中文版
English
助研究員  |  周彤  
 
contact
interests
publications
 
 
 
 
 
Publications
 
Journal Articles
 
1. Ming-Shing Chen, Tung Chou, "Classic McEliece on the ARM Cortex-M4," to appear in IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2021, number 3.
2. Ming-Shing Chen, Tung Chou, Markus Krausz, "Optimizing BIKE for the Intel Haswell and ARM Cortex-M4," to appear in IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2021, number 3.
3. Tung Chou, "McBits revisited: toward a fast constant-time code-based KEM," Journal of Cryptographic Engineering, volume 8, number 2, pages 95–107, March 2018.
 
 
Conference Papers
 
1. Tung Chou, "An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM," Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, pages 165-184, December 2020.
2. Tung Chou, Yohei Maezawa, Atsuko Miyaji, "A closer look at the Guo–Johansson–Stankovski attack against QC-MDPC codes," Information Security and Cryptology – ICISC 2018, Lecture Notes in Computer Science, pages 341-353, November 2018.
3. Tung Chou, "McBits revisited," Cryptographic Hardware and Embedded Systems – CHES 2017, Lecture Notes in Computer Science, pages 213-231, September 2017.
4. Tung Chou, "QcBits: constant-time small-key code-based cryptography," Cryptographic Hardware and Embedded Systems - CHES 2016, Lecture Notes in Computer Science, pages 280-300, August 2016.
5. Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal, "How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to," Security Standardisation Research, Lecture Notes in Computer Science, pages 109-139, December 2015.
6. Tung Chou, Claudio Orlandi, "The simplest protocol for oblivious transfer," Progress in Cryptology -- LATINCRYPT 2015, Lecture Notes in Computer Science, pages 40-58, August 2015.
7. Tung Chou, "Sandy2x: new Curve25519 speed records," Selected Areas in Cryptography – SAC 2015, Lecture Notes in Computer Science, pages 145-160, August 2015.
8. Daniel J. Bernstein, Tung Chou, "Faster binary-field multiplication and faster binary-field MACs," Selected Areas in Cryptography -- SAC 2014, Lecture Notes in Computer Science, pages 92-111, August 2014.
9. Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, and Bo-Yin Yang, "Fast exhaustive search for quadratic systems in F2 on FPGAs," Selected Areas in Cryptography -- SAC 2013, Lecture Notes in Computer Science, pages 205-222, August 2013.
10. Daniel J. Bernstein, Tung Chou, Peter Schwabe, "McBits: fast constant-time code-based cryptography," Cryptographic Hardware and Embedded Systems - CHES 2013, Lecture Notes in Computer Science, pages 250-272, August 2013.
11. Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang, "Solving quadratic equations with XL on parallel architectures," Cryptographic Hardware and Embedded Systems – CHES 2012, Lecture Notes in Computer Science, pages 356-373, September 2012.
12. Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai, "Efficient parallel evaluation of multivariate quadratic polynomials on GPUs," Information Security Applications, Lecture Notes in Computer Science, pages 28-42, August 2012.
13. Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang, "Fast exhaustive search for polynomial systems in F2," Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, pages 203-218, IACR, Santa Barbara, USA, August 2010.
 
 
Others
 
1. Martin R. Albrecht, Daniel J. Bernstein, Tung Chou, Carlos Cid, Jan Gilcher, Tanja Lange, Varun Maram, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Kenneth G. Paterson, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Cen Jung Tjhai, Martin Tomlinson, Wen Wang, "Classic McEliece: conservative code-based cryptography, 10 October 2020," number 3, Martin R. Albrecht, Information Security Group, Royal Holloway, University of LondonˆDaniel J. Bernstein, University of Illinois at Chicago and Ruhr University BochumˆTung Chou, Academia SinicaˆCarlos Cid, Royal Holloway, University of London and Simula UiBˆJan Gilcher, ETH Z ̈urichˆTanja Lange, Eindhoven University of TechnologyˆVarun Maram, ETH Z ̈urichˆIngo von Maurich, selfˆRafael Misoczki, GoogleˆRuben Niederhagen, University of Southern DenmarkˆKenneth G. Paterson, ETH Z ̈urichˆEdoardo Persichetti, Florida Atlantic UniversityˆChristiane Peters, selfˆPeter Schwabe, Max Planck Institute for Security and Privacy & Radboud UniversityˆNicolas Sendrier, InriaˆJakub Szefer, Yale UniversityˆCen Jung Tjhai, PQ Solutions Ltd.ˆMartin Tomlinson, PQ Solutions Ltd. and University of PlymouthˆWen Wang, Yale University, October 2020, Submission for the third round of the NIST post-quantum standardization process
2. Daniel J. Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Wen Wang, "Classic McEliece: conservative code-based cryptography, 30 March 2019," number 2, University of Illinois at Chicago, Osaka University, Technische Universiteit Eindhoven, Intel Corporation, Fraunhofer SIT, Florida Atlantic University, Radboud University, Inria, Yale University, 2019, Submission for the second round of the NIST post-quantum standardization process
3. Daniel J. Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Wen Wang, "Classic McEliece: conservative code-based cryptography, 29 November 2017," number 1, University of Illinois at Chicago, Osaka University, Technische Universiteit Eindhoven, Intel Corporation, Fraunhofer SIT, Florida Atlantic University, Radboud University, Inria, Yale University, November 2017, Submission for the first round of the NIST post-quantum standardization process
 
 
bg