2008 |
14 | EE | Jiali Choy,
Khoongming Khoo,
Chuan-Wen Loe:
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack.
ICICS 2008: 157-173 |
13 | EE | Jiali Choy,
Khoongming Khoo:
New Applications of Differential Bounds of the SDS Structure.
ISC 2008: 367-384 |
12 | EE | Khoongming Khoo,
Chu-Wee Lim,
Guang Gong:
Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity.
Appl. Algebra Eng. Commun. Comput. 19(4): 323-338 (2008) |
2007 |
11 | EE | Chu-Wee Lim,
Khoongming Khoo:
An Analysis of XSL Applied to BES.
FSE 2007: 242-253 |
10 | EE | Claude Carlet,
Khoongming Khoo,
Chu-Wee Lim,
Chuan-Wen Loe:
Generalized Correlation Analysis of Vectorial Boolean Functions.
FSE 2007: 382-398 |
9 | EE | Chuan-Wen Loe,
Khoongming Khoo:
Side Channel Attacks on Irregularly Decimated Generators.
ICISC 2007: 116-130 |
8 | EE | Swee-Huay Heng,
Wun-She Yap,
Khoongming Khoo:
Linkability of Some Blind Signature Schemes.
WISTP 2007: 80-89 |
7 | EE | Khoongming Khoo,
Guang Gong:
New Construction for Balanced Boolean Functions with Very High Nonlinearity.
IEICE Transactions 90-A(1): 29-35 (2007) |
2006 |
6 | EE | Khoongming Khoo,
Guang Gong,
Hian-Kiat Lee:
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.
ACNS 2006: 194-209 |
5 | EE | Khoongming Khoo,
Swee-Huay Heng:
New Constructions of Universal Hash Functions Based on Function Sums.
ICCSA (3) 2006: 416-425 |
4 | | Chuan-Wen Loe,
Khoongming Khoo:
Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack.
SECRYPT 2006: 135-140 |
3 | EE | Khoongming Khoo,
Guang Gong,
Douglas R. Stinson:
A New Characterization of Semi-bent and Bent Functions on Finite Fields*.
Des. Codes Cryptography 38(2): 279-295 (2006) |
2003 |
2 | EE | Khoongming Khoo,
Guang Gong:
New Constructions for Resilient and Highly Nonlinear Boolean Functions.
ACISP 2003: 498-509 |
1 | EE | Guang Gong,
Khoongming Khoo:
Additive Autocorrelation of Resilient Boolean Functions.
Selected Areas in Cryptography 2003: 275-290 |