Publications of Yin Tan

Disclaimer: because of copyright considerations, any version posted here might be different from the final published version.

A full list of my publications and the citations can be found in Google Scholar.



Submitted for publication

  1. On the existence of aperiodic complementary hexagaonal lattice arrays, with Gong, G.

  2. Six constructions of difference families, with Ding, C., Tan, C.H.

  3. On the Characterization of Theta Kernel Elements and Differential Cryptanalysis of Keccak , with Gong, G. and Mandal, K.

  4. Determining All Permutations with Linear Translators, with Gong, G. and Goh, S.


Refereed Publications

Journals

  1. Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions, with Gong, G. and Zhu, B, Journal of Cryptography and Communications, in press.

  2. Quadratic Zero-Difference Balanced Functions, APN functions and Strongly Regular Graphs, with Carlet, C. and Gong G., Designs, Codes and Cryptography, in press.

  3. More constructions of differentially 4-uniform permutations on GF(2^{2k}), with Qu, L., Li, C. and G. Gong, Designs, Codes and Cryptography, in press.

  4. On group rings and some of their applications to combinatorics and symmetric cryptography, with C. Carlet, International Journal of Group Theory, in press.

  5. On the Walsh spectrum of a family of APN functions with five terms, with Qu, L. and Li, C., Science in China, series F: Information Sciences, (57)2, 2014, 1-7.

  6. On a class of quadratic polynomials with no zeros and its applications on APN functions, with Bracken, C. and Tan, C.H., Finite Fields and Their Applications, (25), 2013, 26-36.

  7. Constructing differentially 4-uniform permutations over fields over GF(2^{2k}) via the switching method, with Qu, L., Tan, C.H., and Li, C., IEEE Transactions on Information Theory, 59(7), 2013, 4675-4686.

  8. On the Fourier spectra of new APN functions, with Qu, L., Tan, C.H., and Li, C., SIAM Journal on Discrete Mathematics, 27 (2), 2013, 791-801.

  9. Binomial differentially 4-uniform permutations with high nonlinearity, with Bracken, C. and Tan, C.H., Finite Fields and Their Applications, 18 (3), 2013, 537-546.

  10. Zero difference balanced functions with applications, with Ding, C., Journal of Statistical Theory and Practice, 6(1), 2012, 3-19.

  11. Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences, with Chee, Y., Ling, S., and Zhang, X., Mathematics of Computations, 81, 2012, 399-415.

  12. Strongly regular graphs constructed from p-ary bent functions, with Chee, Y. and Zhang, X., Journal of Algebraic Combinatorics, 34 (2), 2011, 251-266.

  13. Association schemes arising from bent functions, with Pott, A., Feng, T. and Ling, S., Designs, Codes and Cryptography, 59 (1), 2011, 319-331.

  14. Strongly regular graphs associated with ternary bent functions, with Pott, A., Feng, T., Journal of Combinatorial Theory, Series A, 117 (6), 2010, 668-682.

    Conferences

  15. Revisiting MAC forgeries, weak keys and provable security of GCM, with Zhu, B. and Gong, G., In: Proceedings of the The International Conference on Cryptology and Network Security (CANS 2013), Paraty, Brazil, Lecture Notes in Computer Sciences, Vol 8257, 2013, 20-38.

  16. On quadratic APN functions and their related algebraic objects, with Weng, G. and Gong, G., In: Proceedings of the Workshop on Coding and Cryptography (WCC 2013), Bergen, Norway, 2013, 57--68.

  17. New families of differentially 4 uniform permutations over fields with even degree, with Qu, L., Tan, C.H., Li, C., In: Proceedings of Sequences and Their Applications (SETA 2012), Waterloo, Canada, Lecture Notes in Computer Sciences, Vol 7280, 2012, 25-39.

  18. A recursive method to construct p-bent functions which are not weakly regular, with Yang, J., and Zhang, X., In: Proceedings of IEEE Information Theory and Information Security, Beijing, China, 2010, 156-159.

  19. Almost p-ary perfect sequences, with Chee, Y. and Zhou, Y., In: Proceedings of Sequences and Their Applications (SETA 2010), Paris, France, Lecture Notes in Computer Sciences, Vol 6338, 2010, 399-415.

  20. On a family of planar mappings, with Kyureghyan, G., In: Enhancing Crypto-Primitives with Techniques from Coding Theory, 2009, 175-178.



Industrial Reports

  1. Cryptanalysis of the key generation algorithm TUAK for 3GPP. Third-party Evaluation Report, with G. Gong, K. Mandal and T. Wu, Available on 3GPP website (File No. S3‑142035)

  2. On the constructions of Substition-boxes in cryptography, Project report, with C.H. Tan, (2012), 145 pages.

  3. On the constructions of Vectorial Boolean functions with good cryptographic properties, Project report, with C.H. Tan, (2010), 85 pages


Thesis

  1. Nonlinear Functions and Their Related Combinatorial Objects, PhD Thesis. Peking University, July 2009.

  2. On the suborbital structure of a family of primitive groups, Master thesis.


Some Unpublished Computational results

Back.