The SCEAS System
| |||||||

## Search the dblp DataBase
Khoongming Khoo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Khoongming Khoo, Guang Gong
**New Constructions for Resilient and Highly Nonlinear Boolean Functions.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:498-509 [Conf] - Khoongming Khoo, Guang Gong, Hian-Kiat Lee
**The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.**[Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:194-209 [Conf] - Khoongming Khoo, Swee-Huay Heng
**New Constructions of Universal Hash Functions Based on Function Sums.**[Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:416-425 [Conf] - Guang Gong, Khoongming Khoo
**Additive Autocorrelation of Resilient Boolean Functions.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:275-290 [Conf] - Chuan-Wen Loe, Khoongming Khoo
**Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack.**[Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:135-140 [Conf] - Khoongming Khoo, Guang Gong, Douglas R. Stinson
**A New Characterization of Semi-bent and Bent Functions on Finite Fields*.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:38, n:2, pp:279-295 [Journal] - Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
**Generalized Correlation Analysis of Vectorial Boolean Functions.**[Citation Graph (0, 0)][DBLP] FSE, 2007, pp:382-398 [Conf] - Chu-Wee Lim, Khoongming Khoo
**An Analysis of XSL Applied to BES.**[Citation Graph (0, 0)][DBLP] FSE, 2007, pp:242-253 [Conf] - Chuan-Wen Loe, Khoongming Khoo
**Side Channel Attacks on Irregularly Decimated Generators.**[Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:116-130 [Conf] - Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
**Linkability of Some Blind Signature Schemes.**[Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:80-89 [Conf] **Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure.**[Citation Graph (, )][DBLP]**Extensions of the Cube Attack Based on Low Degree Annihilators.**[Citation Graph (, )][DBLP]**An Analysis of the Compact XSL Attack on BES and Embedded SMS4.**[Citation Graph (, )][DBLP]**On a Construction of Short Digests for Authenticating Ad Hoc Networks.**[Citation Graph (, )][DBLP]**Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack.**[Citation Graph (, )][DBLP]**New Applications of Differential Bounds of the SDS Structure.**[Citation Graph (, )][DBLP]**A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers.**[Citation Graph (, )][DBLP]**Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions.**[Citation Graph (, )][DBLP]**Parallelizing the Camellia and SMS4 Block Ciphers.**[Citation Graph (, )][DBLP]**Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity.**[Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |