


default search action
Chik How Tan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i17]Chik How Tan, Theo Fanuela Prabowo, Wei-Guo Foo:
Ratio Attack on G+G Convoluted Gaussian Signature. CoRR abs/2501.12009 (2025) - 2024
- [j65]Chik How Tan, Theo Fanuela Prabowo
:
A new key recovery attack on a code-based signature from the Lyubashevsky framework. Inf. Process. Lett. 183: 106422 (2024) - [j64]Wei Jie Ng, Chik How Tan:
Depth-measurement trade-off for quantum search on block ciphers. Quantum Inf. Process. 23(4): 151 (2024) - [c59]Chik How Tan, Theo Fanuela Prabowo:
Lee Metric Code-Based Signature. ISITA 2024: 308-313 - [i16]Theo Fanuela Prabowo, Chik How Tan:
Concrete Analysis of Schnorr-type Signatures with Aborts. IACR Cryptol. ePrint Arch. 2024: 1256 (2024) - 2023
- [j63]Terry Shue Chien Lau, Chik How Tan:
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems. Adv. Math. Commun. 17(2): 353-366 (2023) - [c58]Theo Fanuela Prabowo
, Chik How Tan
:
Attack on a Code-Based Signature Scheme from QC-LDPC Codes. C2SI 2023: 136-149 - [c57]Chik How Tan
, Theo Fanuela Prabowo
:
High Weight Code-Based Signature Scheme from QC-LDPC Codes. ICISC (1) 2023: 306-323 - 2022
- [j62]Terry Shue Chien Lau
, Chik How Tan:
On the design and security of Lee metric McEliece cryptosystems. Des. Codes Cryptogr. 90(3): 695-717 (2022) - [j61]Yanjun Li
, Haibin Kan
, Sihem Mesnager
, Jie Peng
, Chik How Tan, Lijing Zheng:
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences. IEEE Trans. Inf. Theory 68(4): 2735-2751 (2022) - [c56]Theo Fanuela Prabowo
, Chik How Tan
:
Provably Secure Password-Authenticated Key Exchange Based on SIDH. WISA 2022: 16-28 - [i15]Jon-Lark Kim, Jihoon Hong, Terry Shue Chien Lau, YounJae Lim, Chik How Tan, Theo Fanuela Prabowo, Byung-Sun Won:
REDOG and Its Performance Analysis. IACR Cryptol. ePrint Arch. 2022: 1663 (2022) - 2021
- [j60]Terry Shue Chien Lau
, Chik How Tan, Theo Fanuela Prabowo
:
On the security of the modified Dual-ouroboros PKE using Gabidulin codes. Appl. Algebra Eng. Commun. Comput. 32(6): 681-699 (2021) - [j59]Yanjun Li
, Haibin Kan, Jie Peng, Chik How Tan, Baixiang Liu:
A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1353-1356 (2021) - [j58]Yanjun Li
, Haibin Kan, Jie Peng, Chik How Tan, Baixiang Liu:
The Explicit Dual of Leander's Monomial Bent Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1357-1360 (2021) - [j57]Yanjun Li
, Jie Peng, Chik How Tan, Haibin Kan, Lijing Zheng
:
Further constructions of bent functions and their duals. IET Inf. Secur. 15(1): 87-97 (2021) - 2020
- [j56]Yanjun Li
, Haibin Kan
, Jie Peng, Chik How Tan:
SAO 1-Resilient Functions With Lower Absolute Indicator in Even Variables. IEEE Access 8: 222377-222384 (2020) - [j55]Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville
, Philippe Gaborit, Terry Shue Chien Lau
, Chik How Tan, Keita Xagawa
:
Cryptanalysis of a rank-based signature with short public keys. Des. Codes Cryptogr. 88(4): 643-653 (2020) - [j54]Yanjun Li
, Jie Peng, Chik How Tan:
An answer to an open problem of Mesnager on bent functions. Inf. Process. Lett. 161: 105974 (2020) - [c55]Terry Shue Chien Lau
, Chik How Tan:
MURAVE: A New Rank Code-Based Signature with MUltiple RAnk VErification. CBCrypto 2020: 94-116 - [c54]Chik How Tan, Theo Fanuela Prabowo
:
Error-Free Lattice-Based Key Encapsulation Mechanism Based on Ring-LWE. FPS 2020: 163-179 - [c53]Terry Shue Chien Lau, Chik How Tan:
Rank Preserving Code-based Signature. ISIT 2020: 846-851
2010 – 2019
- 2019
- [j53]Duc-Phong Le
, Nadia El Mrabet
, Safia Haloui, Chik How Tan:
On the near prime-order MNT curves. Appl. Algebra Eng. Commun. Comput. 30(2): 107-125 (2019) - [j52]Terry Shue Chien Lau
, Chik How Tan:
New rank codes based encryption scheme using partial circulant matrices. Des. Codes Cryptogr. 87(12): 2979-2999 (2019) - [c52]Terry Shue Chien Lau
, Chik How Tan:
Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem. ACISP 2019: 211-228 - [c51]Terry Shue Chien Lau
, Chik How Tan:
A New Gabidulin-Like Code and Its Application in Cryptography. C2SI 2019: 269-287 - [c50]Terry Shue Chien Lau
, Chik How Tan, Theo Fanuela Prabowo
:
Key Recovery Attacks on Some Rank Metric Code-Based Signatures. IMACC 2019: 215-235 - [i14]Terry Shue Chien Lau, Chik How Tan:
Key Recovery Attack on Rank Quasi-Cyclic Code-based Signature Scheme. CoRR abs/1902.00241 (2019) - [i13]Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo:
Analysis of TPL Signature Scheme. IACR Cryptol. ePrint Arch. 2019: 303 (2019) - 2018
- [j51]Terry Shue Chien Lau
, Chik How Tan:
A New Technique in Rank Metric Code-Based Encryption. Cryptogr. 2(4): 32 (2018) - [j50]Qichun Wang, Chik How Tan, Theo Fanuela Prabowo
:
On the covering radius of the third order Reed-Muller code RM(3, 7). Des. Codes Cryptogr. 86(1): 151-159 (2018) - [j49]Jie Peng, Chik How Tan, Qichun Wang, Jianhua Gao, Haibin Kan:
More New Classes of Differentially 4-Uniform Permutations with Good Cryptographic Properties. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(6): 945-952 (2018) - [c49]Terry Shue Chien Lau
, Chik How Tan:
A New Encryption Scheme Based on Rank Metric Codes. ACISP 2018: 750-758 - [c48]Theo Fanuela Prabowo
, Chik How Tan:
Almost Orthogonal MDS Matrices over GR(2n, k). ISIT 2018: 2416-2420 - [c47]Chik How Tan, Theo Fanuela Prabowo
, Terry Shue Chien Lau:
Rank Metric Code-based Signature. ISITA 2018: 70-74 - [c46]Terry Shue Chien Lau
, Chik How Tan:
Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation. IWSEC 2018: 19-34 - [i12]Duc-Phong Le, Nadia El Mrabet, Safia Haloui, Chik How Tan:
On the near prime-order MNT curves. CoRR abs/1806.02536 (2018) - 2017
- [j48]Jie Peng, Chik How Tan:
New differentially 4-uniform permutations by modifying the inverse function on subfields. Cryptogr. Commun. 9(3): 363-378 (2017) - [j47]Jie Peng, Chik How Tan, Qichun Wang:
New secondary constructions of differentially 4-uniform permutations over. Int. J. Comput. Math. 94(8): 1670-1693 (2017) - [c45]Theo Fanuela Prabowo
, Chik How Tan:
Generating Complete Edwards Curves. ACISP (2) 2017: 335-348 - [c44]Chik How Tan, Theo Fanuela Prabowo
:
Orthogonal MDS Diffusion Matrices over Galois Rings. IMACC 2017: 307-330 - 2016
- [j46]Duc-Phong Le
, Chik How Tan:
Further refinements of Miller's algorithm on Edwards curves. Appl. Algebra Eng. Commun. Comput. 27(3): 205-217 (2016) - [j45]Qichun Wang, Chik How Tan:
Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences. Discret. Appl. Math. 211: 217-221 (2016) - [j44]Qichun Wang, Chik How Tan:
On the second-order nonlinearity of the hidden weighted bit function. Discret. Appl. Math. 215: 197-202 (2016) - [j43]Jie Peng, Chik How Tan:
New explicit constructions of differentially 4-uniform permutations via special partitions of F22k. Finite Fields Their Appl. 40: 73-89 (2016) - [j42]Chik How Tan, Theo Fanuela Prabowo
, Duc-Phong Le
:
Breaking an ID-based encryption based on discrete logarithm and factorization problems. Inf. Process. Lett. 116(2): 116-119 (2016) - [c43]Theo Fanuela Prabowo
, Chik How Tan:
Implicit Quadratic Property of Differentially 4-Uniform Permutations. INDOCRYPT 2016: 364-379 - [c42]Wenbin Zhang, Chik How Tan:
On the Security and Key Generation of the ZHFE Encryption Scheme. IWSEC 2016: 289-304 - [i11]Wenbin Zhang, Chik How Tan:
On the Security and Key Generation of the ZHFE Encryption Scheme. IACR Cryptol. ePrint Arch. 2016: 637 (2016) - 2015
- [j41]Jong H. Chung, Pantelimon Stanica, Chik How Tan, Qichun Wang:
A construction of Boolean functions with good cryptographic properties. Int. J. Comput. Math. 92(4): 700-711 (2015) - [c41]Duc-Phong Le
, Nadia El Mrabet, Chik How Tan:
On Near Prime-Order Elliptic Curves with Small Embedding Degrees. CAI 2015: 140-151 - [c40]Wenbin Zhang, Chik How Tan:
A Secure Variant of Yasuda, Takagi and Sakurai's Signature Scheme. Inscrypt 2015: 75-89 - [c39]Wenbin Zhang, Chik How Tan:
MI-T-HFE, A New Multivariate Signature Scheme. IMACC 2015: 43-56 - [c38]Qichun Wang, Chik How Tan:
New bounds on the imbalance of a half-l-sequence. ISIT 2015: 2688-2691 - [c37]Duc-Phong Le
, Chik How Tan, Michael Tunstall
:
Randomizing the Montgomery Powering Ladder. WISTP 2015: 169-184 - [i10]Duc-Phong Le, Chik How Tan, Michael Tunstall:
Randomizing the Montgomery Powering Ladder. IACR Cryptol. ePrint Arch. 2015: 657 (2015) - [i9]Duc-Phong Le, Nadia El Mrabet, Chik How Tan:
On near prime-order elliptic curves with small embedding degrees. IACR Cryptol. ePrint Arch. 2015: 835 (2015) - [i8]Wenbin Zhang, Chik How Tan:
MI-T-HFE, a New Multivariate Signature Scheme. IACR Cryptol. ePrint Arch. 2015: 890 (2015) - [i7]Wenbin Zhang, Chik How Tan:
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces. IACR Cryptol. ePrint Arch. 2015: 1005 (2015) - 2014
- [j40]Qichun Wang, Chik How Tan, Pantelimon Stanica:
Concatenations of the hidden weighted bit function and their cryptographic properties. Adv. Math. Commun. 8(2): 153-165 (2014) - [j39]Qichun Wang, Chik How Tan:
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity. Discret. Appl. Math. 167: 25-32 (2014) - [j38]Qichun Wang, Claude Carlet, Pantelimon Stanica, Chik How Tan:
Cryptographic properties of the hidden weighted bit function. Discret. Appl. Math. 174: 1-10 (2014) - [j37]Carl Bracken, Chik How Tan, Yin Tan:
On a class of quadratic polynomials with no zeros and its application to APN functions. Finite Fields Their Appl. 25: 26-36 (2014) - [j36]Duc-Phong Le
, Chik How Tan:
Improved Miller's Algorithm for Computing Pairings on Edwards Curves. IEEE Trans. Computers 63(10): 2626-2632 (2014) - [j35]Guomin Yang
, Chik How Tan, Yi Mu, Willy Susilo
, Duncan S. Wong:
Identity based identification from algebraic coding theory. Theor. Comput. Sci. 520: 51-61 (2014) - [c36]Wenbin Zhang, Chik How Tan:
A new perturbed matsumoto-imai signature scheme. AsiaPKC@AsiaCCS 2014: 43-48 - [c35]Duc-Phong Le
, Matthieu Rivain, Chik How Tan:
On Double Exponentiation for Securing RSA against Fault Analysis. CT-RSA 2014: 152-168 - [c34]Wenbin Zhang, Chik How Tan:
Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme. ICISC 2014: 53-66 - [c33]Qichun Wang, Chik How Tan:
Cryptographic boolean functions with a large number of variables. ISIT 2014: 1534-1538 - [c32]Qichun Wang, Chik How Tan:
Properties of a Family of Cryptographic Boolean Functions. SETA 2014: 34-46 - [i6]Jie Peng, Chik How Tan, Qichun Wang:
A new construction of differentially 4-uniform permutations over $F_{2^{2k}}$. CoRR abs/1407.4884 (2014) - [i5]Cunsheng Ding, Chik How Tan, Yin Tan:
Six Constructions of Difference Families. CoRR abs/1411.3643 (2014) - 2013
- [j34]Qichun Wang, Chik How Tan:
A new method to construct Boolean functions with good cryptographic properties. Inf. Process. Lett. 113(14-16): 567-571 (2013) - [j33]Yin Tan, Longjiang Qu
, San Ling
, Chik How Tan:
On the Fourier Spectra of New APN Functions. SIAM J. Discret. Math. 27(2): 791-801 (2013) - [j32]Longjiang Qu
, Yin Tan, Chik How Tan, Chao Li:
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method. IEEE Trans. Inf. Theory 59(7): 4675-4686 (2013) - [c31]Qichun Wang, Chik How Tan, Timothy Foo:
A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function. ICISC 2013: 311-322 - [i4]Duc-Phong Le, Chik How Tan:
Speeding up Ate Pairing Computation in Affine Coordinates. IACR Cryptol. ePrint Arch. 2013: 119 (2013) - 2012
- [j31]Carl Bracken, Chik How Tan, Yin Tan:
Binomial differentially 4 uniform permutations with high nonlinearity. Finite Fields Their Appl. 18(3): 537-546 (2012) - [j30]Heng Huat Chan, Elisavet Konstantinou, Aristides Kontogeorgis
, Chik How Tan:
What is your "birthday elliptic curve"? Finite Fields Their Appl. 18(6): 1232-1241 (2012) - [j29]Qichun Wang, Chik How Tan:
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions. Inf. Process. Lett. 112(22): 869-871 (2012) - [c30]Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo
, Thomas Peyrin
, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks. AFRICACRYPT 2012: 270-286 - [c29]Khoongming Khoo, Chik How Tan:
New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers. AsiaCCS 2012: 20-21 - [c28]Duc-Phong Le
, Chik How Tan:
Speeding Up Ate Pairing Computation in Affine Coordinates. ICISC 2012: 262-277 - [c27]Yin Tan, Longjiang Qu, Chik How Tan, Chao Li:
New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$. SETA 2012: 25-39 - [i3]Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks. IACR Cryptol. ePrint Arch. 2012: 234 (2012) - 2011
- [j28]Chik How Tan, Siong-Thye Goh
:
Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 165-171 (2011) - [j27]Guomin Yang
, Chik How Tan:
Certificateless public key encryption: A new generic construction and two pairing-free schemes. Theor. Comput. Sci. 412(8-10): 662-674 (2011) - [j26]Guomin Yang
, Chik How Tan:
Certificateless cryptography with KGC trust level 3. Theor. Comput. Sci. 412(39): 5446-5457 (2011) - [c26]Guomin Yang
, Chik How Tan:
Strongly secure certificateless key exchange without pairing. AsiaCCS 2011: 71-79 - [c25]Guomin Yang
, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. Financial Cryptography 2011: 113-126 - [c24]Duc-Phong Le
, Chik How Tan:
Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves. IMACC 2011: 327-343 - [c23]Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan:
A Comparison of Post-Processing Techniques for Biased Random Number Generators. WISTP 2011: 175-190 - [i2]Carl Bracken, Chik How Tan, Yin Tan:
