2008 | ||
---|---|---|
4 | EE | Jiali Choy, Khoongming Khoo, Chuan-Wen Loe: Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. ICICS 2008: 157-173 |
2007 | ||
3 | EE | Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe: Generalized Correlation Analysis of Vectorial Boolean Functions. FSE 2007: 382-398 |
2 | EE | Chuan-Wen Loe, Khoongming Khoo: Side Channel Attacks on Irregularly Decimated Generators. ICISC 2007: 116-130 |
2006 | ||
1 | Chuan-Wen Loe, Khoongming Khoo: Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. SECRYPT 2006: 135-140 |
1 | Claude Carlet | [3] |
2 | Jiali Choy | [4] |
3 | Khoongming Khoo | [1] [2] [3] [4] |
4 | Chu-Wee Lim | [3] |