Guanhan Chew

According to our database1, Guanhan Chew authored at least 6 papers between 2007 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
A Comparison of Post-Processing Techniques for Biased Random Number Generators.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

2009
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version).
IACR Cryptol. ePrint Arch., 2009

Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions.
Proceedings of the SECRYPT 2009, 2009

Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers.
Proceedings of the SECRYPT 2008, 2008

2007
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions.
IACR Cryptol. ePrint Arch., 2007


  Loading...