Khoongming Khoo

According to our database1, Khoongming Khoo authored at least 44 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Improved algebraic attacks on lightweight block ciphers.
J. Cryptogr. Eng., 2021

2019
Algebraic Differential Fault Analysis on SIMON Block Cipher.
IEEE Trans. Computers, 2019

2018
Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version).
IACR Cryptol. ePrint Arch., 2017

An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Human-readable Proof of the Related-Key Security of AES-128.
IACR Cryptol. ePrint Arch., 2016

2015
Lightweight MDS Involution Matrices.
IACR Cryptol. ePrint Arch., 2015

2014
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.
IACR Cryptol. ePrint Arch., 2014

2013
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4.
Int. J. Appl. Cryptogr., 2013

On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers.
Proceedings of the SECRYPT 2013, 2013

2012
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks.
IACR Cryptol. ePrint Arch., 2012

New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Side-Channel Resistant Crypto for Less than 2, 300 GE.
J. Cryptol., 2011

AES Variants Secure Against Related-Key Differential and Boomerang Attacks.
IACR Cryptol. ePrint Arch., 2011

Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure.
Cryptogr. Commun., 2011

A Comparison of Post-Processing Techniques for Biased Random Number Generators.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Parallelizing the Camellia and SMS4 Block Ciphers - Extended version.
IACR Cryptol. ePrint Arch., 2010

Parallelizing the Camellia and SMS4 Block Ciphers.
Proceedings of the Progress in Cryptology, 2010

2009
Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Extensions of the Cube Attack based on Low Degree Annihilators.
IACR Cryptol. ePrint Arch., 2009

Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack.
IACR Cryptol. ePrint Arch., 2009

Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version).
IACR Cryptol. ePrint Arch., 2009

Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions.
Proceedings of the SECRYPT 2009, 2009

On a Construction of Short Digests for Authenticating Ad Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2009

An Analysis of the Compact XSL Attack on BES and Embedded SMS4.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
New Applications of Differential Bounds of the SDS Structure.
IACR Cryptol. ePrint Arch., 2008

On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity.
Adv. Math. Commun., 2008

Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity.
Appl. Algebra Eng. Commun. Comput., 2008

A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers.
Proceedings of the SECRYPT 2008, 2008

2007
New Construction for Balanced Boolean Functions with Very High Nonlinearity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity.
IACR Cryptol. ePrint Arch., 2007

Linkability of Some Blind Signature Schemes.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Side Channel Attacks on Irregularly Decimated Generators.
Proceedings of the Information Security and Cryptology, 2007

An Analysis of XSL Applied to BES.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Generalized Correlation Analysis of Vectorial Boolean Functions.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
A New Characterization of Semi-bent and Bent Functions on Finite Fields*.
Des. Codes Cryptogr., 2006

Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack.
Proceedings of the SECRYPT 2006, 2006

New Constructions of Universal Hash Functions Based on Function Sums.
Proceedings of the Computational Science and Its Applications, 2006

The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Comparison of boolean function design.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Universal hash functions over GF(2<sup>n</sup>).
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
Additive Autocorrelation of Resilient Boolean Functions.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

New Constructions for Resilient and Highly Nonlinear Boolean Functions.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...