Chuah Chai Wen

Orcid: 0000-0003-0800-0147

According to our database1, Chuah Chai Wen authored at least 11 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Correlation power analysis attack on software implementation of TRIVIUM stream cipher.
Int. J. Inf. Comput. Secur., 2022

On power analysis attacks against hardware stream ciphers.
Int. J. Inf. Comput. Secur., 2022

2020
Android Botnet Detection by Classification Techniques.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2020

2019
Review on Leakage Resilient Key Exchange Security Model.
Int. J. Commun. Networks Inf. Secur., 2019

2018
Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

2017
Stream cipher based key derivation function.
Int. J. Secur. Networks, 2017

Timing Side Channel Attack on Key Derivation Functions.
Proceedings of the Information Science and Applications 2017, 2017

On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function.
Proceedings of the Information Science and Applications 2017, 2017

2013
Key Derivation Function: The SCKDF Scheme.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
A Framework for Security Analysis of Key Derivation Functions.
Proceedings of the Information Security Practice and Experience, 2012


  Loading...