default search action
Tung Chou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Daniel J. Bernstein, Tung Chou:
CryptAttackTester: high-assurance attack analysis. CRYPTO (6) 2024: 141-182 - [c15]Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
Reducing Signature Size of Matrix-Code-Based Signature Schemes. PQCrypto (1) 2024: 107-134 - [i20]Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
Reducing Signature Size of Matrix-code-based Signature Schemes. IACR Cryptol. ePrint Arch. 2024: 495 (2024) - 2023
- [c14]Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Take Your MEDS: Digital Signatures from Matrix Code Equivalence. AFRICACRYPT 2023: 28-52 - [i19]Daniel J. Bernstein, Tung Chou:
CryptAttackTester: formalizing attack analyses. IACR Cryptol. ePrint Arch. 2023: 940 (2023) - [i18]Tung Chou, Edoardo Persichetti, Paolo Santini:
On Linear Equivalence, Canonical Forms, and Digital Signatures. IACR Cryptol. ePrint Arch. 2023: 1533 (2023) - 2022
- [j7]Tung Chou, Jin-Han Liou:
A Constant-time AVX2 Implementation of a Variant of ROLLO. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 152-174 (2022) - [j6]Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 71-113 (2022) - [i17]Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. IACR Cryptol. ePrint Arch. 2022: 412 (2022) - [i16]Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Take your MEDS: Digital Signatures from Matrix Code Equivalence. IACR Cryptol. ePrint Arch. 2022: 1559 (2022) - 2021
- [j5]Ming-Shing Chen, Tung Chou, Markus Krausz:
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 97-124 (2021) - [j4]Ming-Shing Chen, Tung Chou:
Classic McEliece on the ARM Cortex-M4. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 125-148 (2021) - [j3]Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková:
CTIDH: faster constant-time CSIDH. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 351-387 (2021) - [j2]Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang:
Rainbow on Cortex-M4. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 650-675 (2021) - [i15]Ming-Shing Chen, Tung Chou:
Classic McEliece on the ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2021: 492 (2021) - [i14]Ming-Shing Chen, Tung Chou, Markus Krausz:
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2021: 493 (2021) - [i13]Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang:
Rainbow on Cortex-M4. IACR Cryptol. ePrint Arch. 2021: 532 (2021) - [i12]Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková:
CTIDH: faster constant-time CSIDH. IACR Cryptol. ePrint Arch. 2021: 633 (2021) - 2020
- [c13]Tung Chou:
An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM. SECITC 2020: 165-184 - [i11]Tung Chou:
An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM. IACR Cryptol. ePrint Arch. 2020: 1578 (2020)
2010 – 2019
- 2019
- [i10]Tung Chou:
QcBits: Constant-Time Small-Key Code-Based Cryptography. IACR Cryptol. ePrint Arch. 2019: 150 (2019) - 2018
- [j1]Tung Chou:
McBits revisited: toward a fast constant-time code-based KEM. J. Cryptogr. Eng. 8(2): 95-107 (2018) - [c12]Tung Chou, Yohei Maezawa, Atsuko Miyaji:
A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes. ICISC 2018: 341-353 - 2017
- [c11]Tung Chou:
McBits Revisited. CHES 2017: 213-231 - [i9]Tung Chou:
McBits Revisited. IACR Cryptol. ePrint Arch. 2017: 793 (2017) - 2016
- [c10]Tung Chou:
QcBits: Constant-Time Small-Key Code-Based Cryptography. CHES 2016: 280-300 - [i8]Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Solving Quadratic Equations with XL on Parallel Architectures - extended version. IACR Cryptol. ePrint Arch. 2016: 412 (2016) - 2015
- [c9]Tung Chou, Claudio Orlandi:
The Simplest Protocol for Oblivious Transfer. LATINCRYPT 2015: 40-58 - [c8]Tung Chou:
Sandy2x: New Curve25519 Speed Records. SAC 2015: 145-160 - [c7]Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal:
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to. SSR 2015: 109-139 - [i7]Tung Chou, Claudio Orlandi:
The Simplest Protocol for Oblivious Transfer. IACR Cryptol. ePrint Arch. 2015: 267 (2015) - [i6]Daniel J. Bernstein, Tung Chou, Peter Schwabe:
McBits: fast constant-time code-based cryptography. IACR Cryptol. ePrint Arch. 2015: 610 (2015) - [i5]Tung Chou:
Sandy2x: New Curve25519 Speed Records. IACR Cryptol. ePrint Arch. 2015: 943 (2015) - 2014
- [c6]Daniel J. Bernstein, Tung Chou:
Faster Binary-Field Multiplication and Faster Binary-Field MACs. Selected Areas in Cryptography 2014: 92-111 - [i4]Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal:
How to manipulate curve standards: a white paper for the black hat. IACR Cryptol. ePrint Arch. 2014: 571 (2014) - [i3]Daniel J. Bernstein, Tung Chou:
Faster Binary-Field Multiplication and Faster Binary-Field MACs. IACR Cryptol. ePrint Arch. 2014: 729 (2014) - 2013
- [c5]Daniel J. Bernstein, Tung Chou, Peter Schwabe:
McBits: Fast Constant-Time Code-Based Cryptography. CHES 2013: 250-272 - [c4]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs. Selected Areas in Cryptography 2013: 205-222 - [i2]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in 𝔽2 on FPGAs - Extended Version. IACR Cryptol. ePrint Arch. 2013: 436 (2013) - 2012
- [c3]Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Solving Quadratic Equations with XL on Parallel Architectures. CHES 2012: 356-373 - [c2]Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs. WISA 2012: 28-42 - 2010
- [c1]Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. CHES 2010: 203-218 - [i1]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. IACR Cryptol. ePrint Arch. 2010: 313 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint