
Dr TAN, Chik How, Principal Research Scientist, email: tsltch@nus.edu.sg
Background
Born in Singapore in 1959. Received the BSc. Degree in Mathematics and BSc (Honor) degree in Mathematics in 1983 and 1984 respectively, from the National University of Singapore, Singapore, and the M.A. and Ph.D. degrees in Mathematics in 1990 and 1992 respectively, from the University of Wisconsin, Madison, U.S.A.
Dr Tan joined the DSO National Laboratories in 1984. He then joined the School of Electrical & Electronics Engineering, Nanyang Technological University, Singapore in 2000 as an assistant professor and then be an associate professor in 2004. He was concurrently a Director of the Centre for Information Security at NTU from 2003 to 2005. He was also a security consultant to ST Engineering Infor-Security Pte Ltd (previously known as DigiSafe Pte Ltd), Singapore from 2001 to 2005. From 2005 to 2008, Dr Tan was a Professor in Information Security, Department of Computer Science and Media Technology, Gjvik University College, Norway. He joined Temasek Laboratories as a principal research scientist in 2009.
Research Activities and Interests
Cryptology, Post-Quantum Cryptography, information security, wireless communication security and security engineering
Awards
1988 : Defence Technology Training Award (DTTA), Ministry of Defence, Singapore, for PhD study in USA
1994 : DSO Excellence Project Award
Selected Publications
W. J. Ng and C. H. Tan, “Depth-Measurement Trade-off for Quantum Search on Block Ciphers”, Quantum Information Processing, vol. 23, article no. 151 (2024)
C. H. Tan and T. F. Prabowo, “A New Key Recovery Attack on a Code-based Full-time Signature”, Information Processing Letters, vol. 183, article no. 1066422 (2024)
Terry S. C. Lau and C. H. Tan, “Polynomial-Time Plaintext Recovery Attacks on the IKKR Code-based Cryptosystems“, Advances in Mathematics of Communications, vol 17, no.2, April, pp.353-366, (2023)
Y. Li, H. Kan, S. Mesnage, J. Peng, C. H. Tan and L. Zheng: “Generic constructions of (Boolean and vectorial) bent functions and their consequences”, IEEE Trans. IT., vol 68, no.4, pp.2735-2751 (2022)
Terry S. C. Lau and C. H. Tan, “On the Design and Security of Lee Metric McEliece Cryptosystems“, Design, Codes and Cryptography, vol 90, no.3, 695-717 (2022)
Terry S. C. Lau, C. H. Tan and T. F. Prabowo, “On the Security of the Modified Dual-Ouroboros PKE using Gabidulin Codes“, Applicable Algebra in Engineering, Communication and Computing, vol. 32, no. 6, pp.681-699, (2021)
N. Aragon, O. Blazy, J. C. Deneuville, P. Gaborit, Terry S. C. Lau, C. H. Tan and K. Xagawa, “Cryptanalysis of a rank-based signature with short public keys”, Design, Codes and Cryptography, vol. 88, no. 4, pp.643-653, (2020)
Terry S. C. Lau and Chik How Tan, “New Rank Codes Based Encryption Scheme Using Partial Circulant Matrices”, Design, Codes and Cryptography, vol. 87, no. 12, pp.2979-2999, (2019)
D. P. Le, N. El Mrabet, S. Haloui and C. H. Tan, “On near prime-order MNT curves”, Applicable Algebra in Engineering, Communication and Computing, vol. 30, no. 2, pp.107-125, March, (2019)
Q. Wang, C. H. Tan and T. F. Prabowo, “On the Covering Radius of the Third Order Reed-Muller Code RM(3,7)”, Design, Codes and Cryptography, vol. 86(1), pp.151-159, (2018)
Jie Peng, C. H. Tan and H. Kan, “On existence of vectorial bent functions from PSap_class”, Scientia Sinica-Mathematica, vol 47, no.9, pp.995-1010, (2017)
J. Peng and C. H. Tan, “New Differentially 4-Uniform Permutations by modifying the inverse function on subfields”, Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, vol. 9, no. 3, pp. 363-378, (2017)
Q. Wang and C. H. Tan, “On the Second-Order Nonlinearity of the Hidden Weighted Bit Function”, Discrete Applied Mathematics, vol. 215, pp. 197-202, (2016)
J. Peng and C. H. Tan, “New explicit constructions of differentially 4-uniform permutations via special partitions of F_{2^{2k}}”, Finite Fields and Their Applications, vol. 40, no. 7, July, pp. 73-89, (2016)
Q. Wang, C. H. Tan and P. Stanica, “Concatenation of Hidden Weight Bit Function and Their Cryptographic Properties”, Advance in Mathematics of Communications, vol.8, No.2, pp.153-165, May, (2014)
Q Wang, C. Carlet, P. Stanica and C. H. Tan, “Cryptographic Properties of the Hidden Weighted Bit Function”, Discrete Applied Mathematics, vol. 174, pp.1-10, 10 Sep, (2014)
Q. Wang and C. H. Tan, “Balanced Boolean Functions with Optimum Algebraic Degree, Optimum Algebraic Immunity and very high Nonlinearity”, Discrete Applied Mathematics, vol.167, 20 Apr, pp.25-32, (2014)
C. Braken, C. H. Tan and Y. Tan, “On a Class of Quadratic Polynomials with no Zeros and its Application to APN”, Finite Fields and Their Applications, vol.25, Jan, pp.26-36, (2014)
D. P. Le and C. H. Tan, “Improved Miller’s Algorithm for Computing Pairings on Edwards Curves”, IEEE Transactions on Computers, vol. 63, no. 10, pp. 2626-2632, (2014)
L. Qu, Y. Tan, C. H. Tan and C. Li, “Constructing Differentially 4-Uniform Permutations over F_{2^{2k}} via Switching Method”, IEEE Transactions on Information Theory, vol. 59, no. 7, pp. 4675-4686, (2013)
Y. Tan, L. Qu, S. Ling and C. H. Tan, “On the Fourier Spectrum of New APN Functions”, SIAM J. Discrete Mathematics (SIDMA), vol. 27, no. 2, pp.791-801, (2013)
H. H. Chan, E. Konstantinou, A. Kontogeogis and C. H. Tan, “What is Your ‘Birthday Curve’?”, Finite Fields and Their Applications, vol.18, no.6, 1232-1241, (2012)
G. Yang and C. H. Tan, “Certificateless Cryptography With KGC Trust Level 3”, Theoretical Computer Science, Vol. 412 (39), pp. 5446-5457, (2011)
C. H. Tan and G. Yang, “Comment on ‘Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting’ ”, IEEE Transactions on Information Theory, Vol. 56, no.11, Nov, pp.5887-5888, (2010)
C. H. Tan, “Secure Public-key Encryption Scheme Without Random Oracles”, Information Science, Vol. 178, pp. 3435-3442, (2008)
C. H. Tan, “Forgery of Provable Secure Short Signcryption Scheme”, IEICE Trans. on Fundamentals, Vol. E90-A, no. 9, pp. 1879-1880, Sep, (2007)
C. M. Teo Joseph and C. H. Tan, “Authenticated Dynamic Group Key Agreement for Autoconfigurable Mobile Ad Hoc Networks”, IEICE Trans. on Communications, Vol E89-B, no.9, pp.2480-2492, Sep, (2006)
C. H. Tan, “Analysis of Improved Signcryption Scheme with Key Privacy”, Information Processing Letter, Vol 99, issue 4, pp.135-138, Aug, (2006)
C. H. Tan, “Signature scheme in multi-user setting”, IEICE Trans. on Fundamentals, Vol E89-A, no.5, pp.1339-1345, May, (2006)
C. H. Tan, "Key Substitution Attacks on Some Provably Secure Signature Schemes”, IEICE Trans. on Fundamentals, Vol E87-A, no.1, pp. 226-227, Jan, (2004)
X. Yi, C. K. Siew, C. H. Tan and Y. Ye “A Secure Conference Scheme For Mobile Communications”, IEEE Trans. on Wireless Communications, Vol. 2, no.6, pp. 1168-1177, Nov, (2003)
|