The SCEAS System
Navigation Menu

Search the dblp DataBase


Khoongming Khoo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Khoongming Khoo, Guang Gong
    New Constructions for Resilient and Highly Nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:498-509 [Conf]
  2. Khoongming Khoo, Guang Gong, Hian-Kiat Lee
    The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:194-209 [Conf]
  3. Khoongming Khoo, Swee-Huay Heng
    New Constructions of Universal Hash Functions Based on Function Sums. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:416-425 [Conf]
  4. Guang Gong, Khoongming Khoo
    Additive Autocorrelation of Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:275-290 [Conf]
  5. Chuan-Wen Loe, Khoongming Khoo
    Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:135-140 [Conf]
  6. Khoongming Khoo, Guang Gong, Douglas R. Stinson
    A New Characterization of Semi-bent and Bent Functions on Finite Fields*. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:2, pp:279-295 [Journal]
  7. Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
    Generalized Correlation Analysis of Vectorial Boolean Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:382-398 [Conf]
  8. Chu-Wee Lim, Khoongming Khoo
    An Analysis of XSL Applied to BES. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:242-253 [Conf]
  9. Chuan-Wen Loe, Khoongming Khoo
    Side Channel Attacks on Irregularly Decimated Generators. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:116-130 [Conf]
  10. Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
    Linkability of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:80-89 [Conf]

  11. Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. [Citation Graph (, )][DBLP]

  12. Extensions of the Cube Attack Based on Low Degree Annihilators. [Citation Graph (, )][DBLP]

  13. An Analysis of the Compact XSL Attack on BES and Embedded SMS4. [Citation Graph (, )][DBLP]

  14. On a Construction of Short Digests for Authenticating Ad Hoc Networks. [Citation Graph (, )][DBLP]

  15. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. [Citation Graph (, )][DBLP]

  16. New Applications of Differential Bounds of the SDS Structure. [Citation Graph (, )][DBLP]

  17. A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers. [Citation Graph (, )][DBLP]

  18. Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions. [Citation Graph (, )][DBLP]

  19. Parallelizing the Camellia and SMS4 Block Ciphers. [Citation Graph (, )][DBLP]

  20. Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002