Kenneth Koon-Ho Wong

From MaRDI portal
(Redirected from Person:776378)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Key recovery attacks on grain-like keystream generators with key injection2024-01-11Paper
Algebraic attacks on grain-like keystream generators2022-12-07Paper
Differential random fault attacks on certain CAESAR stream ciphers2020-07-08Paper
A fundamental flaw in the ++AE authenticated encryption mode
Journal of Mathematical Cryptology
2018-04-10Paper
Fault attacks on XEX mode with application to certain authenticated encryption modes2017-08-25Paper
Flaws in the initialisation process of stream ciphers
Computation, Cryptography, and Network Security
2016-03-04Paper
Weaknesses in the initialisation process of the common scrambling algorithm stream cipher
Sequences and Their Applications - SETA 2014
2015-09-09Paper
Indirect message injection for MAC generation
Journal of Mathematical Cryptology
2013-11-12Paper
A general model for MAC generation using direct injection
Information Security and Cryptology
2013-05-28Paper
Analysis of indirect message injection for MAC generation using stream ciphers
Information Security and Privacy
2012-09-07Paper
An exploration of affine group laws for elliptic curves
Journal of Mathematical Cryptology
2011-07-11Paper
State convergence in the initialisation of stream ciphers
Information Security and Privacy
2011-07-07Paper
Linearity within the SMS4 block cipher
Information Security and Cryptology
2010-11-23Paper
Delaying mismatched field multiplications in pairing computations
Arithmetic of Finite Fields
2010-07-20Paper
Avoiding full extension field arithmetic in pairing computations
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Faster Pairings on Special Weierstrass Curves
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Jacobi Quartic Curves Revisited
Information Security and Privacy
2009-06-25Paper
Twisted Edwards Curves Revisited
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Algebraic Attacks on Clock-Controlled Cascade Ciphers
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Algebraic Attacks on Clock-Controlled Stream Ciphers
Information Security and Privacy
2007-09-07Paper
scientific article; zbMATH DE number 5066607 (Why is no real title available?)2006-10-24Paper


Research outcomes over time


This page was built for person: Kenneth Koon-Ho Wong