International Refereed Journals
  1. S. Ling & J. Oesterlé, The Shimura subgroup of Jo(N). Astérisque 196197, 171 – 203 (1991)
  2. S. Ling, Congruences between cusp forms and the geometry of Jacobians of modular curves. Mathematische Annalen 295, 111 – 133 (1993)
  3. Y.M. Chee & S. Ling, Projective covering designs. Bulletin of the London Mathematical Society 25, 231 – 239 (1993)
  4. S. Ling, Shimura subgroups of Jacobians of Shimura curves. Proceedings of the American Mathematical Society 118, 385 – 390 (1993)
  5. S. Ling, The old subvariety of Jo(pq) and the Eisenstein kernel in Jacobians. Israel Journal of Mathematics 84, 365 – 384 (1993)
  6. S. Ling, The Fitting ideal of Jo(q)(Fp^n) over the Hecke algebra. Journal of Algebra 164, 563 – 575 (1994)
  7. S. Ling, Shimura subgroups and degeneracy maps. Journal of Number Theory 54, 39 – 59  (1995)
  8. S. Ling, On the Q-rational cuspidal subgroup and the component group of Jo(pr). Israel Journal of Mathematics 99, 29 – 54 (1997)
  9. S.K. Chua & S. Ling, On the rational cuspidal subgroup and the rational torsion points of Jo(pq).  Proceedings of the American Mathematical Society 125, 2255 – 2263  (1997)
  10. K.H. Leung, S. Ling, S.L. Ma, K.B. Tay, Almost perfect sequences with q = 2. Archiv der Mathematik 70, 128 – 131 (1998)
  11. S. Ling, On component groups of Jo(N) and degeneracy maps. Proceedings of the American Mathematical Society 126, 3201 – 3210 (1998)
  12. Y.M. Chee & S. Ling, Combinatorial coverings from geometries over principal ideal rings. Journal of Combinatorial Designs 7, 247 – 268 (1999)
  13. S.K. Chua, K.H. Leung & S. Ling, Attack on RSA-type cryptosystems based on singular cubic curves over Z/nZ. Theoretical Computer Science 226, 19 – 27 (1999)
  14. K.H. Leung & S. Ling, The rank of a Latin square associated to an abelian group. Communications in Algebra 28, 1141 – 1155 (2000)
  15. C. Ding, D.R. Kohel & S. Ling, Elementary 2-group character codes. IEEE Transactions on Information Theory 46, 280 – 284 (2000)
  16. C. Ding, D.R. Kohel & S. Ling, Split group codes. IEEE Transactions on Information Theory 46, 485 – 495 (2000)
  17. S. Ling, Component group of the p-new subvariety of Jo(Mp). Israel Journal of Mathematics 116, 117 – 123 (2000)
  18. C. Xing & S. Ling, A class of linear codes with good parameters from algebraic curves. IEEE Transactions on Information Theory 46, 1527 – 1532 (2000)
  19. C. Xing & S. Ling, A class of linear codes with good parameters. IEEE Transactions on Information Theory 46, 2184 – 2188 (2000)
  20. C. Ding, D.R. Kohel & S. Ling, Secret sharing with a class of ternary codes. Theoretical Computer Science 246, 285 – 298 (2000)
  21. S. Ling, H. Niederreiter & C. Xing, Symmetric polynomials and some good codes. Finite Fields and Their Applications 7, 142 – 148 (2001)
  22. C. Khare & S. Ling, Maps between Jacobians of Shimura curves and congruence kernels. Mathematische Annalen 319, 383 – 394 (2001)
  23. K.H. Leung, S. Ling & S.L. Ma, Construction of semi-regular relative difference sets. Finite Fields and Their Applications 7, 397 – 414 (2001)
  24. S. Ling & P. Solé, Duadic codes over Z2k. IEEE Transactions on Information Theory 47, 1581 – 1589 (2001)
  25. H. Chen, S. Ling & C. Xing, Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound. IEEE Transactions on Information Theory 47, 2055 – 2058 (2001)
  26. S. Ling & P. Solé, Type II codes over F4 + uF4. European Journal of Combinatorics 22, 983 – 997 (2001)
  27. S. Ling & P. Solé, Duadic codes over F2 + uF2. Applicable Algebra in Engineering, Communication and Computing 12, 365 – 379 (2001)
  28. S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes I: finite fields. IEEE Transactions on Information Theory 47, 2751 – 2760 (2001) 
  29. K.H. Leung, S. Ling & C. Xing, New binary linear codes from algebraic curves. IEEE Transactions on Information Theory 48, 285 – 287 (2002)
  30. Y.M. Chee & S. Ling, Highly symmetric expanders. Finite Fields and Their Applications 8, 294 – 310 (2002)
  31. S. Ling & J.T. Blackford, Zp^{k+1}-linear codes. IEEE Transactions on Information Theory 48, 2592 – 2605 (2002)
  32. S. Ling & P. Solé, Good self-dual quasi-cyclic codes exist. IEEE Transactions on Information Theory 49, 1052 – 1053 (2003) 
  33. S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes II: chain rings. Designs, Codes and Cryptography 30, 113 – 130 (2003)
  34. S. Ling & P. Solé, Nonlinear p-ary sequences. Applicable Algebra in Engineering, Communication and Computing 14, 117 – 125 (2003) 
  35. K.H.D. Chua, A. Tyagi, S. Ling & S.H. Bok, Process-parameter-interface model for design management. Journal of Construction Engineering and Management, ASCE 129, 653 – 663 (2003)
  36. F.-W. Fu, S. Ling & C. Xing, New lower bounds and constructions for binary codes correcting asymmetric errors. IEEE Transactions on Information Theory 49, 3294 – 3299 (2003)
  37. K. Betsumiya, S. Ling & F. Nemenzo, Type II codes over F2^m + uF2^m. Discrete Mathematics 275, 43 – 65 (2004)
  38. S. Ling & C. Xing, Polyadic codes revisited. IEEE Transactions on Information Theory 50, 200 – 207 (2004)
  39. S. Ling, A family of group character codes. European Journal of Combinatorics 25, 579 – 590 (2004)
  40. J. Lahtonen, S. Ling, P. Solé & D. Zinoviev, Z8-Kerdock codes and pseudorandom binary sequences. J. Complexity 20, 318 – 330 (2004)
  41. Y. Tang & S. Ling, On Viterbi-like algorithms and their applications to Reed-Muller codes. J. Complexity 20, 438 – 457 (2004)
  42. S. Ling & F. Özbudak, An improvement on the bounds of Weil exponential sums over Galois rings with some applications. IEEE Transactions on Information Theory 50, 2529 – 2539 (2004)  
  43. F.-W. Fu, S. Ling & C. Xing, On the variance of average distance of subsets in the Hamming space. Discrete Applied Math 145, 465 – 478 (2005)
  44. S. Ling & P. Solé, On the algebraic structure of quasi-cyclic codes III: generator theory. IEEE Transactions on Information Theory 51, 2692 – 2700 (2005)
  45. H. Chen, S. Ling & C. Xing, Quantum codes from concatenated algebraic-geometric codes. IEEE Transactions on Information Theory 51, 2915 – 2920 (2005)
  46. S.-T. Xia, F.-W. Fu, Y. Jiang & S. Ling, The probability of undetected error for binary constant weight codes. IEEE Transactions on Information Theory 51, 3364 – 3373 (2005)
  47. S. Ling, H. Stichtenoth & S. Yang, A class of Artin-Schreier towers with finite genus, Bull. Brazilian Math. Soc. 36, 393 – 401 (2005)
  48. S. Ling, F. Özbudak & C. Xing, An explicit class of codes with good parameters and their duals, Discrete Applied Math. 154, no. 2,346 – 356 (2006)  
  49. S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings of characteristic p2, SIAM J Discrete Math. 19, no. 4, 1011 – 1028 (2006)
  50. S. Ling, H. Niederreiter & P. Solé, On the algebraic structure of quasi-cyclic codes IV: repeated roots, Designs, Codes and Cryptography 38, no. 3, 337 – 361 (2006)
  51. S. Dougherty & S. Ling, Cyclic codes over Z4 of even length, Designs, Codes and Cryptography 39, no. 2, 127 – 153 (2006)
  52. Y. Tang, F.-W. Fu & S. Ling, On the reliability-order-based decoding algorithm for binary linear block codes, IEEE Transactions on Information Theory 52, no. 1, 328 – 336 (2006)
  53. K. Feng, S. Ling & C. Xing, Asymptotic bounds on quantum codes from algebraic geometry codes, IEEE Transactions on Information Theory 52, no. 3, 986 – 991 (2006)
  54. S. Ling & F. Özbudak, Aperiodic and odd correlations of some p-ary sequences from Galois rings, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 9, 2258 – 2263 (2006)
  55. S.-T. Xia, F.-W. Fu & S. Ling, A lower bound on the probability of undetected error for binary constant weight codes, IEEE Transactions on Information Theory 52, no. 9, 4235 – 4243 (2006)
  56. Y.M. Chee & S. Ling, Constructions for q-ary constant weight codes, IEEE Transactions on Information Theory 53, no. 1, 135 – 146 (2007)  
  57. Y.M. Chee, A.C.H. Ling, S. Ling & H. Shen, The PBD-closure of constant composition codes, IEEE Transactions on Information Theory 53, no. 8, 2685 – 2692 (2007)
  58. S. Ling & F. Özbudak, Constructions and bounds on linear error-block codes, Designs, Codes and Cryptography 45, 297 – 316 (2007)
  59. L. Pu, H. Shen, J. Ma & S. Ling, Cycle systems in the complete bipartite graph plus one factor, SIAM J Discrete Math. 21, no. 4, 1083 – 1092 (2007)
  60. Y.M. Chee & S. Ling, Improved lower bounds for constant GC-content DNA codes, IEEE Transactions on Information Theory 54, no. 1, 391 – 394 (2008)
  61. H. Chen, S. Ling & C. Xing, Access structures of elliptic secret sharing schemes, IEEE Transactions on Information Theory 54, no. 2, 850 – 852 (2008)   
  62. Y.M. Chee, S.H. Dau, A.C.H. Ling & S. Ling, The sizes of optimal q-ary codes of weight three and distance four: a complete solution, IEEE Transactions on Information Theory 54, no. 3, 1291 – 1295 (2008)
  63. S. Ling & F. Özbudak, Some constructions of (t,m,s)-nets with improved parameters, Finite Fields and Their Applications 14, 658 – 675 (2008)  
  64. H.M. Kiah, K.H. Leung & S. Ling, Cyclic codes over GR(pe, m) of length pk, Finite Fields and Their Applications 14, 834 – 846 (2008)
  65. C. Li, Q. Li & S. Ling, Properties and applications of preimage distributions of perfect nonlinear functions, IEEE Transactions on Information Theory 55, no. 1, 64 – 69 (2009)
  66. C. Li, S. Ling & L. Qu, On the covering structures of two classes of linear codes from perfect nonlinear functions, IEEE Transactions on Information Theory 55, no. 1, 70 – 82 (2009)   
  67. C. Li, Q. Li & S. Ling, On the constructions of constant-composition codes from perfect nonlinear functions, Science in China Series F: Information Sciences 52, no. 6, 964 – 973 (2009)
  68. Y.M. Chee, S.H. Dau, A.C.H. Ling & S. Ling, Linear size optimal q-ary constant-weight codes and constant-composition codes, IEEE Transactions on Information Theory 56, no. 1, 140 – 151 (2010)
  69. L. Wang, K. Feng, S. Ling & C. Xing, Asymmetric quantum codes: characterization and constructions, IEEE Transactions on Information Theory 56, no. 6, 2938 – 2945 (2010)
  70. S. Ling, J. Luo & C. Xing, Generalization of Steane’s enlargement construction of quantum codes and applications, IEEE Transactions on Information Theory 56, no. 8, 4080 – 4084 (2010)
  71. L. Jin, S. Ling, J. Luo & C. Xing, Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes, IEEE Transactions on Information Theory 56, no. 9, 4735 – 4740 (2010)
  72. A. Poschmann, A. Moradi, K. Khoo, C.-W. Lim, H. Wang & S. Ling, Side-channel resistant crypto for less than 2,300 GE, J Cryptology 24, no. 2, 322 – 345 (2011)
  73. M.F. Ezerman, S. Ling, P. Solé & O. Yemen, From skew-cyclic codes to asymmetric quantum codes, Advances in Mathematics of Communications 5, no. 1, 41 – 57 (2011)
  74. Y. Jia, S. Ling & C. Xing, On self-dual cyclic codes over finite fields, IEEE Transactions on Information Theory 57, no. 4, 2243 – 2251 (2011)  
  75. A. Pott, Y. Tan, T. Feng & S. Ling, Association schemes arising from bent functions, Designs, Codes and Cryptography 59, 319 – 331 (2011)
  76. A.B.F. Edoukou, S. Ling & C. Xing, Structure of functional codes defined on non-degenerate Hermitian varieties, J. Comb Theory, Series A 118, 2436 – 2444 (2011)
  77. M.F. Ezerman, S. Ling & P. Solé, Additive asymmetric quantum codes, IEEE Transactions on Information Theory 57, no. 8, 5536 – 5550 (2011)
  78. Y.M. Chee, G. Ge, L. Ji, S. Ling & J. Yin, List decodability at small radii, Designs, Codes and Cryptography 61, no. 2, 151 – 166 (2011)
  79. C. Tartary, H. Wang & S. Ling, Authentication of digital streams, IEEE Transactions on Information Theory 57, no. 9, 6285 – 6303 (2011)
  80. S. Jitman, S. Ling & P. Udomkavanich, Skew constacyclic codes over finite chain rings, Advances in Mathematics of Communications 6, no. 1, 39 – 63 (2012)
  81. H.M. Kiah, K.H. Leung & S. Ling, A note on cyclic codes over GR(p2, m) of length pk, Designs, Codes and Cryptography 63, no. 1, 105 – 112 (2012)
  82. S. Ling, I.E. Shparlinski, R. Steinfeld & H. Wang, On the modular inversion hidden number problem, J Symbolic Computation 47, no. 4, 358 – 367 (2012) 
  83. Y.M. Chee, S. Ling, Y. Tan & X. Zhang, Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences, Mathematics of Computation 81, 585 – 603 (2012)
  84. E. Ozdemir, S. Ling & C. Xing, Constructing irreducible polynomials over finite fields, Mathematics of Computation 81, no. 279, 1663 – 1668 (2012)  
  85. Z. Zhang, Y.M. Chee, S. Ling, M. Liu & H. Wang, Threshold changeable secret sharing schemes revisited, Theoretical Computer Science 418, 106 – 115 (2012)
  86. S. Ling & L. Qu, A note on linearized polynomials and the dimension of their kernels, Finite Fields and their Applications 18, no. 1, 56 – 62 (2012)
  87. C. Ding & S. Ling, A q-polynomial approach to cyclic codes, Finite Fields and Their Applications 20, no. 1, 1 – 14 (2013) 
  88. Y.M. Chee, T. Feng, S. Ling, H. Wang & L.F. Zhang, Query-efficient locally decodable codes of subexponential length, Computational Complexity 22, no. 1, 159 – 189 (2013)
  89. S. Jitman, S. Ling, H. Liu & X. Xie, Abelian codes in principal ideal group algebras, IEEE Transactions on Information Theory 59, no. 5, 3046 – 3058 (2013)
  90. M.F. Ezerman, S. Jitman, H.M. Kiah & S. Ling, Pure asymmetric quantum MDS codes from CSS construction: a complete characterization, International Journal of Quantum Information 11, no. 3, 1350027 (10 pages) (2013)
  91. Y.M. Chee, S. Ling, H. Wang & L.F. Zhang, Upper bounds on matching families in Zpqn, IEEE Transactions on Information Theory 59, no. 8, 5131 – 5139 (2013)
  92. X. Yi, S. Ling & H. Wang, Efficient two-server password-only authenticated key exchange, IEEE Transactions on Parallel and Distributed Systems 24, no. 9, 1773 – 1782 (2013)
  93. M.F. Ezerman, S. Jitman, S. Ling & D.V. Pasechnik, CSS-like constructions of asymmetric quantum codes, IEEE Transactions on Information Theory 59, no. 10, 6732 – 6754 (2013)
  94. F.-W. Fu, S. Ling & C. Xing, New results on two hypercube coloring problems, Discrete Applied Mathematics 161, no. 18, 2937 – 2945 (2013)
  95. Y. Tan, L. Qu, S. Ling & C.H. Tan, On the Fourier spectra of new APN functions, SIAM Journal on Discrete Mathematics 27, no. 2, 791 – 801 (2013)
  96. J. Chen, H.W. Lim, S. Ling & H. Wang, The relation and transformation between hierarchical inner product encryption and spatial encryption, Designs, Codes and Cryptography 71, no. 2, 347 – 364 (2014)
  97. Y. Fan, S. Ling & H. Liu, Matrix product codes over finite commutative Frobenius rings, Designs, Codes and Cryptography 71, no. 2, 201 – 227 (2014)
  98. S. Jitman, S. Ling & P. Solé, Hermitian self-dual abelian codes, IEEE Transactions on Information Theory 60, no. 3, 1496 – 1507 (2014)              
  99. Y. Fan, S. Ling & H. Liu, Homogeneous weights of matrix product codes over finite principal ideal rings, Finite Fields and Their Applications 29, 247 – 267 (2014)
  100. J. Chen, H.W. Lim, S. Ling, L. Su & H. Wang, Spatial encryption supporting non-monotone access structure, Designs, Codes and Cryptography 73, no. 3, 731 – 746 (2014)
  101. J. Chen, H.W. Lim, S. Ling, H. Wang & H. Wee, Shorter identity-based encryption via asymmetric pairings, Designs, Codes and Cryptography 73, no. 3, 911 – 947 (2014)
  102. S. Ling, I. Shparlinski & H. Wang, On the multidimensional distribution of the Naor-Reingold pseudo-random function, Mathematics of Computation 83, no. 289, 2429 – 2434 (2014)
  103. S. Ling, E. Ozdemir & C. Xing, A relation between embedding degrees and class numbers of binary quadratic forms, Mathematics of Computation 83, no. 290, 3001 – 3004 (2014)
  104. S. Emami, S. Ling, I. Nikolic, J. Pieprzyk & H. Wang, The resistance of PRESENT-80 against related-key differential attacks, Cryptography & Communications – Discrete Structures, Boolean Functions & Sequences 6, no. 3, 171 – 187 (2014)
  105. S. Jitman & S. Ling, Quasi-abelian codes, Designs, Codes and Cryptography 74, no. 3, 511 – 531 (2015)
  106. B. Chen, S. Ling & G. Zhang, Application of constacyclic codes to quantum MDS codes, IEEE Transactions on Information Theory 61, no. 3, 1474 – 1484 (2015)
  107. E. Sangwisut, S. Jitman, S. Ling & P. Udomkavanich, Hulls of cyclic and negacyclic codes over finite fields, Finite Fields and Their Applications 33, 232 – 257 (2015)
  108. B. Chen, H. Dinh, Y. Fan & S. Ling, Polyadic constacyclic codes, IEEE Transactions on Information Theory 61, no. 9, 4895 – 4904 (2015)
  109. S. Jitman, S. Ling & E. Sangwisut, On self-dual cyclic codes of length pa over GR(p2,s), Advances in Mathematics of Communications 10, no. 2, 255 – 273 (2016)
  110. A. Zeh & S. Ling, Spectral analysis of quasi-cyclic product codes, IEEE Transactions on Information Theory 62, no. 10, 5359 – 5374 (2016)
  111. H.T. Lee, S. Ling, J.H. Seo & H. Wang, CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test, The Computer Journal 59, no. 11, 1689 – 1694 (2016)
  112. H.T. Lee, S. Ling & H. Wang, Analysis of Gong et al.’s CCA2-secure homomorphic encryption, Theoretical Computer Science 640, 104 – 114 (2016)
  113. H.T. Lee, S. Ling, J.H. Seo & H. Wang, Semi-generic construction of public key encryption and identity-based encryption with equality test, Information Sciences 373, 419 – 440 (2016)
  114. B. Chen, L. Lin, S. Ling & H. Liu, Three new classes of optimal frequency-hopping sequence sets, Designs, Codes and Cryptography 83, no. 1, 219 – 232 (2017)
  115. B. Chen, L. Lin & S. Ling, External difference families from finite fields, Journal of Combinatorial Designs 25, no. 1, 36 – 48 (2017)
  116. S. Ling, D.H. Phan, D. Stehlé & R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, Algorithmica 79, no. 4, 1318 – 1352 (2017)   
  117. M. Kim, H.T. Lee, S. Ling & H. Wang, On the efficiency of FHE-based private queries, IEEE Transactions on Dependable and Secure Computing 15, no. 2, 357 – 363 (2018)  
  118. Z. Chang, M.F. Ezerman, S. Ling & H. Wang, Construction of de Bruijn sequences from product of two irreducible polynomials, Cryptography and Communications 10, no. 2, 251 – 274 (2018)
  119. Z. Chang, M.F. Ezerman, S. Ling & H. Wang, The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields, Cryptography and Communications 10, no. 6, 1183 – 1202 (2018) 
  120. Y.M. Chee, H.M. Kiah, S. Ling & H. Wei, Geometric orthogonal codes of size larger than optical orthogonal codes, IEEE Transactions on Information Theory 64, no. 4, 2883 – 2895 (2018)
  121. S. Ling, K. Nguyen, A. Roux-Langlois & H. Wang, A lattice-based group signature scheme with verifier-local revocation, Theoretical Computer Science 730, 1 – 20 (2018)
  122. Z. Chang, M.F. Ezerman, S. Ling & H. Wang, On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials, Designs, Codes and Cryptography 85, no. 5, 1137 – 1160 (2019)
  123. Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Capacity-achieving codes that mitigate intercell interference and charge leakage in flash memories, IEEE Transactions on Information Theory 60, no. 6, 3702 – 3712 (2019)
  124. B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, Theoretical Computer Science 759, 72 – 97 (2019)
  125. Z. Bao, J. Guo, S. Ling & Y. Sasaki, SoK: PEIGEN – a platform for evaluation, implementation, and generation of S-boxes, IACR Transactions on Symmetric Cryptology 2019, no. 1, 330 – 394 (2019)  
  126. H.T. Lee, S. Ling, J.H. Seo & H. Wang, Public key encryption with equality test from generic assumptions in the random oracle model, Information Sciences 500, 15 – 33 (2019) 
  127. M. Kim, H.T. Lee, S. Ling, B.H.M. Tan & H. Wang, Private compound wildcard queries using fully homomorphic encryption, IEEE Transactions on Dependable and Secure Computing 16, no. 5, 743 – 756 (2019)
  128. Y. Cao, Y. Cao, S.T. Dougherty & S. Ling, Construction and enumeration for self-dual cyclic codes over of oddly even length, Designs, Codes and Cryptography 87, no. 10, 2419 – 2446 (2019)
  129. S. Ling & B. Özkaya, Multidimensional quasi-twisted codes: equivalent characterizations and their relationship to multidimensional convolutional codes, Designs, Codes and Cryptography 87, no. 12, 2941 – 2965 (2019) 
  130. M. Kim, H.T. Lee, S. Ling, S.Q. Ren, B. Tan & H. Wang, Search condition-hiding query evaluation on encrypted databases, IEEE Access 7, no. 1, 161283 – 161295 (2019)
  131. S. Ling, K. Nguyen, H. Wang & J. Zhang, Server-aided revocable predicate encryption: formalization and lattice-based instantiation, The Computer Journal 62, no. 12, 1849 – 1862 (2019)
  132. S. Ling, K. Nguyen, H. Wang & Y. Xu, Lattice-based group signatures: achieving full dynamicity (and deniability) with ease, Theoretical Computer Science 783, 71 – 94 (2019)
  133. S. Jitman & S. Ling, Self-dual and complementary dual abelian codes over Galois rings, Journal of Algebra Combinatorics Discrete Structures and Applications 6, no. 2, 75 – 94 (2019)
  134. Y.M. Chee, S. Ling, T.T. Nguyen, V.K. Vu, H. Wei & X. Zhang, Burst deletion-correction codes for permutations and multipermutations, IEEE Transactions on Information Theory 66, no. 2, 957 – 969 (2020)  
  135. Z. Li, S. Ling, C. Xing & S.L. Yeo, On the bounded distance decoding problem for lattices constructed and their cryptographic applications, IEEE Transactions on Information Theory 66, no. 4, 2588 – 2598 (2020)
  136. A.M. Bruckstein, M.F. Ezerman, A.A. Fahreza & S. Ling, Holographic sensing, Applied and Computational Harmonic Analysis 49, no. 1, 296 – 315 (2020)
  137. J. Hu, Y. Liu, R.C.C. Cheung, S. Bhasin, S. Ling & H. Wang, Compact code-based signature for reconfigurable devices with side channel resilience, IEEE Transactions on Circuits and Systems I: Regular Papers 67, no. 7, 2305 – 2316 (2020)   
  138. M.F. Ezerman, H.T. Lee, S. Ling, K. Nguyen & H. Wang, Provably secure group signature schemes from code-based assumptions, IEEE Transactions on Information Theory 66, no. 9, 5754 – 5773 (2020)
  139. J. Hu, M. Baldi, P. Santini, N. Zeng, S. Ling & H. Wang, Lightweight key encapsulation using LDPC codes on FPGAs, IEEE Transactions on Computers 69, no. 3, 327 – 341 (2020)
  140. H.T. Lee, S. Ling, J.H. Seo & H. Wang, Public key encryption with equality test in the standard model, Information Sciences 516, 89 – 108 (2020)
  141. Y.M. Chee, D.T. Dao, H.M. Kiah, S. Ling & H. Wei, Robust positioning patterns with low redundancy, SIAM Journal on Computing 49, no. 2, 284 – 317 (2020)
  142. X. Cao, B. Chen & S. Ling, Perfect state transfer on Cayley graphs over dihedral groups: the non-normal case, Electronic Journal of Combinatorics 27, no. 2, P2.28 (2020)  
  143. S. Ling & B. Özkaya, New bounds on the minimum distance of cyclic codes, Advances in Mathematics of Communications 15, no. 1, 1 – 8 (2021)
  144. A.M. Bruckstein, M.F. Ezerman, A.A. Fahreza & S. Ling,  Patch-based holographic image sensing, SIAM Journal on Imaging Sciences 14, no. 1, 198 – 223 (2021)
  145. M.F. Ezerman, J.M. Lampos, S. Ling, B. Ozkaya & J. Tharnnukhroh, A comparison of distance bounds for quasi-twisted codes, IEEE Transactions on Information Theory 67, no. 10, 6476 – 6490 (2021)  
  146. M.F. Ezerman, Z. Chang, A.A. Fahreza, S. Ling, J. Szmidt & H. Wang, Binary de Bruijn sequences via Zech’s logarithm, SN Computer Science 2, article no. 314 (2021)
  147. Y. Cao, Y. Cao, S. Ling & G. Wang, An explicit expression for Euclidean self-dual cyclic codes of length 2k over Galois ring GR(4,m), Finite Fields and Their Applications, 72, 101817 (2021)
  148. G.J. Luo & S. Ling, Application of optimal p-ary linear codes to alphabet-optimal locally recoverable codes, Designs, Codes and Cryptography 90, 1271 – 1287 (2022)
  149. B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Adaptive oblivious transfer with access control from lattice assumptions, Theoretical Computer Science 891, 210 – 229 (2021)
  150. Y. Cao, Y. Cao, S. Ling & G. Wang, On the construction of self-dual cyclic codes over Z4 with arbitrary even length, Cryptography and Communications 14, 1117 – 1143 (2022)
  151. S. Jiang, Y.M. Chee, S. Ling, H. Wang & C. Xing, A new framework for deniable secure key exchange, Information and Computation 285, (Part B), 104866 (2022)
  152. S. Jitman, S. Ling & J. Tharnnukhroh, Type-II polyadic constacyclic codes over finite fields, Discrete Mathematics, Algorithms and Applications 15, no. 2, 2250072 (2023)   
  153. G. Luo, M.F. Ezerman & S. Ling, Three new infinite families of optimal locally repairable codes from matrix-product codes, IEEE Transactions on Information Theory 69, no. 1, 75 – 85 (2023)  
  154. B. Chen, S. Ling & H. Liu, Hulls of Reed-Solomon codes via algebraic geometry codes, IEEE Transactions on Information Theory 69, no. 2, 1005 – 1014 (2023)  
  155. G. Luo, M.F. Ezerman, S. Ling & X. Pan, New families of MDS symbol-pair codes from matrix-product codes, IEEE Transactions on Information Theory 69, no. 3, 1567 – 1587 (2023)  
  156. G. Luo, X. Cao, M.F. Ezerman & S. Ling, A construction of maximum distance profile convolutional codes with small alphabet sizes, IEEE Transactions on Information Theory 69, no. 5, 2983 – 2990 (2023)  
  157. S. Jitman, S. Ling & J. Tharnnukhroh, Generalized negacyclic codes over finite fields, Journal of Applied Mathematics and Computing, to appear
  158. G. Luo, M.F. Ezerman & S. Ling, Asymmetric quantum Griesmer codes detecting a single bit-flip error, Discrete Mathematics, to appear
  159. G. Luo, X. Cao, M.F. Ezerman & S. Ling, Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications, Advances in Mathematics of Communications, to appear  
  160. B. Libert, S. Ling, K. Nguyen & H. Wang, Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors, J Cryptology, to appear
  161. G. Luo, M.F. Ezerman, M. Grassl & S. Ling, Constructing quantum error-correcting codes that require a variable amount of entanglement, Quantum Information Processing, to appear  
  162. G. Luo, X. Cao, M.F. Ezerman & S. Ling, On the weights of linear codes with prescribed automorphisms, IEEE Transactions on Information Theory, to appear
  163. G. Luo, M.F. Ezerman, S. Ling & B. Özkaya, Improved spectral bound for quasi-cyclic codes, IEEE Transactions on Information Theory, to appear
  164. H.M. Kiah, W. Kim, S. Kruglik, S. Ling & H. Wang, Explicit low-bandwidth evaluation schemes for weighted sums of Reed-Solomon-coded symbols, IEEE Transactions on Information Theory, to appear

Go to top


Papers in Proceedings of Conferences
  1. S. Ling, B.H. Seah, E.C. Tan & S.P. Tan, Frequency assignment problems with various constraints. In: Proceedings of International Conference on Communication Systems 94, Singapore, pp. 1085 – 1089 (1994)
  2. K.Y. Lam, L.C.K. Hui & S. Ling, Generating secure elliptic curves for public key cryptosystems. In: Proceedings of Chinacrypt 96, eds. D.Y. Pei, R.J. Zhao and J.J. Zhou, pp. 60 – 64 (1996)
  3. K.Y. Lam, S. Ling & L.C.K. Hui, Efficient generation of elliptic curve cryptosystems. In: Proceedings of 2nd Annual International Computing and Combinatorics Conference, eds. J.Y. Cai and C.-K. Wong, pp. 411 – 416 (1996)
  4. S.K. Chua & S. Ling, A Rabin-type scheme based on y2 = x3 + bx2 mod n. In Computing and Combinatorics, Proceedings of 3rd Annual International Computing and Combinatorics Conference, T. Jiang & D.T. Lee eds, Springer, pp. 186 – 191 (1997)
  5. Y.M. Chee & S. Ling, Algebraic constructions of Ramanujan graphs and highly symmetric expanders. In: Proceedings of the Second Asian Mathematical Conference 1995, S Tangmanee & E Schulz eds, World Scientific, pp. 276 – 282 (1998) 
  6. D.R. Kohel, S. Ling & C. Xing, Explicit sequence expansions. In: Sequences and their Applications, Proceedings of International Conference on Sequences and their Applications (Singapore, 14 -- 17 Dec 1998), C. Ding, T. Helleseth and H. Niederreiter eds, Springer, pp. 308 – 317 (1999)
  7. C. Ding, D.R. Kohel & S. Ling, Counting the number of points on affine diagonal curves. In: Cryptography and Computational Number Theory, K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing eds., Progress in Computer Science and Applied Logic 20, Birkhäuser Verlag, pp. 15 – 24 (2001)
  8. S. Ling & P. Solé, Decomposing quasi-cyclic codes. In: Proceedings of International Workshop on Coding and Cryptography 2001, D. Augot and C. Carlet eds., pp. 507 – 517 (2001)
  9. S. Ling, Duadic codes. In: Proceedings of 3rd Asian Mathematical Conference 2000, T. Sunada, P.W. Sy and Y. Lo eds., pp. 324 – 336 (2002)
  10. S. Ling, F. Özbudak & C. Xing, An explicit construction of a class of good codes and their duals. In: Proceedings of International Workshop on Coding and Cryptography 2003, D. Augot, P. Charpin and G. Kabatianski eds., pp. 299 – 306 (2003)
  11. S. Ling & P. Solé, Good self-dual quasi-cyclic codes over Fq, q odd. In: Proceedings of Coding, Cryptography and Combinatorics, K. Feng, H. Niederreiter and C. Xing, eds., Progress in Computer Science and Applied Logic 23, Birkhäuser Verlag, pp. 223 – 226 (2004)
  12. F.-W. Fu, S. Ling & C. Xing, Constructions of nonbinary codes correcting t-symmetric errors and detecting all unidirectional errors: magnitude error criterion. In: Proceedings of Coding, Cryptography and Combinatorics, K. Feng, H. Niederreiter and C. Xing, eds., Progress in Computer Science and Applied Logic 23, Birkhäuser Verlag, pp. 139 – 152 (2004)
  13. S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings (Extended Abstract). In: Proceedings of Sequences and Their Applications 2004, pp. 79 – 83 (2004)
  14. S. Ling & F. Özbudak, Improved p-ary codes and sequence families from Galois rings (Full Paper). In: Sequences and Their Applications – SETA 2004, T. Helleseth, D. Sarwate, H.-Y. Song, et al eds., LNCS 3486, Springer, pp. 236 – 242 (2005)
  15. S. Ling & F. Özbudak, Improved bounds on Weil sums over Galois rings and homogeneous weights. In: Proceedings of Workshop on Coding and Cryptography 2005, pp. 445 – 453 (2005)
  16. S. Ling & F. Özbudak, On the aperiodic and odd correlations of some p-ary sequences from Galois rings. In: Proceedings of Second International Workshop on Sequence Design and its Applications – IWSDA 05, S. Matsufuji & W.H. Mow eds., pp. 21 – 23 (2005)
  17. S. Ling & F. Özbudak, Improved bounds on Weil sums over Galois rings and homogeneous weights. In: Coding and Cryptography – WCC 2005, Ø Ytrehus ed., Lecture Notes in Computer Science 3969, Springer, pp. 412 – 426 (2006)
  18. S.-T. Xia, F.-W. Fu & S. Ling, A lower bound on the probability of undetected error for binary constant weight codes. In: Proceedings of International Symposium on Information Theory – ISIT 2006, pp. 302 – 306 (2006)
  19. S. Contini, K. Matusiewicz, J. Pieprzyk, R. Steinfeld, J. Guo, S. Ling & H. Wang, Cryptanalysis of LASH. In: Fast Software Encryption 2008, K. Nyberg ed., Lecture Notes in Computer Science 5086, Springer, pp. 207 – 223 (2008)
  20. Y. Lu, H. Wang & S. Ling, Cryptanalysis of Rabbit. In: Information Security, Proceedings of 11th Information Security Conference 2008, T.-C. Wu, C.-L. Lei, V. Rijmen, D.-T. Lee, eds., Lecture Notes in Computer Science 5222, Springer, pp. 204 – 214 (2008)  
  21. Z. Zhang, M. Liu, Y.M. Chee, S. Ling & H. Wang, Strongly multiplicative and 3-multiplicative linear secret sharing schemes. In: Advances in CryptologyAsiacrypt 2008, J. Pieprzyk ed., Lecture Notes in Computer Science 5350, Springer, pp. 19 – 36 (2008)  
  22. A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk & H. Wang, Cryptanalysis of the LAKE hash family, In: Fast Software Encryption, 16th International Workshop, O. Dunkelman ed., Lecture Notes in Computer Science 5665, Springer, pp. 156 – 179 (2009)  
  23. A. Pott, Y. Tan, T. Feng & S. Ling, Association schemes arising from bent functions. In: Workshop on Coding and Cryptography – WCC 2009, A. Kholosha, E. Rosnes & M. Parker eds., pp. 48 – 61 (2009)
  24. J. Guo, K. Matusiewicz, L.R. Knudsen, S. Ling & H. Wang, Practical pseudo-collisions for hash functions ARIRANG-224/384, In: Selected Areas in Cryptography, 16th International Workshop, M.J. Jacobson, V. Rijmen, R. Safavi-Naini eds., Lecture Notes in Computer Science 5867, Springer, pp. 141 – 156 (2009) 
  25. H. Chen, S. Ling, C. Padro, H. Wang & C. Xing, Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes, In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, M. Parker ed., Lecture Notes in Computer Science 5921, Springer, pp. 263 – 277 (2009) 
  26. P.H. Nguyen, L. Wei, H. Wang & S. Ling, On multidimensional linear cryptanalysis, In: Information Security and Privacy, 15th Australasian Conference, R. Steinfeld, P. Hawkes eds., Lecture Notes in Computer Science 6168, Springer, pp. 37 – 52 (2010) 
  27. A. Poschmann, S. Ling & H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, In: Cryptographic Hardware and Embedded Systems – CHES 2010, 12th International Workshop, S. Mangard, F.-X. Standaert eds., Lecture Notes in Computer Science 6225, Springer, pp. 219 – 233 (2010)
  28. J. Guo, S. Ling, C. Rechberger & H. Wang, Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2, In: Advances in CryptologyAsiacrypt 2010, M. Abe ed., Lecture Notes in Computer Science 6477, Springer, pp. 56 – 75 (2010)
  29. A. Moradi, A. Poschmann, S. Ling, C. Paar & H. Wang, Pushing the limits: A very compact and a threshold implementation of AES, In: Advances in Cryptology – Eurocrypt 2011, K.G. Patterson ed., Lecture Notes in Computer Science 6632, Springer, pp. 69 – 88 (2011)
  30. L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang & S. Ling, Improved meet-in-the-middle cryptanalysis of KTANTAN (Poster), In: Information Security and Privacy, 16th Australasian Conference, U. Parampalli, P. Hawkes eds., Lecture Notes in Computer Science 6812, Springer, pp. 433 – 438 (2011)
  31. L. Wei, T. Peyrin, P. Sokolowski, S. Ling, J. Pieprzyk & H. Wang, On the (in)security of IDEA in various hashing modes, In: FSE 2012, A. Canteaut ed., Lecture Notes in Computer Science 7549, Springer, pp. 163 – 179 (2012)
  32. R. Steinfeld, S. Ling, J. Pieprzyk, C. Tartary & H. Wang, NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model, In: PKC 2012,M. Fischlin, J. Buchmann & M. Manulis eds., Lecture Notes in Computer Science 7293, Springer, pp. 353 – 371 (2012)
  33. J. Chen, H. Wee, H.W. Lim, S. Ling & H. Wang, Shorter IBE and signatures via asymmetric pairings, In: Pairing-Based Cryptography – Pairing 2012, M. Abdalla & T. Lange eds., Lecture Notes in Computer Science 7708, Springer, pp. 122 – 140 (2012)  
  34. J. Chen, H.W Lim, S. Ling, H. Wang & K. Nguyen, Revocable identity-based encryption from lattices, In: ACISP 2012, W. Susilo, Y. Mu & J. Seberry eds., Lecture Notes in Computer Science 7372, Springer, pp. 390 – 403 (2012)
  35. C.-N. Chen, N. Jacob, S. Kutzner, S. Ling, A. Poschmann & S. Saetang:  Standardized signature algorithms on ultra-constrained 4-bit MCU, In: IWSEC 2012, G. Hanaoka & T. Yamauchi eds., Lecture Notes in Computer Science 7631, Springer, pp. 37 – 50 (2012)
  36. H. Wu, T. Huang, P.H. Nguyen, H. Wang & S. Ling, Differential attacks against stream cipher ZUC, In: Advances in Cryptology – Asiacrypt 2012, X. Wang & K Sako eds., Lecture Notes in Computer Science 7658, Springer, pp. 262 – 277 (2012)
  37. C. Chen, J. Chen, H.W. Lim, Z. Zhang, D. Feng, S. Ling & H. Wang, Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures, In: CT-RSA 2013, E. Dawson ed., Lecture Notes in Computer Science 7779, Springer, pp. 50 – 67 (2013)
  38. N. Jacob, S. Saetang, C.-N. Chen, S. Kutzner, S. Ling & A. Poschmann, Feasibility and practicability of standardized cryptography on 4-bit micro controllers, In: Conference on Selected Areas in Cryptography, 19th International Conference (SAC 2012), L.R. Knudsen & H. Wu eds., Lecture Notes in Computer Science 7707, Springer, pp. 184 – 201 (2013)
  39. S. Ling, K. Nguyen, D. Stehlé & H. Wang: Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications, In: PKC2013, K. Kurosawa & G. Hanaoka eds., Lecture Notes in Computer Science 7778, Springer, pp. 107 – 124 (2013)
  40. L. Su, H.W. Lim, S. Ling & H. Wang: Revocable IBE systems with almost constant-size key update, In: Pairing-based Cryptography – Pairing 2013, Z. Cao & F. Zhang eds., Lecture Notes in Computer Science 8365, Springer, pp. 168 – 185 (2013)
  41. A. Langlois, S. Ling, K. Nguyen & H. Wang, Lattice-based group signature scheme with verifier-local revocation, In: Public Key Cryptography – PKC2014, H. Krawczyk ed., Lecture Notes in Computer Science 8383, Springer, pp. 345 – 361 (2014)
  42. A. Zeh & S. Ling, Decoding of quasi-cyclic codes up to a new lower bound on the minimum distance, International Symposium on Information Theory (ISIT) 2014, pp. 2584 – 2588 (2014)  
  43. S. Ling, D.H. Phan, D. Stehlé & R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, In: Advances in CryptologyCRYPTO 2014, J. Garay & R Gennaro eds., Lecture Notes in Computer Science 8616, Springer, pp. 315 – 334 (2014)  
  44. S. Emami, S. Ling, I. Nikolic, J. Pieprzyk & H. Wang, Low probability differentials and the cryptanalysis of full-round CLEFIA-128, In: Advances in Cryptology – Asiacrypt 2014 Part I, P. Sarkar & T. Iwata eds., Lecture Notes in Computer Science 8873, pp. 141 – 157 (2014) 
  45. S. Ling, K. Nguyen & H. Wang, Group signatures from lattices: simpler, tighter, shorter, ring-based, In: PKC2015, J. Katz ed., Lecture Notes in Computer Science 9020, pp. 427 – 449 (2015)  
  46. A. Zeh & S. Ling, Construction of quasi-cyclic product codes, In: 10th International ITG Conference on Systems, Communications and Coding 2015, pp. 1 – 6 (2015)     
  47. M.F. Ezerman, H.T. Lee, S. Ling, K. Nguyen & H. Wang, A provably secure group signature scheme from code-based assumptions, In: Advances in Cryptology – Asiacrypt 2015, T. Iwata & J.H. Cheon eds., Lecture Notes in Computer Science 9452, pp. 260 – 285 (2015)
  48. B. Libert, S. Ling, K. Nguyen & H. Wang, Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors, In: Advances in Cryptology – Eurocrypt 2016 Part II, J.-S. Coron & M. Fischlin eds., Lecture Notes in Computer Science 9666, pp. 1 – 31 (2016)    
  49. Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Rates of constant-composition codes that mitigate intercell interference, In: International Symposium on Information Theory (ISIT), 2016, pp. 200 – 204 (2016)
  50. Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Efficient encoding/decoding of capacity-achieving constant-composition ICI-free codes, In: International Symposium on Information Theory (ISIT), 2016, pp. 205 – 209 (2016)
  51. A. Zeh & S. Ling, Spectral analysis of quasi-cyclic product codes, In: International Symposium on Information Theory (ISIT), 2016, pp. 1113 – 1117 (2016) 
  52. Y.M. Chee, H.M. Kiah, S. Ling, T.T. Nguyen, V.K. Vu & X. Zhang, String concatenation construction for Chebyshev permutation channel codes, In: International Symposium on Information Theory (ISIT), 2016, pp. 2824 – 2828 (2016)
  53. Y. Deng, J. Garay, S. Ling, H. Wang & M. Yung, On the implausibility of constant-round public-coin zero-knowledge proofs, In: 10th Conference on Security and Cryptography for Networks, V. Zikas & R. de Prisco eds., Lecture Notes in Computer Science 9841, pp. 237 – 253 (2016)  
  54. Z. Chang, M.F. Ezerman, S. Ling & H. Wang, The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields, In: Sequences and Their Applications (SETA), 2016, to appear
  55. B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, In: Advances in Cryptology – Asiacrypt 2016 Part II, J.H. Cheon & T. Takagi eds., Lecture Notes in Computer Science 10032, pp. 101 – 131 (2016) 
  56. B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions, In: Advances in Cryptology – Asiacrypt 2016 Part II, J.H. Cheon & T. Takagi eds., Lecture Notes in Computer Science 10032, pp. 373 – 403 (2016)
  57. Y.M. Chee, H.M. Kiah, S. Ling & H. Wei, Geometric orthogonal codes better than optical orthogonal codes, In: International Symposium on Information Theory (ISIT), 2017, pp. 1396 – 1400 (2017)  
  58. Y.M. Chee, S. Ling, T.H. Nguyen, V.K. Vu & H. Wei, Permutation codes correcting a single burst deletion II: stable deletions, In: International Symposium on Information Theory (ISIT), 2017, 2693 – 2697 (2017)
  59. Y. Xu, S. Ling, K. Nguyen & H. Wang, Lattice-based group signatures: Achieving full dynamicity with ease, In: 15th International Conference on Applied Cryptography and Network Security, 2017, Lecture Notes in Computer Science 10355, pp. 293 – 312 (2017)
  60. B. Libert, S. Ling, K. Nguyen & H. Wang, Zero-knowledge arguments for lattice-based PRFs and applications to e-cash, In: Advances in Cryptology – Asiacrypt 2017, Lecture Notes in Computer Science 10626, pp. 304 – 335 (2017)
  61. B. Libert, S. Ling, F. Mouhartem, K. Nguyen & H. Wang, Adaptive oblivious transfer with access control from lattice assumptions, In: Advances in Cryptology – Asiacrypt 2017, Lecture Notes in Computer Science 10624, pp. 553 – 563 (2017)
  62. S. Ling, K. Nguyen, H. Wang & Y. Xu, Constant-size group signatures from lattices, In: Public-Key CryptographyPKC 2018, M. Abdalla & R. Dahab eds., Lecture Notes in Computer Science 10770, pp. 58 – 88 (2018)
  63. B. Libert, S. Ling, K. Nguyen & H. Wang, Lattice-based zero-knowledge arguments for integer relations, In: Advances in Cryptology – CRYPTO 2018, Lecture Notes in Computer Science 10992, pp. 700 – 732 (2018)  
  64. L. Song, J. Guo, D. Shi & S. Ling, New MILP modelling: Improved conditional cube attacks on Keccak-based constructions, In: Advances in Cryptology – Asiacrypt 2018, T. Peyrin & S.D. Galbraith eds., Lecture Notes in Computer Science 11273, pp. 65 – 95 (2018)
  65. Y.M. Chee, D.T. Dao, H.M. Kiah, S. Ling & H. Wei, Binary robust positioning patterns with low redundancy and efficient locating algorithms, In: Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithm, T.M. Chan ed., pp. 2171 – 2184 (2019)
  66. S. Ling, K. Nguyen, H. Wang & Y. Xu, Accountable tracing signatures from lattices, In: CT-RSA 2019, In: Topics in Cryptology – CT-RSA 2019, M. Matsui ed., Lecture Notes in Computer Science 11405, pp. 556 – 576 (2019)   
  67. S. Ling, K. Nguyen, H. Wang & Y. Xu, Forward-secure group signatures from lattices, In: Post-Quantum Cryptography, J. Ding & R. Steinwandt eds., Lecture Notes in Computer Science 11505, pp. 44 – 64 (2019)
  68. M.F. Ezerman, S. Ling, B. Özkaya & J. Tharnnukhroh, Spectral bounds for quasi-twisted codes, In: International Symposium on Information Theory (ISIT) 2019, 1922 – 1926 (2019)
  69. M.F. Ezerman, S. Ling, B. Özkaya & P. Solé, Good stabilizer codes from quasi-cyclic codes over F4 and F9, In: International Symposium on Information Theory (ISIT) 2019, 2898 – 2902 (2019)
  70. F. Lin, S. Ling, R. Safavi-Naini & H. Wang, Non-malleable coding for arbitrary varying channels, In: 2019 IEEE Information Theory Workshop, pp. 1 – 5 (2019)
  71. F. Lin, S. Ling, H. Wang & N. Zeng, Threshold changeable ramp secret sharing, In: CANS 2019, Y. Mu et al. eds., Lecture Notes in Computer Science 11829, pp. 308 – 327 (2019)
  72. S. Ling, K. Nguyen, D.H. Phan, H. Tang & H. Wang, Zero-knowledge proofs for committed symmetric Boolean functions, In: Post-Quantum Cryptography – PQCrypto 2021, J.H. Cheon & J.-P. Tillich eds., Lecture Notes in Computer Science 12841, pp. 339 – 359 (2021)
  73. Y. Fan, S. Ling, H. Liu & J. Liu, A survey on matrix product codes over finite commutative Frobenius rings, In: Proceedings of the International Congress of Chinese Mathematicians (Beijing 2019), to appear
  74. H.M. Kiah, W. Kim, S. Kruglik, S. Ling & H. Wang, Explicit low-bandwidth evaluation schemes for weighted sums of Reed-Solomon-coded symbols, In: International Symposium on Information Theory (ISIT) 2023, to appear
  75. S. Kruglik, G. Luo, W. Kim, S. Singhvi, H.M. Kiah, S. Ling & H. Wang, Repair of Reed-Solomon codes in the presence of erroneous nodes, In: International Symposium on Information Theory (ISIT) 2023, to appear
  76. L. Sok, M.F. Ezerman & S. Ling, Four new families of quantum stabilizer codes from Hermitian self-orthogonal MDS codes, In: 2023 12th International Symposium on Topics in Coding (ISTC), to appear
  77. G. Luo, L. Sok. M.F. Ezerman & S. Ling, On propagation rules for entanglement-assisted quantum codes, In: 2023 12th International Symposium on Topics in Coding (ISTC), to appear
  78. S. Ling, K. Nguyen, D.H. Phan, K.H. Tang, H. Wang & Y. Xu, Fully dynamic attribute-based signatures for circuits from codes, In: Public Key Cryptography 2024, to appear

Go to top


Book Chapters
  1. S. Ling, H. Wang & C. Xing, Cover-Free Families and Their Applications. In: Security in Distributed and Networking Systems, Yang Xiao and Yi Pan eds., World Scientific Publishing Co., 2007, pp. 75 – 98
  2. S. Ling, A New Garden of Science in Singapore: Science at Nanyang Technological University. In: 50 Years of Science in Singapore, BTG Tan, Hock Lim and KK Phua eds., World Scientific Publishing Co., 2016, pp. 227 – 235
  3. C. Güneri, S. Ling & B. Ozkaya, Quasi-Cyclic Codes. In: Concise Encyclopedia of Coding Theory, W.C Huffman, J.-L. Kim & P. Solé eds., CRC Press, 2021, pp. 129 – 149

Go to top


Technology Disclosures & Patents
  1. Y.M. Chee, J. Chrisnata, H.M. Kiah, S. Ling, T.T. Nguyen & V.K. Vu, Capacity-achieving constant-composition ICI-free codes. Singapore provisional application number 10201600274R, dated 14 January 2016
  2. H.T. Lee, J.H. Seo, S. Ling & H. Wang, A generic transformation technique from public key encryption with equality test in the random oracle model. South Korea patent application number 10-2019-0023882, dated 9 January 2019

Go to top