|
Search the dblp DataBase
Raphael Chung-Wei Phan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Raphael Chung-Wei Phan, Bok-Min Goi
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:33-39 [Conf]
- Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:369-382 [Conf]
- Raphael Chung-Wei Phan
Attacks on ATM Authentication Protocols Proposed at WEC2002. [Citation Graph (0, 0)][DBLP] CITA, 2003, pp:275-277 [Conf]
- Raphael Chung-Wei Phan
Related-Key Attacks on Triple-DES and DESX Variants. [Citation Graph (0, 0)][DBLP] CT-RSA, 2004, pp:15-24 [Conf]
- Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:936-944 [Conf]
- Raphael Chung-Wei Phan, Bok-Min Goi
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:488-497 [Conf]
- Raphael Chung-Wei Phan, Bok-Min Goi
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2005, pp:1065-1074 [Conf]
- Raphael Chung-Wei Phan, Mohammad Umar Siddiqi
Related-Mode Attacks on Block Cipher Modes of Operation. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2005, pp:661-671 [Conf]
- Raphael Chung-Wei Phan, Bok-Min Goi
On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:136-146 [Conf]
- Raphael Chung-Wei Phan, Soichi Furuya
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:138-148 [Conf]
- Raphael Chung-Wei Phan, Helena Handschuh
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. [Citation Graph (0, 0)][DBLP] ISC, 2004, pp:111-122 [Conf]
- Gary S.-W. Yeo, Raphael Chung-Wei Phan
On the Security of the WinRAR Encryption Method. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:402-416 [Conf]
- Raphael Chung-Wei Phan, Huo-Chong Ling
Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP] IWDW, 2004, pp:184-191 [Conf]
- Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan
New Multiset Attacks on Rijndael with Large Blocks. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:277-295 [Conf]
- Raphael Chung-Wei Phan
Advanced Slide Attacks Revisited: Realigning Slide on DES. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:263-276 [Conf]
- Raphael Chung-Wei Phan, Bok-Min Goi, Kah-Hoong Wong
Cryptanalysis of some improved password-authenticated key exchange schemes. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2822-2829 [Journal]
- Raphael Chung-Wei Phan
Cryptanalysis of two password-based authentication schemes using smart cards. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:1, pp:52-54 [Journal]
- Raphael Chung-Wei Phan, David Wagner
Security considerations for incremental hash functions based on pair block chaining. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:2, pp:131-136 [Journal]
- Gary S.-W. Yeo, Raphael Chung-Wei Phan
On the security of the WinRAR encryption feature. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:2, pp:115-123 [Journal]
- Raphael Chung-Wei Phan
Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES). [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2004, v:91, n:1, pp:33-38 [Journal]
On Hashing with Tweakable Ciphers. [Citation Graph (, )][DBLP]
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005. [Citation Graph (, )][DBLP]
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|