The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Raphael Chung-Wei Phan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Raphael Chung-Wei Phan, Bok-Min Goi
    Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:33-39 [Conf]
  2. Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi
    Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:369-382 [Conf]
  3. Raphael Chung-Wei Phan
    Attacks on ATM Authentication Protocols Proposed at WEC2002. [Citation Graph (0, 0)][DBLP]
    CITA, 2003, pp:275-277 [Conf]
  4. Raphael Chung-Wei Phan
    Related-Key Attacks on Triple-DES and DESX Variants. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:15-24 [Conf]
  5. Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi
    Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:936-944 [Conf]
  6. Raphael Chung-Wei Phan, Bok-Min Goi
    On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:488-497 [Conf]
  7. Raphael Chung-Wei Phan, Bok-Min Goi
    On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1065-1074 [Conf]
  8. Raphael Chung-Wei Phan, Mohammad Umar Siddiqi
    Related-Mode Attacks on Block Cipher Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:661-671 [Conf]
  9. Raphael Chung-Wei Phan, Bok-Min Goi
    On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:136-146 [Conf]
  10. Raphael Chung-Wei Phan, Soichi Furuya
    Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:138-148 [Conf]
  11. Raphael Chung-Wei Phan, Helena Handschuh
    On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:111-122 [Conf]
  12. Gary S.-W. Yeo, Raphael Chung-Wei Phan
    On the Security of the WinRAR Encryption Method. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:402-416 [Conf]
  13. Raphael Chung-Wei Phan, Huo-Chong Ling
    Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:184-191 [Conf]
  14. Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan
    New Multiset Attacks on Rijndael with Large Blocks. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:277-295 [Conf]
  15. Raphael Chung-Wei Phan
    Advanced Slide Attacks Revisited: Realigning Slide on DES. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:263-276 [Conf]
  16. Raphael Chung-Wei Phan, Bok-Min Goi, Kah-Hoong Wong
    Cryptanalysis of some improved password-authenticated key exchange schemes. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2822-2829 [Journal]
  17. Raphael Chung-Wei Phan
    Cryptanalysis of two password-based authentication schemes using smart cards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:1, pp:52-54 [Journal]
  18. Raphael Chung-Wei Phan, David Wagner
    Security considerations for incremental hash functions based on pair block chaining. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:131-136 [Journal]
  19. Gary S.-W. Yeo, Raphael Chung-Wei Phan
    On the security of the WinRAR encryption feature. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:2, pp:115-123 [Journal]
  20. Raphael Chung-Wei Phan
    Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES). [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:91, n:1, pp:33-38 [Journal]

  21. On Hashing with Tweakable Ciphers. [Citation Graph (, )][DBLP]


  22. (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005. [Citation Graph (, )][DBLP]


  23. Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002