On a Class of Quadratic Polynomials with no Zeros and its Application to APN Functions. CoRR abs/1110.3177 (2011) - [i1]Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. IACR Cryptol. ePrint Arch. 2011: 688 (2011) - 2010
- [j25]Chik How Tan, Guomin Yang
:
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting". IEEE Trans. Inf. Theory 56(11): 5887-5888 (2010) - [c22]Guomin Yang
, Chik How Tan:
Dynamic Group Key Exchange Revisited. CANS 2010: 261-277 - [c21]Guomin Yang
, Chik How Tan, Qiong Huang, Duncan S. Wong:
Probabilistic Public Key Encryption with Equality Test. CT-RSA 2010: 119-131
2000 – 2009
- 2009
- [j24]Knut Wold, Chik How Tan:
Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings. Int. J. Reconfigurable Comput. 2009: 501672:1-501672:8 (2009) - 2008
- [j23]Chik How Tan:
On the Security of Provably Secure Multi-Receiver ID-Based Signcryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1836-1838 (2008) - [j22]Chik How Tan:
Secure public-key encryption scheme without random oracles. Inf. Sci. 178(17): 3435-3442 (2008) - [c20]Chik How Tan:
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. ARES 2008: 1275-1281 - [c19]Chik How Tan:
Signcryption Scheme in Multi-user Setting without Random Oracles. IWSEC 2008: 64-82 - [c18]Knut Wold, Chik How Tan:
Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings. ReConFig 2008: 385-390 - 2007
- [j21]Chik How Tan:
Security Analysis of Joint Group Key Agreement Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1876-1878 (2007) - [j20]Chik How Tan:
Forgery of Provable Secure Short Signcryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1879-1880 (2007) - [j19]Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng:
Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks. Telecommun. Syst. 35(3-4): 141-160 (2007) - [c17]Chik How Tan:
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. ARES 2007: 1148-1154 - [c16]Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen:
Authenticated Broadcast Encryption Scheme. AINA Workshops (1) 2007: 512-518 - [c15]Chik How Tan, Joseph Chee Ming Teo:
Protection AgainstWeb-based Password Phishing. ITNG 2007: 754-759 - [c14]Joseph Chee Ming Teo, Chik How Tan:
Denial-of-service resilience password-based group key agreement for wireless networks. Q2SWinet 2007: 136-143 - [c13]Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng:
Authenticated Group Key Agreement Against DoS in Heterogeneous Wireless Networks. WCNC 2007: 3563-3568 - 2006
- [j18]Chik How Tan:
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 206-208 (2006) - [j17]Chik How Tan:
Signature Scheme in Multi-User Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1339-1345 (2006) - [j16]Joseph Chee Ming Teo, Chik How Tan:
Authenticated Dynamic Group Key Agreement for Autoconfigurable Mobile Ad Hoc Networks. IEICE Trans. Commun. 89-B(9): 2480-2492 (2006) - [j15]Chik How Tan:
On Waters' Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(10): 2684-2685 (2006) - [j14]Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng:
Security Analysis of Provably Secure Constant Round Dynamic Group Key Agreement. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(11): 3348-3350 (2006) - [j13]Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng:
Low-power authenticated group key agreement for heterogeneous wireless networks. Int. J. Secur. Networks 1(3/4): 226-236 (2006) - [j12]Chik How Tan:
A new signature scheme without random oracles. Int. J. Secur. Networks 1(3/4): 237-242 (2006) - [j11]Chik How Tan:
Analysis of improved signcryption scheme with key privacy. Inf. Process. Lett. 99(4): 135-138 (2006) - [c12]Tarjei K. Mandt, Chik How Tan:
Certificateless Authenticated Two-Party Key Agreement Protocols. ASIAN 2006: 37-44 - [c11]Chik How Tan, Joseph Chee Ming Teo:
Energy-efficient ID-based group key agreement protocols for wireless networks. IPDPS 2006 - [c10]Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng:
Low-power group key agreement for heterogeneous wireless networks. IWCMC 2006: 177-182 - [c9]Chik How Tan:
A secure signature scheme. IWCMC 2006: 195-200 - [c8]Chik How Tan:
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. IWSEC 2006: 292-307 - [c7]Chik How Tan:
Public-Key Encryption from ID-Based Encryption Without One-Time Signature. OTM Workshops (1) 2006: 450-459 - 2005
- [j10]Chik How Tan:
Key Substitution Attacks on Provably Secure Short Signature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(2): 611-612 (2005) - [j9]Chik How Tan:
On the Security of Signcryption Scheme with Key Privacy. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(4): 1093-1095 (2005) - [c6]Xiaosong Hou, Chik How Tan:
A New Electronic Cash Model. ITCC (1) 2005: 374-379 - [c5]Joseph Chee Ming Teo, Chik How Tan:
Energy-efficient and scalable group key agreement for large ad hoc networks. PE-WASUN 2005: 114-121 - [c4]Chik How Tan, Joseph Chee Ming Teo:
An authenticated group key agreement for wireless networks. WCNC 2005: 2100-2105 - 2004
- [j8]Chik How Tan:
Key Substitution Attacks on Some Provably Secure Signature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 226-227 (2004) - 2003
- [j7]Chik How Tan, Xun Yi, Chee Kheong Siew:
On the n-th Order Shift Register Based Discrete Logarithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1213-1216 (2003) - [j6]Chik How Tan, Xun Yi, Chee Kheong Siew:
A New Provably Secure Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(10): 2633-2635 (2003) - [j5]Xun Yi, Chee Kheong Siew, Chik How Tan:
A secure and efficient conference scheme for mobile communications. IEEE Trans. Veh. Technol. 52(4): 784-793 (2003) - [j4]Xun Yi, Chee Kheong Siew, Chik How Tan, Yiming Ye:
A secure conference scheme for mobile communications. IEEE Trans. Wirel. Commun. 2(6): 1168-1177 (2003) - [c3]Chik How Tan, Xun Yi, Chee Kheong Siew:
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. ACISP 2003: 428-442 - 2002
- [j3]Chik How Tan, Xun Yi, Chee Kheong Siew:
New Signature Schemes Based on 3rd Order Shift Registers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 102-109 (2002) - [j2]Xun Yi, Chik How Tan, Chee Kheong Siew, Syed Mahbubur Rahman:
ID-based key agreement for multimedia encryption. IEEE Trans. Consumer Electron. 48(2): 298-303 (2002) - 2001
- [j1]Xun Yi, Chik How Tan, Chee Kheong Siew, Syed Mahbubur Rahman:
Fast encryption for multimedia. IEEE Trans. Consumer Electron. 47(1): 101-107 (2001) - [c2]Chik How Tan, Xun Yi, Chee Kheong Siew:
Signature Schemes Based on 3rd Order Shift Registers. ACISP 2001: 445-459
1990 – 1999
- 1998
- [c1]Chik How Tan:
Period and Linear Complexity of Cascaded Clock-Controlled Generators. SETA 1998: 371-378
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-11 21:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint