Raphael C.-W. Phan

From MaRDI portal
(Redirected from Person:301641)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Post-quantum verifiable random function from symmetric primitives in PoS blockchain
Computer Security – ESORICS 2022
2023-07-21Paper
Tuple cryptanalysis: slicing and fusing multisets2017-10-23Paper
Higher order differentiation over finite fields with applications to generalising the cube attack
Designs, Codes and Cryptography
2017-09-28Paper
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
Nonlinear Dynamics
2016-12-16Paper
Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme
Cryptography and Communications
2016-07-01Paper
Comparison of Cube Attacks Over Different Vector Spaces
Cryptography and Coding
2016-01-12Paper
Impossible differential cryptanalysis of mini-AES
Cryptologia
2015-11-13Paper
Further notes for a self-study course in block-cipher cryptanalysis
Cryptologia
2015-11-13Paper
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
Smart Card Research and Advanced Applications
2015-11-11Paper
Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
Nonlinear Dynamics
2015-09-07Paper
A provable secure pairing-free certificateless identification scheme
International Journal of Computer Mathematics
2015-07-30Paper
The hash function \texttt{BLAKE}
Information Security and Cryptography
2014-12-15Paper
On the security of a modified Beth identity-based identification scheme
Information Processing Letters
2014-04-11Paper
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
International Journal of Computer Mathematics
2014-01-29Paper
Efficient generation of elementary sequences
Cryptography and Coding
2014-01-17Paper
Computing the linear complexity for sequences with characteristic polynomial \(f^v\)
Cryptography and Communications
2013-08-02Paper
Attribution of attack trees
Computers and Electrical Engineering
2013-05-31Paper
On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers
Information Processing Letters
2013-03-28Paper
On Integral Distinguishers of Rijndael Family of Ciphers
Cryptologia
2013-03-21Paper
Index Tables of Finite Fields and Modular Golomb Rulers
Lecture Notes in Computer Science
2012-09-07Paper
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '09
Cryptology and Network Security
2012-07-20Paper
Fooling a liveness-detecting capacitive fingerprint scanner
Cryptography and Security: From Theory to Applications
2012-06-08Paper
On the stability of \(m\)-sequences
Cryptography and Coding
2011-12-16Paper
Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol
Information Security and Cryptology
2011-07-29Paper
Advanced differential-style cryptanalysis of the NSA's Skipjack block cipher
Cryptologia
2011-07-14Paper
Notions and relations for RKA-secure permutation and function families
Designs, Codes and Cryptography
2011-06-03Paper
Integral distinguishers of some SHA-3 candidates
Cryptology and Network Security
2010-12-07Paper
Improved cryptanalysis of Skein
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
On the Impossibility of Strong Encryption Over $\aleph_0$
Lecture Notes in Computer Science
2009-07-23Paper
Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
Information Processing Letters
2009-07-21Paper
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Improved Related-key Attacks on DESX and DESX+
Cryptologia
2009-03-23Paper
Proxy Re-signatures in the Standard Model
Lecture Notes in Computer Science
2008-11-20Paper
The Hash Function Family LAKE
Fast Software Encryption
2008-09-18Paper
Tampering with a watermarking-based image authentication scheme
Pattern Recognition
2008-09-01Paper
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Information Sciences
2008-06-25Paper
Traceable Privacy of Recent Provably-Secure RFID Protocols
Applied Cryptography and Network Security
2008-06-13Paper
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
Provable Security
2008-06-10Paper
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
Provable Security
2008-06-10Paper
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme
Applied Cryptography and Network Security
2007-09-24Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1950609 (Why is no real title available?)2003-07-17Paper


Research outcomes over time


This page was built for person: Raphael C.-W. Phan