Chinese
English
Assistant Research Fellow (Assistant Professor)  |  Chou, Tung  
 
contact
interests
honors
publications
Personal (New window)
 
 
 
 
 
Publications
 
Journal Articles
 
1. Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang, "Complete and Improved FPGA Implementation of Classic McEliece," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2022, number 3, pages 71–113, June 2022.
2. Tung Chou, Jin-Han Liou, "A Constant-time AVX2 Implementation of a Variant of ROLLO," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2022, number 1, pages 152-174, November 2021.
3. Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang, "Rainbow on Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2021, number 4, pages 650-675, August 2021.
4. Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková, "CTIDH: faster constant-time CSIDH," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2021, number 4, pages 351-387, August 2021.
5. Ming-Shing Chen, Tung Chou, "Classic McEliece on the ARM Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2021, number 3, pages 125-148, July 2021.
6. Ming-Shing Chen, Tung Chou, Markus Krausz, "Optimizing BIKE for the Intel Haswell and ARM Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2021, number 3, pages 97-124, July 2021.
7. Tung Chou, "McBits revisited: toward a fast constant-time code-based KEM," Journal of Cryptographic Engineering, volume 8, number 2, pages 95–107, March 2018.
 
 
Conference Papers
 
1. Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, "Take your MEDS: Digital Signatures from Matrix Code Equivalence," to appear in Progress in Cryptology - AFRICACRYPT 2023, Lecture Notes in Computer Science.
2. Tung Chou, "An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM," Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, pages 165-184, December 2020.
3. Tung Chou, Yohei Maezawa, Atsuko Miyaji, "A closer look at the Guo–Johansson–Stankovski attack against QC-MDPC codes," Information Security and Cryptology – ICISC 2018, Lecture Notes in Computer Science, pages 341-353, November 2018.
4. Tung Chou, "McBits revisited," Cryptographic Hardware and Embedded Systems – CHES 2017, Lecture Notes in Computer Science, pages 213-231, September 2017.
5. Tung Chou, "QcBits: constant-time small-key code-based cryptography," Cryptographic Hardware and Embedded Systems - CHES 2016, Lecture Notes in Computer Science, pages 280-300, August 2016.
6. Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal, "How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to," Security Standardisation Research, Lecture Notes in Computer Science, pages 109-139, December 2015.
7. Tung Chou, "Sandy2x: new Curve25519 speed records," Selected Areas in Cryptography – SAC 2015, Lecture Notes in Computer Science, pages 145-160, August 2015.
8. Tung Chou, Claudio Orlandi, "The simplest protocol for oblivious transfer," Progress in Cryptology -- LATINCRYPT 2015, Lecture Notes in Computer Science, pages 40-58, August 2015.
9. Daniel J. Bernstein, Tung Chou, "Faster binary-field multiplication and faster binary-field MACs," Selected Areas in Cryptography -- SAC 2014, Lecture Notes in Computer Science, pages 92-111, August 2014.
10. Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, and Bo-Yin Yang, "Fast exhaustive search for quadratic systems in F2 on FPGAs," Selected Areas in Cryptography -- SAC 2013, Lecture Notes in Computer Science, pages 205-222, August 2013.
11. Daniel J. Bernstein, Tung Chou, Peter Schwabe, "McBits: fast constant-time code-based cryptography," Cryptographic Hardware and Embedded Systems - CHES 2013, Lecture Notes in Computer Science, pages 250-272, August 2013.
12. Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang, "Solving quadratic equations with XL on parallel architectures," Cryptographic Hardware and Embedded Systems – CHES 2012, Lecture Notes in Computer Science, pages 356-373, September 2012.
13. Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai, "Efficient parallel evaluation of multivariate quadratic polynomials on GPUs," Information Security Applications, Lecture Notes in Computer Science, pages 28-42, August 2012.
14. Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang, "Fast exhaustive search for polynomial systems in F2," Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, pages 203-218, IACR, Santa Barbara, USA, August 2010.
 
 
Others
 
1. Martin R. Albrecht, Daniel J. Bernstein, Tung Chou, Carlos Cid, Jan Gilcher, Tanja Lange, Varun Maram, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Kenneth G. Paterson, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Cen Jung Tjhai, Martin Tomlinson, Wen Wang, "Classic McEliece: conservative code-based cryptography, 23 October 2022," number 4, Information Security Group, Royal Holloway, University of London, University of Illinois at Chicago and Ruhr University Bochum, Academia Sinica, Royal Holloway, University of London and Simula UiB, ETH Z ̈urich, Eindhoven University of Technology, ETH Z ̈urich, self, Google, University of Southern Denmark, ETH Z ̈urich, Florida Atlantic University, self, Max Planck Institute for Security and Privacy & Radboud University, Inria, Yale University, PQ Solutions Ltd., PQ Solutions Ltd. and University of Plymouth, Yale University, October 2022, Submission for the fourth round of the NIST post-quantum standardization process
2. Martin R. Albrecht, Daniel J. Bernstein, Tung Chou, Carlos Cid, Jan Gilcher, Tanja Lange, Varun Maram, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Kenneth G. Paterson, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Cen Jung Tjhai, Martin Tomlinson, Wen Wang, "Classic McEliece: conservative code-based cryptography, 10 October 2020," number 3, Information Security Group, Royal Holloway, University of London, University of Illinois at Chicago and Ruhr University Bochum, Academia Sinica, Royal Holloway, University of London and Simula UiB, ETH Z ̈urich, Eindhoven University of Technology, ETH Z ̈urich, self, Google, University of Southern Denmark, ETH Z ̈urich, Florida Atlantic University, self, Max Planck Institute for Security and Privacy & Radboud University, Inria, Yale University, PQ Solutions Ltd., PQ Solutions Ltd. and University of Plymouth, Yale University, October 2020, Submission for the third round of the NIST post-quantum standardization process
3. Daniel J. Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Wen Wang, "Classic McEliece: conservative code-based cryptography, 30 March 2019," number 2, University of Illinois at Chicago, Osaka University, Technische Universiteit Eindhoven, Intel Corporation, Fraunhofer SIT, Florida Atlantic University, Radboud University, Inria, Yale University, 2019, Submission for the second round of the NIST post-quantum standardization process
4. Daniel J. Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Wen Wang, "Classic McEliece: conservative code-based cryptography, 29 November 2017," number 1, University of Illinois at Chicago, Osaka University, Technische Universiteit Eindhoven, Intel Corporation, Fraunhofer SIT, Florida Atlantic University, Radboud University, Inria, Yale University, November 2017, Submission for the first round of the NIST post-quantum standardization process
 
 
bg