Kenneth Koon-Ho Wong

Orcid: 0000-0003-1732-6149

According to our database1, Kenneth Koon-Ho Wong authored at least 47 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2021
Algebraic Attacks on Grain-Like Keystream Generators.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material).
IACR Cryptol. ePrint Arch., 2020

Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output.
Proceedings of the Applications and Techniques in Information Security, 2020

2019
Random Fault Attacks on a Class of Stream Ciphers.
Secur. Commun. Networks, 2019

Fault analysis of AEZ.
Concurr. Comput. Pract. Exp., 2019

Differential Random Fault Attacks on Certain CAESAR Stream Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
A fundamental flaw in the ++AE authenticated encryption mode.
J. Math. Cryptol., 2018

Tweaking Generic OTR to Avoid Forgery Attacks.
IACR Cryptol. ePrint Arch., 2018

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS.
Cryptogr., 2018

Fault attacks on Tiaoxin-346.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes.
IACR Cryptol. ePrint Arch., 2017

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Fault-based Attack on AEZ v4.2.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2016

Forgery attacks on ++AE authenticated encryption mode.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2015

Correcting flaws in Mitchell's analysis of EPBC.
Proceedings of the 13th Australasian Information Security Conference, 2015

2014
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

Algebraic analysis of Trivium-like ciphers (Poster).
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Weak key-IV Pairs in the A5/1 Stream Cipher.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Indirect message injection for MAC generation.
J. Math. Cryptol., 2013

Algebraic analysis of Trivium-like ciphers.
IACR Cryptol. ePrint Arch., 2013

State convergence in bit-based stream ciphers.
IACR Cryptol. ePrint Arch., 2013

Slid Pairs in the Initialisation of the A5/1 Stream Cipher.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
Slide attacks on the Sfinks stream cipher.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

A General Model for MAC Generation Using Direct Injection.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

State convergence in the initialisation of the Sfinks stream cipher.
Proceedings of the Tenth Australasian Information Security Conference, 2012

Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
An exploration of affine group laws for elliptic curves.
J. Math. Cryptol., 2011

Algebraic analysis of the SSS stream cipher.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

State Convergence in the Initialisation of Stream Ciphers.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

State convergence and the effectiveness of time-memory-data tradeoffs.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems.
IACR Cryptol. ePrint Arch., 2010

State convergence and keyspace reduction of the Mixer stream cipher.
IACR Cryptol. ePrint Arch., 2010

Delaying Mismatched Field Multiplications in Pairing Computations.
IACR Cryptol. ePrint Arch., 2010

Avoiding Full Extension Field Arithmetic in Pairing Computations.
IACR Cryptol. ePrint Arch., 2010

An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

2009
Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications.
IACR Cryptol. ePrint Arch., 2009

Jacobi Quartic Curves Revisited.
IACR Cryptol. ePrint Arch., 2009

Faster Pairings on Special Weierstrass Curves.
IACR Cryptol. ePrint Arch., 2009

Linearity within the SMS4 Block Cipher.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Algebraic Analysis of LEX.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
Twisted Edwards Curves Revisited.
IACR Cryptol. ePrint Arch., 2008

2007
Faster Group Operations on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2007

2006
Algebraic Attacks on Clock-Controlled Cascade Ciphers.
Proceedings of the Progress in Cryptology, 2006

Algebraic Attacks on Clock-Controlled Stream Ciphers.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006


  Loading...