Kenneth Koon-Ho Wong

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Key recovery attacks on grain-like keystream generators with key injection2024-01-11Paper
Algebraic attacks on grain-like keystream generators2022-12-07Paper
Differential random fault attacks on certain CAESAR stream ciphers2020-07-08Paper
A fundamental flaw in the ++AE authenticated encryption mode
Journal of Mathematical Cryptology
2018-04-10Paper
Fault attacks on XEX mode with application to certain authenticated encryption modes2017-08-25Paper
Flaws in the initialisation process of stream ciphers
Computation, Cryptography, and Network Security
2016-03-04Paper
Weaknesses in the initialisation process of the common scrambling algorithm stream cipher
Sequences and Their Applications - SETA 2014
2015-09-09Paper
Indirect message injection for MAC generation
Journal of Mathematical Cryptology
2013-11-12Paper
A general model for MAC generation using direct injection
Information Security and Cryptology
2013-05-28Paper
Analysis of indirect message injection for MAC generation using stream ciphers
Information Security and Privacy
2012-09-07Paper
An exploration of affine group laws for elliptic curves
Journal of Mathematical Cryptology
2011-07-11Paper
State convergence in the initialisation of stream ciphers
Information Security and Privacy
2011-07-07Paper
Linearity within the SMS4 block cipher
Information Security and Cryptology
2010-11-23Paper
Delaying mismatched field multiplications in pairing computations
Arithmetic of Finite Fields
2010-07-20Paper
Avoiding full extension field arithmetic in pairing computations
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Faster Pairings on Special Weierstrass Curves
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Jacobi Quartic Curves Revisited
Information Security and Privacy
2009-06-25Paper
Twisted Edwards Curves Revisited
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Algebraic Attacks on Clock-Controlled Cascade Ciphers
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Algebraic Attacks on Clock-Controlled Stream Ciphers
Information Security and Privacy
2007-09-07Paper
scientific article; zbMATH DE number 5066607 (Why is no real title available?)2006-10-24Paper


Research outcomes over time


This page was built for person: Kenneth Koon-Ho Wong