Raphael C.-W. Phan

Orcid: 0000-0001-7448-4595

Affiliations:
  • Monash University, Malaysia
  • Multimedia University, Malaysia (2012-2019)
  • Loughborough University, UK (2008-2012)
  • Swiss Federal Institute of Technology in Lausanne (EPFL), Switzerland (2007-2008)
  • Swinburne University of Technology, Sarawak Campus, Malaysia (2001-2007)


According to our database1, Raphael C.-W. Phan authored at least 235 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hessian unsupervised extreme learning machine.
Int. J. Mach. Learn. Cybern., May, 2024

Graph Autoencoders for Embedding Learning in Brain Networks and Major Depressive Disorder Identification.
IEEE J. Biomed. Health Informatics, March, 2024

Emotion-specific AUs for micro-expression recognition.
Multim. Tools Appl., 2024

ActNetFormer: Transformer-ResNet Hybrid Method for Semi-Supervised Action Recognition in Videos.
CoRR, 2024

Dynamic MRI reconstruction using low-rank plus sparse decomposition with smoothness regularization.
CoRR, 2024

CAFCT: Contextual and Attentional Feature Fusions of Convolutional Neural Networks and Transformer for Liver Tumor Segmentation.
CoRR, 2024

2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng., September, 2023

Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN.
IEEE Trans. Inf. Forensics Secur., 2023

ASF-YOLO: A Novel YOLO Model with Attentional Scale Sequence Fusion for Cell Instance Segmentation.
CoRR, 2023

BGF-YOLO: Enhanced YOLOv8 with Multiscale Attentional Feature Fusion for Brain Tumor Detection.
CoRR, 2023

CST-YOLO: A Novel Method for Blood Cell Detection Based on Improved YOLOv7 and CNN-Swin Transformer.
CoRR, 2023

RADIFUSION: A multi-radiomics deep learning based breast cancer risk prediction model using sequential mammographic images with image attention and bilateral asymmetry refinement.
CoRR, 2023

A Deep Probabilistic Spatiotemporal Framework for Dynamic Graph Representation Learning with Application to Brain Disorder Identification.
CoRR, 2023

RCS-YOLO: A Fast and High-Accuracy Object Detector for Brain Tumor Detection.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

Schatten p-norm based Image-to-Video Adaptation for Video Action Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2023

Cross-domain Transfer Learning and State Inference for Soft Robots via a Semi-supervised Sequential Variational Bayes Framework.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

Scheduling Dependent Batching Tasks.
Proceedings of the 52nd International Conference on Parallel Processing, 2023

A Unified Framework for Static and Dynamic Functional Connectivity Augmentation for Multi-Domain Brain Disorder Classification.
Proceedings of the IEEE International Conference on Image Processing, 2023

USURP: Universal Single-Source Adversarial Perturbations on Multimodal Emotion Recognition.
Proceedings of the IEEE International Conference on Image Processing, 2023

Self Supervised Bert for Legal Text Classification.
Proceedings of the IEEE International Conference on Acoustics, 2023

$\mathrm{C}\eta\iota \text{DAE}$: Cryptographically Distinguishing Autoencoder for Cipher Cryptanalysis.
Proceedings of the IEEE Global Communications Conference, 2023

Unbiased Decision-Making Framework in Long-Video Macro & Micro-Expression Spotting.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

ELEGANT: End-to-end Language Grounded Speech Denoiser for Efficient Generation of Talking Face.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Deepfake attribution: On the source identification of artificially generated images.
WIREs Data Mining Knowl. Discov., 2022

Invisible emotion magnification algorithm (IEMA) for real-time micro-expression recognition with graph-based features.
Multim. Tools Appl., 2022

A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities.
Neurocomputing, 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

Graph-Regularized Manifold-Aware Conditional Wasserstein GAN for Brain Functional Connectivity Generation.
CoRR, 2022

Transferable Class-Modelling for Decentralized Source Attribution of GAN-Generated Images.
CoRR, 2022

DeSCoVeR: Debiased Semantic Context Prior for Venue Recommendation.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Guess-It-Generator: Generating in a Lewis Signaling Framework through Logical Reasoning.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Persistent Items Tracking in Large Data Streams Based on Adaptive Sampling.
Proceedings of the IEEE INFOCOM 2022, 2022

Graph Autoencoder-Based Embedded Learning in Dynamic Brain Networks for Autism Spectrum Disorder Identification.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

GraphEx: Facial Action Unit Graph for Micro-Expression Classification.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

AdverFacial: Privacy-Preserving Universal Adversarial Perturbation Against Facial Micro-Expression Leakages.
Proceedings of the IEEE International Conference on Acoustics, 2022

Improved speech emotion recognition based on music-related audio features.
Proceedings of the 30th European Signal Processing Conference, 2022

2021
Strengthening speech content authentication against tampering.
Speech Commun., 2021

Faceless identification based on temporal strips.
Multim. Tools Appl., 2021

Cube Attacks on Round-Reduced TinyJAMBU.
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
IACR Cryptol. ePrint Arch., 2021

Graph Autoencoders for Embedding Learning in Brain Networks and Major Depressive Disorder Identification.
CoRR, 2021

Synthesize-It-Classifier: Learning a Generative Classifier through RecurrentSelf-analysis.
CoRR, 2021

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD.
IEEE Access, 2021

Network Reconfiguration via Diversity: Theoretical Foundation and Algorithm Design.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Synthesize-It-Classifier: Learning a Generative Classifier Through Recurrent Self-Analysis.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Cryptanalysis of genetic algorithm-based encryption scheme.
Multim. Tools Appl., 2020

FACS-Based Graph Features for Real-Time Micro-Expression Recognition.
J. Imaging, 2020

Reduced contact lifting of latent fingerprints from curved surfaces.
J. Inf. Secur. Appl., 2020

Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism.
IEEE Internet Things J., 2020

Seeing the Invisible: Survey of Video Motion Magnification and Small Motion Analysis.
ACM Comput. Surv., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

Privacy-preserving facial recognition based on temporal features.
Appl. Soft Comput., 2020

2019
Paradigm Shifts in Cryptographic Engineering.
IEEE Trans. Dependable Secur. Comput., 2019

Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.
IEEE Internet Things J., 2019

Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures.
Concurr. Comput. Pract. Exp., 2019

Dual-stream Shallow Networks for Facial Micro-expression Recognition.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
Hybrid Facial Regions Extraction for Micro-expression Recognition System.
J. Signal Process. Syst., 2018

Less is more: Micro-expression recognition from video using apex frame.
Signal Process. Image Commun., 2018

Separable authentication in encrypted HEVC video.
Multim. Tools Appl., 2018

Planting attack on latent fingerprints.
IET Biom., 2018

Cryptography and Future Security.
Discret. Appl. Math., 2018

A Survey of Automatic Facial Micro-expression Analysis: Databases, Methods and Challenges.
CoRR, 2018

SearchaStore: fast and secure searchable cloud services.
Clust. Comput., 2018

Parallel and High Speed Hashing in GPU for Telemedicine Applications.
IEEE Access, 2018

Micro-Expression Motion Magnification: Global Lagrangian vs. Local Eulerian Approaches.
Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition, 2018

Enriched Long-Term Recurrent Convolutional Network for Facial Micro-Expression Recognition.
Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition, 2018

2017
A Novel Sketch Attack for H.264/AVC Format-Compliant Encrypted Video.
IEEE Trans. Circuits Syst. Video Technol., 2017

Sparsity in Dynamics of Spontaneous Subtle Emotions: Analysis and Application.
IEEE Trans. Affect. Comput., 2017

Effective recognition of facial micro-expressions with video motion magnification.
Multim. Tools Appl., 2017

Higher order differentiation over finite fields with applications to generalising the cube attack.
Des. Codes Cryptogr., 2017

Commentary on "A block chaotic image encryption scheme based on self-adaptive modelling" [Applied Soft Computing 22 (2014) 351-357].
Appl. Soft Comput., 2017

Multimodal decomposition with magnification on micro-expressions and its impact on facial biometric recognition.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017

CUDA-SSL: SSL/TLS accelerated by GPU.
Proceedings of the International Carnahan Conference on Security Technology, 2017

A real time micro-expression detection system with LBP-TOP on a many-core processor.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Multimodal decomposition for enhanced subtle emotion recognition.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Reduced contact lifting of latent fingerprint.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification.
Wirel. Pers. Commun., 2016

Spontaneous subtle expression detection and recognition based on facial strain.
Signal Process. Image Commun., 2016

On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016

Multi-layer authentication scheme for HEVC video based on embedded statistics.
J. Vis. Commun. Image Represent., 2016

Sparsity in Dynamics of Spontaneous Subtle Emotions: Analysis & Application.
CoRR, 2016

Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture.
Clust. Comput., 2016

Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.
Cryptogr. Commun., 2016

Tuple Cryptanalysis: Slicing and Fusing Multisets.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Region-of-interest encryption in HEVC compressed video.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016

Smart, secure and seamless access control scheme for mobile devices.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Intrinsic two-dimensional local structures for micro-expression recognition.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Eulerian emotion magnification for subtle expression recognition.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Accelerating Multiple Precision Multiplication in GPU with Kepler Architecture.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Joint selective encryption and data embedding technique in HEVC video.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

Automatic Micro-expression Recognition from Long Video Using a Single Spotted Apex.
Proceedings of the Computer Vision - ACCV 2016 Workshops, 2016

2015
Cryptanalysis of a certificateless identification scheme.
Secur. Commun. Networks, 2015

A provable secure pairing-free certificateless identification scheme.
Int. J. Comput. Math., 2015

Comparison of cube attacks over different vector spaces.
IACR Cryptol. ePrint Arch., 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

HEVC video authentication using data embedding technique.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Monogenic Riesz wavelet representation for micro-expression recognition.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

Are subtle expressions too sparse to recognize?
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

Automatic apex frame spotting in micro-expression database.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

2014
The Hash Function BLAKE
Information Security and Cryptography, Springer, ISBN: 978-3-662-44757-4, 2014

Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification.
IEEE J. Biomed. Health Informatics, 2014

Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud.
IEEE Trans. Dependable Secur. Comput., 2014

An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2014

Spontaneous expression classification in the encrypted domain.
CoRR, 2014

Optical strain based recognition of subtle emotions.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

High speed implementation of symmetric block cipher on GPU.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

A new spontaneous expression database and a study of classification-based expression analysis methods.
Proceedings of the 22nd European Signal Processing Conference, 2014

A Privacy-Preserving and Cheat-Resilient electricity consumption reporting Scheme for smart grids.
Proceedings of the International Conference on Computer, 2014

LBP with Six Intersection Points: Reducing Redundant Information in LBP-TOP for Micro-expression Recognition.
Proceedings of the Computer Vision - ACCV 2014, 2014

Spontaneous Subtle Expression Recognition: Imbalanced Databases and Solutions.
Proceedings of the Computer Vision - ACCV 2014, 2014

Subtle Expression Recognition Using Optical Strain Weighted Features.
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014

2013
Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis.
IEEE Trans. Affect. Comput., 2013

Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013

On the security of a modified Beth identity-based identification scheme.
Inf. Process. Lett., 2013

Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester.
Int. J. Comput. Math., 2013

Computing the linear complexity for sequences with characteristic polynomial f v.
Cryptogr. Commun., 2013

Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

An authentication framework for peer-to-peer cloud.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers.
Proceedings of the SECRYPT 2013, 2013

An Efficient and Provably Secure Certificateless Identification Scheme.
Proceedings of the SECRYPT 2013, 2013

Efficient Generation of Elementary Sequences.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Vickrey-Clarke-Groves for privacy-preserving collaborative classification.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Analyzing the Secure Simple Pairing in Bluetooth v4.0.
Wirel. Pers. Commun., 2012

Cheating Resistance of a Secure Incentive Protocol for Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2012

Efficient encryption with keyword search in mobile networks.
Secur. Commun. Networks, 2012

Security models for delegated keyword searching within encrypted contents.
J. Internet Serv. Appl., 2012

A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR.
EURASIP J. Wirel. Commun. Netw., 2012

On Integral Distinguishers of Rijndael Family of Ciphers.
Cryptologia, 2012

A survey of potential architectures for communication in heterogeneous networks.
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012

A Formally Verified Device Authentication Protocol Using Casper/FDR.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Index Tables of Finite Fields and Modular Golomb Rulers.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes.
Wirel. Pers. Commun., 2011

Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
Wirel. Pers. Commun., 2011

Non-repudiable authentication and billing architecture for wireless mesh networks.
Wirel. Networks, 2011

VLSI Characterization of the Cryptographic Hash Function BLAKE.
IEEE Trans. Very Large Scale Integr. Syst., 2011

On the security of ownership watermarking of digital images based on singular value decomposition.
J. Electronic Imaging, 2011

On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers.
Inf. Process. Lett., 2011

Notions and relations for RKA-secure permutation and function families.
Des. Codes Cryptogr., 2011

Attribution of attack trees.
Comput. Electr. Eng., 2011

DDoS attacks traffic and Flash Crowds traffic simulation with a hardware test center platform.
Proceedings of the 2011 World Congress on Internet Security, 2011

On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR.
Proceedings of the Advances in Image and Video Technology - 5th Pacific Rim Symposium, 2011

Linear complexity for sequences with characteristic polynomial ƒ<sup>v</sup>.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On the Stability of m-Sequences.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Energy-Efficient Cryptographic Engineering Paradigm.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction.
Proceedings of the Future Generation Information Technology, 2011

On the Security of a Robust Watermarking Scheme Based on RDWT-SVD.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Analysis on the Improved SVD-Based Watermarking Scheme.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Security Models for Heterogeneous Networking.
Proceedings of the SECRYPT 2010, 2010

Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Adversarial Security: Getting to the Root of the Problem.
Proceedings of the Open Research Problems in Network Security, 2010

Evidential Notions of Defensibility and Admissibility with Property Preservation.
Proceedings of the Open Research Problems in Network Security, 2010

Quality of detectability (QoD) and QoD-aware AAT-based attack detection.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Integral Distinguishers of Some SHA-3 Candidates.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

Providing Security in 4G Systems: Unveiling the Challenges.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI.
IEEE Trans. Dependable Secur. Comput., 2009

Improved Cryptanalysis of Skein.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of the application secure alternative to SNMP (APSSNMP).
Comput. Stand. Interfaces, 2009

Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson.
Cryptologia, 2009

Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher.
Cryptologia, 2009

A Cryptanalytic View of the NSA's Skipjack Block Cipher Design.
Proceedings of the Advances in Information Security and Assurance, 2009

Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols.
Proceedings of the Third International Conference on Network and System Security, 2009

On the Design of <i>Forgiving</i> Biometric Security Systems.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Security and Privacy Preservation in Human-Involved Networks.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Metrics for network forensics conviction evidence.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

On Hashing with Tweakable Ciphers.
Proceedings of IEEE International Conference on Communications, 2009

On the Impossibility of Strong Encryption Over .
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

Security of Group Key Exchange Protocols with Different Passwords.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks.
Proceedings of the Progress in Cryptology, 2009

2008
Tampering with a watermarking-based image authentication scheme.
Pattern Recognit., 2008

Cryptanalysis of simple three-party key exchange protocol (S-3PAKE).
Inf. Sci., 2008

Cryptanalysis of e-mail protocols providing perfect forward secrecy.
Comput. Stand. Interfaces, 2008

Improved Related-key Attacks on Desx and Desx+.
Cryptologia, 2008

Proxy Re-signatures in the Standard Model.
Proceedings of the Information Security, 11th International Conference, 2008

Privacy of Recent RFID Authentication Protocols.
Proceedings of the Information Security Practice and Experience, 2008

Attacks on SVD-Based Watermarking Schemes.
Proceedings of the Intelligence and Security Informatics, 2008

Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

The Hash Function Family LAKE.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Attacks on Improved Key Distribution Protocols with Perfect Reparability.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Analysis of a zero location based authentication scheme for biomedical images.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?.
Proceedings of the Progress in Cryptology, 2008

Traceable Privacy of Recent Provably-Secure RFID Protocols.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Reducing the exhaustive key search of the Data Encryption Standard (DES).
Comput. Stand. Interfaces, 2007

Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks.
Comput. Stand. Interfaces, 2007

On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers.
Proceedings of the Provable Security, 2007

Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Proceedings of the Provable Security, 2007

(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Security-Preserving Asymmetric Protocol Encapsulation.
Proceedings of the Information Security and Cryptology, 2007

Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection.
Proceedings of the Computational Science and Its Applications, 2007

2006
A Framework for Describing Block Cipher Cryptanalysis.
IEEE Trans. Computers, 2006

On the security of the WinRAR encryption feature.
Int. J. Inf. Sec., 2006

Security considerations for incremental hash functions based on pair block chaining.
Comput. Secur., 2006

Cryptanalysis of two password-based authentication schemes using smart cards.
Comput. Secur., 2006

Cryptanalysis of some improved password-authenticated key exchange schemes.
Comput. Commun., 2006

On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols.
Proceedings of the Progress in Cryptology, 2006

Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis.
Proceedings of the Smart Card Research and Advanced Applications, 2006

Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Fixing the integrated Diffie-Hellman-DSA key exchange protocol.
IEEE Commun. Lett., 2005

How to Explain Block Cipher Cryptanalysis to your Kids.
Cryptologia, 2005

Security limitations of an authorized anonymous ID-based scheme for mobile communication.
IEEE Commun. Mag., 2005

Advanced Slide Attacks Revisited: Realigning Slide on DES.
Proceedings of the Progress in Cryptology, 2005

New Multiset Attacks on Rijndael with Large Blocks.
Proceedings of the Progress in Cryptology, 2005

On the Security of the WinRAR Encryption Method.
Proceedings of the Information Security, 8th International Conference, 2005

On the Security Bounds of CMC, EME, EME<sup>+</sup> and EME<sup>*</sup> Modes of Operation.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Related-Mode Attacks on Block Cipher Modes of Operation.
Proceedings of the Computational Science and Its Applications, 2005

On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.
Proceedings of the Computational Science and Its Applications, 2005

Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

On the Insecurity of the Microsoft Research Conference Management Tool (MSRCMT) System.
Proceedings of the 4th International Conference on IT in Asia, 2005

On the Security of a Pay-TV Scheme of ICON 2001.
Proceedings of the 4th International Conference on IT in Asia, 2005

Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Further attacks and comments on 'security of two remote user authentication schemes using smart cards'.
IEEE Trans. Consumer Electron., 2004

Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES).
Inf. Process. Lett., 2004

Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor.
Proceedings of the Information Security, 7th International Conference, 2004

Related-Key Attacks on Triple-DES and DESX Variants.
Proceedings of the Topics in Cryptology, 2004

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Impossible Differential Cryptanalysis of Mini-AES.
Cryptologia, 2003

Attacks on ATM Authentication Protocols Proposed at WEC2002.
Proceedings of the 3th International Conference on IT in Asia, 2003

2002
Mini Advanced Encryption Standard (Mini-AES): a Testbed for Cryptanalysis Students.
Cryptologia, 2002

Further Notes for a Self-Study Course in Block-Cipher Cryptanalysis.
Cryptologia, 2002

Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks.
Proceedings of the Information Security and Cryptology, 2002


  Loading...