Browse By Person: Wong, Kenneth

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 31.

Journal Article

Bartlett, Harry, Al Mashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2013) A general model for MAC generation using direct injection. Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
Number of full-text downloads 57

Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.
Number of full-text downloads 12

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Simpson, Leonie R., & Dawson, Edward (2012) State convergence and keyspace reduction of the mixer stream cipher. Journal of Discrete Mathematical Sciences and Cryptography, 15, pp. 89-104.
Number of full-text downloads 78

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2011) An exploration of affine group laws for elliptic curves. Journal of Mathematical Cryptology, 5(1), pp. 1-50.

Z'aba, Muhammad Reza, Wong, Kenneth Koon-Ho, Dawson, Edward Pyle, & Simpson, Leonie Ruth (2010) Algebraic analysis of small Scale LEX-BES. International Journal of Cryptology Research, 2(1), pp. 51-62.

Costello, Craig, Hisil, Huseyin, Boyd, Colin, Gonzalez Nieto, Juan Manuel, & Wong, Kenneth Koon-Ho (2009) Faster pairings on special Weierstrass curves. Lecture Notes in Computer Science, LNCS 5, pp. 89-101.
Number of full-text downloads 126
Number of citations in Scopus 13
Number of citations in Web of Science® 12

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Jacobi quartic curves revisited. Lecture Notes in Computer Science, LNCS 5594, pp. 452-468.
Number of citations in Scopus 5
Number of citations in Web of Science® 2

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2008) Twisted Edwards curves revisited. Lecture Notes in Computer Science, LNCS 5350, pp. 326-343.
Number of citations in Scopus 30
Number of citations in Web of Science® 24

Conference Paper

Di, Binbin, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho (2015) Correcting flaws in Mitchell’s analysis of EPBC. In Welch, Ian & Yi, Xun (Eds.) Proceedings of the 13th Australasian Information Security Conference, Conferences in Research and Practice in Information Technology (CRPIT), Sydney, NSW, pp. 57-60.
Number of full-text downloads 10

Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2014) Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher. In Winterhof, Arne & Schmidt, Kai-Uwe (Eds.) Lecture Notes in Computer Science, Springer-Verlag, Melbourne, VIC, pp. 220-233.

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
Number of full-text downloads 18

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Number of full-text downloads 48

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Number of full-text downloads 113
Number of citations in Scopus 1

ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Number of full-text downloads 57

Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.

Teo, Sui-Guan, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence and the effectiveness of time-memory-data tradeoffs. In Abraham, Ajith, Zheng, Daniel, Agrawal, Dharma, Abdollah, Mohd Faizal, Corchado, Emilio, Casola, Valentina, et al. (Eds.) Proceedings of the 7th International Conference on Information Assurance and Security, IEEE, Universiti Teknikal Malaysia Melaka , Malacca, Malaysia, pp. 92-97.
Number of full-text downloads 87

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 106
Number of citations in Scopus 1

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Delaying mismatched field multiplications in pairing computations. In Arithmetic of Finite Fields : Third International Workshop, WAIFI 2010, Proceedings, Springer Verlag, Istanbul, Turkey, pp. 196-214.
Number of full-text downloads 80

Z'aba, Muhammad Reza, Wong, Kenneth, Dawson, Edward, & Simpson, Leonie (2010) Algebraic analysis of small scale LEX-BES. In Proceeding of the 2nd International Cryptology Conference 2010, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia, pp. 77-82.
Number of full-text downloads 154

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Avoiding full extension field arithmetic in pairing computations. In Progress in Cryptology - AFRICACRYPT 2010, Springer Verlag, Stellenbosch, South Africa, pp. 203-224.
Number of full-text downloads 65
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Wong, Kenneth Koon-Ho & Bard, Gregory V. (2010) Improved algebraic cryptanalysis of QUAD, Bivium and Trivium via graph partitioning on equation systems. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney, pp. 19-36.
Number of full-text downloads 376

Z'aba, Muhammad Reza, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2010) Linearity within the SMS4 Block Cipher. In Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer-Verlag, Beijing, China, pp. 248-265.
Number of full-text downloads 192

Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2010) An analysis of the RC4 family of stream ciphers against algebraic attacks. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology CRPIT, Australian Computer Society, Brisbane, Australia, pp. 67-74.
Number of full-text downloads 359

Z'aba, Muhammad Reza, Raddum, Havard, Simpson, Leonie, Dawson, Ed, Henricksen, Matt, & Wong, Kenneth (2009) Algebraic Analysis of LEX. In Brankovic, Ljiljana & Susilo, Willy (Eds.) Australasian Information Security Conference (AISC2009), 20-23 January 2009, Wellington, New Zealand.
Number of full-text downloads 151

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Faster group operations on elliptic curves. In Information Security 2009 : proceedings of the 7th Australasian Information Security Conference, CRPIT/Springer, Wellington, New Zealand, pp. 11-19.
Number of full-text downloads 78
Number of citations in Scopus 5

Al Hinai, Sultan, Batten, Lynn, Colbert, Bernard, & Wong, Kenneth (2006) Algebraic Attacks on Clock-Controlled Cascade Ciphers. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.
Number of citations in Web of Science® 4

Al Hinai, Sultan, Batten, Lynn, Colbert, Bernard, & Wong, Kenneth (2006) Algebraic Attacks on Clock-Controlled Stream Ciphers. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 8
Number of citations in Web of Science® 11

Carter, Gary, Dawson, Edward, & Wong, Kenneth (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Eigenthaler, G, Goldstern, M, Muller, W, & Winkler, R (Eds.) Contributions to General Algebra 17, 26 - 29 May 2005, Austria, Vienna.

QUT Thesis

Working Paper

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 157

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 53

This list was generated on Sat Mar 28 05:54:29 2015 AEST.