|
Search the dblp DataBase
Khoongming Khoo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Khoongming Khoo, Guang Gong
New Constructions for Resilient and Highly Nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:498-509 [Conf]
- Khoongming Khoo, Guang Gong, Hian-Kiat Lee
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:194-209 [Conf]
- Khoongming Khoo, Swee-Huay Heng
New Constructions of Universal Hash Functions Based on Function Sums. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:416-425 [Conf]
- Guang Gong, Khoongming Khoo
Additive Autocorrelation of Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:275-290 [Conf]
- Chuan-Wen Loe, Khoongming Khoo
Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:135-140 [Conf]
- Khoongming Khoo, Guang Gong, Douglas R. Stinson
A New Characterization of Semi-bent and Bent Functions on Finite Fields*. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:38, n:2, pp:279-295 [Journal]
- Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
Generalized Correlation Analysis of Vectorial Boolean Functions. [Citation Graph (0, 0)][DBLP] FSE, 2007, pp:382-398 [Conf]
- Chu-Wee Lim, Khoongming Khoo
An Analysis of XSL Applied to BES. [Citation Graph (0, 0)][DBLP] FSE, 2007, pp:242-253 [Conf]
- Chuan-Wen Loe, Khoongming Khoo
Side Channel Attacks on Irregularly Decimated Generators. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:116-130 [Conf]
- Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
Linkability of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:80-89 [Conf]
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. [Citation Graph (, )][DBLP]
Extensions of the Cube Attack Based on Low Degree Annihilators. [Citation Graph (, )][DBLP]
An Analysis of the Compact XSL Attack on BES and Embedded SMS4. [Citation Graph (, )][DBLP]
On a Construction of Short Digests for Authenticating Ad Hoc Networks. [Citation Graph (, )][DBLP]
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. [Citation Graph (, )][DBLP]
New Applications of Differential Bounds of the SDS Structure. [Citation Graph (, )][DBLP]
A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers. [Citation Graph (, )][DBLP]
Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions. [Citation Graph (, )][DBLP]
Parallelizing the Camellia and SMS4 Block Ciphers. [Citation Graph (, )][DBLP]
Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|