Chik-How TAN


Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity
Chik-How TAN Siong-Thye GOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 165-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
cryptographyboolean functionoptimal algebraic immunitynonlinearity
 Summary | Full Text:PDF

On the Security of Provably Secure Multi-Receiver ID-Based Signcryption Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7  pp. 1836-1838
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographyidentity-based signcryption
 Summary | Full Text:PDF

Security Analysis of Joint Group Key Agreement Protocol
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1876-1878
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
group key agreementbackward secrecy
 Summary | Full Text:PDF

Forgery of Provable Secure Short Signcryption Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1879-1880
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF

On Waters' Signature Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10  pp. 2684-2685
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
cryptographysignaturekey substitution attacks
 Summary | Full Text:PDF

Signature Scheme in Multi-User Setting
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1339-1345
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographybilinear mapsignatures
 Summary | Full Text:PDF

Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 206-208
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF

On the Security of Signcryption Scheme with Key Privacy
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A  No. 4  pp. 1093-1095
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF

Key Substitution Attacks on Provably Secure Short Signature Schemes
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/02/01
Vol. E88-A  No. 2  pp. 611-612
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographykey substitution attacks
 Summary | Full Text:PDF

On Diffie-Hellman Problems in 3rd Order Shift Register
Chik-How TAN Xun YI Chee-Kheong SIEW 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1206-1208
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyshift registerDiffie-Hellman problems
 Summary | Full Text:PDF

Security of Kuwakado-Tanaka Transitive Signature Scheme for Directed Trees
Xun YI Chik-How TAN Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/04/01
Vol. E87-A  No. 4  pp. 955-957
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographytransitive signatureforgery attack
 Summary | Full Text:PDF

Key Substitution Attacks on Some Provably Secure Signature Schemes
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 226-227
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographykey substitution attacks
 Summary | Full Text:PDF

A New Provably Secure Signature Scheme
Chik-How TAN Xun YI Chee-Kheong SIEW 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10  pp. 2633-2635
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
cryptographydigital signaturestrong RSA assumption
 Summary | Full Text:PDF

On the n-th Order Shift Register Based Discrete Logarithm
Chik-How TAN Xun YI Chee-Kheong SIEW 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1213-1216
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyshift registersdiscrete logarithm
 Summary | Full Text:PDF

New Signature Schemes Based on 3rd Order Shift Registers
Chik-How TAN Xun YI Chee-Kheong SIEW 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 102-109
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographydigital signatureshift registersdiscrete logarithm
 Summary | Full Text:PDF