23, no. 1, article 4 (2024). DOI: 10.1007/s11128-023-04211-x
G. Luo, M.F. Ezerman, S. Ling & B. Özkaya, Improved spectral bound for quasi-cyclic codes, IEEE Transactions on Information Theory70, no. 6, 4002 – 4015 (2024). DOI: 10.1109/TIT.2024.3364489
G. Luo, X. Cao, M.F. Ezerman & S. Ling, On the weights of linear codes with prescribed automorphisms, IEEE Transactions on Information Theory70, no. 7, 4983 – 4989 (2024). DOI: 10.1109/TIT.2023.3347701
G. Luo, L. Sok, M.F. Ezerman & S. Ling, On linear codes whose Hermitian hulls are MDS, IEEE Transactions on Information Theory70, no. 7, 4889 – 4904 (2024). DOI: 10.1109/TIT.2024.3387316
H.M. Kiah, W. Kim, S. Kruglik, S. Ling & H. Wang, Explicit low-bandwidth evaluation schemes for weighted sums of Reed-Solomon-coded symbols, IEEE Transactions on Information Theory70, no. 8, 5552 – 5565 (2024). DOI: 10.1109/TIT.2024.3366817
G. Luo, M.F. Ezerman, C. Güneri, S. Ling & F. Özbudak, Griesmer bound and constructions of linear codes in b-symbol metric, IEEE Transactions on Information Theory, to appear. DOI: 10.1109/TIT.2024.3423702
S. Li, M. Shi & S. Ling, A mass formula for linear codes with prescribed hull dimension and related classification, IEEE Transactions on Information Theory, to appear. DOI: 10.1109/TIT.2024.3425058
S. Li, M. Shi & S. Ling, An open problem and a conjecture on binary linear complementary pairs of codes, IEEE Transactions on Information Theory, to appear. DOI: 10.1109/TIT.2024.3443090
S. Ling, B.H. Seah, E.C. Tan & S.P. Tan, Frequency assignment problems with various constraints. In: Proceedings of International Conference on Communication Systems 94, Singapore, pp. 1085 – 1089 (1994)
K.Y. Lam, L.C.K. Hui & S. Ling, Generating secure elliptic curves for public key cryptosystems. In: Proceedings of Chinacrypt 96, eds. D.Y. Pei, R.J. Zhao and J.J. Zhou, pp. 60 – 64 (1996)
K.Y. Lam, S. Ling & L.C.K. Hui, Efficient generation of elliptic curve cryptosystems. In: Proceedings of 2nd Annual International Computing and Combinatorics Conference, eds. J.Y. Cai and C.-K. Wong, pp. 411 – 416 (1996)
S.K. Chua & S. Ling, A Rabin-type scheme based on y2 = x3 + bx2 mod n. In Computing and Combinatorics, Proceedings of 3rd Annual International Computing and Combinatorics Conference, T. Jiang & D.T. Lee eds, Springer, pp. 186 – 191 (1997)
Y.M. Chee & S. Ling, Algebraic constructions of Ramanujan graphs and highly symmetric expanders. In: Proceedings of the Second Asian Mathematical Conference1995, S Tangmanee & E Schulz eds, World Scientific, pp. 276 – 282 (1998)
D.R. Kohel, S. Ling & C. Xing, Explicit sequence expansions. In: Sequences and their Applications, Proceedings of International Conference on Sequences and their Applications (Singapore, 14 -- 17 Dec 1998), C. Ding, T. Helleseth and H. Niederreiter eds, Springer, pp. 308 – 317 (1999)
C. Ding, D.R. Kohel & S. Ling, Counting the number of points on affine diagonal curves. In: Cryptography and Computational Number Theory, K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing eds., Progress in Computer Science and Applied Logic 20, Birkhäuser Verlag, pp. 15 – 24 (2001)
S. Ling & P. Solé, Decomposing quasi-cyclic codes. In: Proceedings of International Workshop on Coding and Cryptography 2001, D. Augot and C. Carlet eds., pp. 507 – 517 (2001)
S. Ling, Duadic codes. In: Proceedings of 3rd Asian Mathematical Conference 2000, T. Sunada, P.W. Sy and Y. Lo eds., pp. 324 – 336 (2002)
S. Ling, F. Özbudak & C. Xing, An explicit construction of a class of good codes and their duals. In: Proceedings of International Workshop on Coding and Cryptography 2003, D. Augot, P. Charpin and G. Kabatianski eds., pp. 299 – 306 (2003)
S. Ling & P. Solé, Good self-dual quasi-cyclic codes over Fq, q odd. In: Proceedings of Coding, Cryptography and Combinatorics, K. Feng, H. Niederreiter and C. Xing, eds., Progress in Computer Science and Applied Logic 23, Birkhäuser Verlag, pp. 223 – 226 (2004)
F.-W. Fu, S. Ling & C. Xing, Constructions of nonbinary codes correcting t-symmetric errors and detecting all unidirectional errors: magnitude error criterion. In: Proceedings of Coding, Cryptography and Combinatorics, K. Feng, H. Niederreiter and C. Xing, eds., Progress in Computer Science and Applied Logic 23, Birkhäuser Verlag, pp. 139 – 152 (2004)
S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings (Extended Abstract). In: Proceedings of Sequences and Their Applications 2004, pp. 79 – 83 (2004)
S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings (Full Paper). In: Sequences and Their Applications – SETA 2004, T. Helleseth, D. Sarwate, H.-Y. Song, et al eds., LNCS 3486, Springer, pp. 236 – 242 (2005)
S. Ling & F. Özbudak, Improved bounds on Weil sums over Galois rings and homogeneous weights. In: Proceedings of Workshop on Coding and Cryptography 2005, pp. 445 – 453 (2005)
S. Ling & F. Özbudak, On the aperiodic and odd correlations of some p-ary sequences from Galois rings. In: Proceedings of Second International Workshop on Sequence Design and its Applications – IWSDA 05, S. Matsufuji & W.H. Mow eds., pp. 21 – 23 (2005)
S. Ling & F. Özbudak, Improved bounds on Weil sums over Galois rings and homogeneous weights. In: Coding and Cryptography – WCC 2005, Ø Ytrehus ed., Lecture Notes in Computer Science 3969, Springer, pp. 412 – 426 (2006)
S.-T. Xia, F.-W. Fu & S. Ling, A lower bound on the probability of undetected error for binary constant weight codes. In: Proceedings of International Symposium on Information Theory – ISIT 2006, pp. 302 – 306 (2006)
S. Contini, K. Matusiewicz, J. Pieprzyk, R. Steinfeld, J. Guo, S. Ling & H. Wang, Cryptanalysis of LASH. In: Fast Software Encryption 2008, K. Nyberg ed., Lecture Notes in Computer Science 5086, Springer, pp. 207 – 223 (2008)
Y. Lu, H. Wang & S. Ling, Cryptanalysis of Rabbit. In: Information Security, Proceedings of 11th Information Security Conference 2008, T.-C. Wu, C.-L. Lei, V. Rijmen, D.-T. Lee, eds., Lecture Notes in Computer Science 5222, Springer, pp. 204 – 214 (2008)
Z. Zhang, M. Liu, Y.M. Chee, S. Ling & H. Wang, Strongly multiplicative and 3-multiplicative linear secret sharing schemes. In: Advances in Cryptology – Asiacrypt 2008, J. Pieprzyk ed., Lecture Notes in Computer Science 5350, Springer, pp. 19 – 36 (2008)
A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk & H. Wang, Cryptanalysis of the LAKE hash family, In: Fast Software Encryption, 16th International Workshop, O. Dunkelman ed., Lecture Notes in Computer Science 5665, Springer, pp. 156 – 179 (2009)
A. Pott, Y. Tan, T. Feng & S. Ling, Association schemes arising from bent functions. In: Workshop on Coding and Cryptography – WCC 2009, A. Kholosha, E. Rosnes & M. Parker eds., pp. 48 – 61 (2009)
J. Guo, K. Matusiewicz, L.R. Knudsen, S. Ling & H. Wang, Practical pseudo-collisions for hash functions ARIRANG-224/384, In: Selected Areas in Cryptography, 16th International Workshop, M.J. Jacobson, V. Rijmen, R. Safavi-Naini eds., Lecture Notes in Computer Science 5867, Springer, pp. 141 – 156 (2009)
H. Chen, S. Ling, C. Padro, H. Wang & C. Xing, Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes, In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, M. Parker ed., Lecture Notes in Computer Science 5921, Springer, pp. 263 – 277 (2009)
P.H. Nguyen, L. Wei, H. Wang & S. Ling, On multidimensional linear cryptanalysis, In: Information Security and Privacy, 15th Australasian Conference, R. Steinfeld, P. Hawkes eds., Lecture Notes in Computer Science 6168, Springer, pp. 37 – 52 (2010)
A. Poschmann, S. Ling & H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, In: Cryptographic Hardware and Embedded Systems – CHES 2010, 12th International Workshop, S. Mangard, F.-X. Standaert eds., Lecture Notes in Computer Science 6225, Springer, pp. 219 – 233 (2010)
J. Guo, S. Ling, C. Rechberger & H. Wang, Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2, In: Advances in Cryptology – Asiacrypt 2010, M. Abe ed., Lecture Notes in Computer Science 6477, Springer, pp. 56 – 75 (2010)
A. Moradi, A. Poschmann, S. Ling, C. Paar & H. Wang, Pushing the limits: A very compact and a threshold implementation of AES, In: Advances in Cryptology – Eurocrypt 2011, K.G. Patterson ed., Lecture Notes in Computer Science 6632, Springer, pp. 69 – 88 (2011)
L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang & S. Ling, Improved meet-in-the-middle cryptanalysis of KTANTAN (Poster), In: Information Security and Privacy, 16th Australasian Conference, U. Parampalli, P. Hawkes eds., Lecture Notes in Computer Science 6812, Springer, pp. 433 – 438 (2011)
L. Wei, T. Peyrin, P. Sokolowski, S. Ling, J. Pieprzyk & H. Wang, On the (in)security of IDEA in various hashing modes, In: FSE 2012, A. Canteaut ed., Lecture Notes in Computer Science 7549, Springer, pp. 163 – 179 (2012)
R. Steinfeld, S. Ling, J. Pieprzyk, C. Tartary & H. Wang, NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model, In: PKC 2012,M. Fischlin, J. Buchmann & M. Manulis eds., Lecture Notes in Computer Science 7293, Springer, pp. 353 – 371 (2012)
J. Chen, H. Wee, H.W. Lim, S. Ling & H. Wang, Shorter IBE and signatures via asymmetric pairings, In: Pairing-Based Cryptography – Pairing 2012, M. Abdalla & T. Lange eds., Lecture Notes in Computer Science 7708, Springer, pp. 122 – 140 (2012)
J. Chen, H.W Lim, S. Ling, H. Wang & K. Nguyen, Revocable identity-based encryption from lattices, In: ACISP 2012, W. Susilo, Y. Mu & J. Seberry eds., Lecture Notes in Computer Science 7372, Springer, pp. 390 – 403 (2012)
C.-N. Chen, N. Jacob, S. Kutzner, S. Ling, A. Poschmann & S. Saetang: Standardized signature algorithms on ultra-constrained 4-bit MCU, In: IWSEC 2012, G. Hanaoka & T. Yamauchi eds., Lecture Notes in Computer Science 7631, Springer, pp. 37 – 50 (2012)
H. Wu, T. Huang, P.H. Nguyen, H. Wang & S. Ling, Differential attacks against stream cipher ZUC, In: Advances in Cryptology – Asiacrypt 2012, X. Wang & K Sako eds., Lecture Notes in Computer Science 7658, Springer, pp. 262 – 277 (2012)
C. Chen, J. Chen, H.W. Lim, Z. Zhang, D. Feng, S. Ling & H. Wang, Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures, In: CT-RSA 2013, E. Dawson ed., Lecture Notes in Computer Science 7779, Springer, pp. 50 – 67 (2013)
N. Jacob, S. Saetang, C.-N. Chen, S. Kutzner, S. Ling & A. Poschmann, Feasibility and practicability of standardized cryptography on 4-bit micro controllers, In: Conference on Selected Areas in Cryptography, 19th International Conference (SAC 2012), L.R. Knudsen & H. Wu eds., Lecture Notes in Computer Science 7707, Springer, pp. 184 – 201 (2013)
S. Ling, K. Nguyen, D. Stehlé & H. Wang: Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications, In: PKC2013, K. Kurosawa & G. Hanaoka eds., Lecture Notes in Computer Science 7778, Springer, pp. 107 – 124 (2013)
L. Su, H.W. Lim, S. Ling & H. Wang: Revocable IBE systems with almost constant-size key update, In: Pairing-based Cryptography – Pairing 2013, Z. Cao & F. Zhang eds., Lecture Notes in Computer Science 8365, Springer, pp. 168 – 185 (2013)
A. Langlois, S. Ling, K. Nguyen & H. Wang, Lattice-based group signature scheme with verifier-local revocation, In: Public Key Cryptography –PKC2014, H. Krawczyk ed., Lecture Notes in Computer Science 8383, Springer, pp. 345 – 361 (2014)
A. Zeh & S. Ling, Decoding of quasi-cyclic codes up to a new lower bound on the minimum distance, International Symposium on Information Theory (ISIT) 2014, pp. 2584 – 2588 (2014)
S. Ling, D.H. Phan, D. Stehlé & R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, In: Advances in Cryptology – CRYPTO 2014, J. Garay & R Gennaro eds., Lecture Notes in Computer Science 8616, Springer, pp. 315 – 334 (2014)
S. Emami, S. Ling, I. Nikolic, J. Pieprzyk & H. Wang, Low probability differentials and the cryptanalysis of full-round CLEFIA-128, In: Advances in Cryptology – Asiacrypt 2014 Part I, P. Sarkar & T. Iwata eds., Lecture Notes in Computer Science 8873, pp. 141 – 157 (2014)
S. Ling, K. Nguyen & H. Wang, Group signatures from lattices: simpler, tighter, shorter, ring-based, In: PKC2015, J. Katz ed., Lecture Notes in Computer Science 9020, pp. 427 – 449 (2015)
A. Zeh & S. Ling, Construction of quasi-cyclic product codes, In: 10th International ITG Conference on Systems, Communications and Coding 2015, pp. 1 – 6 (2015)
M.F. Ezerman, H.T. Lee, S. Ling, K. Nguyen & H. Wang, A provably secure group signature scheme from code-based assumptions, In: Advances in Cryptology – Asiacrypt 2015, T. Iwata & J.H. Cheon eds., Lecture Notes in Computer Science 9452, pp. 260 – 285 (2015)
B. Libert, S. Ling, K. Nguyen & H. Wang, Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors, In: Advances in Cryptology – Eurocrypt 2016 Part II, J.-S. Coron & M. Fischlin eds., Lecture Notes in Computer Science 9666, pp. 1 – 31 (2016)
Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Rates of constant-composition codes that mitigate intercell interference, In: International Symposium on Information Theory (ISIT), 2016, pp. 200 – 204 (2016)
Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Efficient encoding/decoding of capacity-achieving constant-composition ICI-free codes, In: International Symposium on Information Theory (ISIT), 2016, pp. 205 – 209 (2016)
A. Zeh & S. Ling, Spectral analysis of quasi-cyclic product codes, In: International Symposium on Information Theory (ISIT), 2016, pp. 1113 – 1117 (2016)
Y.M. Chee, H.M. Kiah, S. Ling, T.T. Nguyen, V.K. Vu & X. Zhang, String concatenation construction for Chebyshev permutation channel codes, In: International Symposium on Information Theory (ISIT), 2016, pp. 2824 – 2828 (2016)
Y. Deng, J. Garay, S. Ling, H. Wang & M. Yung, On the implausibility of constant-round public-coin zero-knowledge proofs, In: 10th Conference on Security and Cryptography for Networks, V. Zikas & R. de Prisco eds., Lecture Notes in Computer Science 9841, pp. 237 – 253 (2016)
Z. Chang, M.F. Ezerman, S. Ling & H. Wang, The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields, In: Sequences and Their Applications (SETA), 2016, to appear
B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, In: Advances in Cryptology – Asiacrypt 2016 Part II, J.H. Cheon & T. Takagi eds., Lecture Notes in Computer Science 10032, pp. 101 – 131 (2016)
B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions, In: Advances in Cryptology – Asiacrypt 2016 Part II, J.H. Cheon & T. Takagi eds., Lecture Notes in Computer Science 10032, pp. 373 – 403 (2016)
Y.M. Chee, H.M. Kiah, S. Ling & H. Wei, Geometric orthogonal codes better than optical orthogonal codes, In: International Symposium on Information Theory (ISIT), 2017, pp. 1396 – 1400 (2017)
Y.M. Chee, S. Ling, T.H. Nguyen, V.K. Vu & H. Wei, Permutation codes correcting a single burst deletion II: stable deletions, In: International Symposium on Information Theory (ISIT), 2017, 2693 – 2697 (2017)
Y. Xu, S. Ling, K. Nguyen & H. Wang, Lattice-based group signatures: Achieving full dynamicity with ease, In: 15th International Conference on Applied Cryptography and Network Security, 2017, Lecture Notes in Computer Science 10355, pp. 293 – 312 (2017)
B. Libert, S. Ling, K. Nguyen & H. Wang, Zero-knowledge arguments for lattice-based PRFs and applications to e-cash, In: Advances in Cryptology – Asiacrypt 2017, Lecture Notes in Computer Science 10626, pp. 304 – 335 (2017)
B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Adaptive oblivious transfer with access control from lattice assumptions, In: Advances in Cryptology – Asiacrypt 2017, Lecture Notes in Computer Science 10624, pp. 553 – 563 (2017)
S. Ling, K. Nguyen, H. Wang & Y. Xu, Constant-size group signatures from lattices, In: Public-Key Cryptography – PKC 2018, M. Abdalla & R. Dahab eds., Lecture Notes in Computer Science 10770, pp. 58 – 88 (2018)
B. Libert, S. Ling, K. Nguyen & H. Wang, Lattice-based zero-knowledge arguments for integer relations, In: Advances in Cryptology – CRYPTO 2018, Lecture Notes in Computer Science 10992, pp. 700 – 732 (2018)
L. Song, J. Guo, D. Shi & S. Ling, New MILP modelling: Improved conditional cube attacks on Keccak-based constructions, In: Advances in Cryptology – Asiacrypt 2018, T. Peyrin & S.D. Galbraith eds., Lecture Notes in Computer Science 11273, pp. 65 – 95 (2018)
Y.M. Chee, D.T. Dao, H.M. Kiah, S. Ling & H. Wei, Binary robust positioning patterns with low redundancy and efficient locating algorithms, In: Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithm, T.M. Chan ed., pp. 2171 – 2184 (2019)
S. Ling, K. Nguyen, H. Wang & Y. Xu, Accountable tracing signatures from lattices, In: CT-RSA 2019, In: Topics in Cryptology – CT-RSA 2019, M. Matsui ed., Lecture Notes in Computer Science 11405, pp. 556 – 576 (2019)
S. Ling, K. Nguyen, H. Wang & Y. Xu, Forward-secure group signatures from lattices, In: Post-Quantum Cryptography, J. Ding & R. Steinwandt eds., Lecture Notes in Computer Science 11505, pp. 44 – 64 (2019)
M.F. Ezerman, S. Ling, B. Özkaya & J. Tharnnukhroh, Spectral bounds for quasi-twisted codes, In: International Symposium on Information Theory (ISIT) 2019, 1922 – 1926 (2019)
M.F. Ezerman, S. Ling, B. Özkaya & P. Solé, Good stabilizer codes from quasi-cyclic codes over F4 and F9, In: International Symposium on Information Theory (ISIT) 2019, 2898 – 2902 (2019)
F. Lin, S. Ling, R. Safavi-Naini & H. Wang, Non-malleable coding for arbitrary varying channels, In: 2019 IEEE Information Theory Workshop, pp. 1 – 5 (2019)
F. Lin, S. Ling, H. Wang & N. Zeng, Threshold changeable ramp secret sharing, In: CANS 2019, Y. Mu et al. eds., Lecture Notes in Computer Science 11829, pp. 308 – 327 (2019)
S. Ling, K. Nguyen, D.H. Phan, H. Tang & H. Wang, Zero-knowledge proofs for committed symmetric Boolean functions, In: Post-Quantum Cryptography – PQCrypto 2021, J.H. Cheon & J.-P. Tillich eds., Lecture Notes in Computer Science 12841, pp. 339 – 359 (2021)
Y. Fan, S. Ling, H. Liu & J. Liu, A survey on matrix product codes over finite commutative Frobenius rings, In: Proceedings of the International Congress of Chinese Mathematicians (Beijing 2019), to appear
H.M. Kiah, W. Kim, S. Kruglik, S. Ling & H. Wang, Explicit low-bandwidth evaluation schemes for weighted sums of Reed-Solomon-coded symbols, In: International Symposium on Information Theory (ISIT) 2023, pp. 1973 – 1978 (2023)
S. Kruglik, G. Luo, W. Kim, S. Singhvi, H.M. Kiah, S. Ling & H. Wang, Repair of Reed-Solomon codes in the presence of erroneous nodes, In: International Symposium on Information Theory (ISIT) 2023, pp. 1003 – 1008 (2023)
L. Sok, M.F. Ezerman & S. Ling, Four new families of quantum stabilizer codes from Hermitian self-orthogonal MDS codes, In: 2023 12th International Symposium on Topics in Coding (ISTC), DOI: 10.1109/ISTC57237.2023.10273565
G. Luo, L. Sok. M.F. Ezerman & S. Ling, On propagation rules for entanglement-assisted quantum codes, In: 2023 12th International Symposium on Topics in Coding (ISTC), DOI: 10.1109/ISTC57237.2023.10273555
S. Ling, K. Nguyen, D.H. Phan, K.H. Tang, H. Wang & Y. Xu, Fully dynamic attribute-based signatures for circuits from codes, In: Public Key Cryptography 2024, Lecture Notes in Computer Science 14601, pp. 37 – 73 (2024)
L. Sok, M.F. Ezerman, S. Ling & M. Mams, Entanglement-assisted quantum codes from a class of unitary matrices, In: International Symposium on Information Theory (ISIT) 2024, to appear
S. Ling, K.H. Tang, K. Vu, H. Wang & Y. Yan, Succinct non-subsequence arguments, In: Security & Cryptography for Networks 2024, to appear
L. Sok, M.F. Ezerman & S. Ling, Good entanglement-assisted qubit codes from matrix product codes, In: 2024 Information Theory Workshop, to appear
L. Sok, M.F. Ezerman & S. Ling, On the Hermitian hulls of two-point algebraic geometry codes, In: 2024 Information Theory Workshop, to appear
S. Ling, H. Wang & C. Xing, Cover-Free Families and Their Applications. In: Security in Distributed and Networking Systems, Yang Xiao and Yi Pan eds., World Scientific Publishing Co., 2007, pp. 75 – 98
S. Ling, A New Garden of Science in Singapore: Science at Nanyang Technological University. In: 50 Years of Science in Singapore, BTG Tan, Hock Lim and KK Phua eds., World Scientific Publishing Co., 2016, pp. 227 – 235
C. Güneri, S. Ling & B. Ozkaya, Quasi-Cyclic Codes. In: Concise Encyclopedia of Coding Theory, W.C Huffman, J.-L. Kim & P. Solé eds., CRC Press, 2021, pp. 129 – 149
Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Capacity-achieving constant-composition ICI-free codes. Singapore provisional application number 10201600274R, dated 14 January 2016
H.T. Lee, J.H. Seo, S. Ling & H. Wang, A generic transformation technique from public key encryption with equality test in the random oracle model. South Korea patent application number 10-2019-0023882, dated 9 January 2019