QUT ePrints

Browse By Person: Wong, Kenneth

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 29.

Journal Article

Bartlett, Harry, ALMashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2013) A general model for MAC generation using direct injection. Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
Number of full-text downloads 46

Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Simpson, Leonie R., & Dawson, Edward (2012) State convergence and keyspace reduction of the mixer stream cipher. Journal of Discrete Mathematical Sciences and Cryptography, 15, pp. 89-104.
Number of full-text downloads 64

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2011) An exploration of affine group laws for elliptic curves. Journal of Mathematical Cryptology, 5(1), pp. 1-50.

Z'aba, Muhammad Reza, Wong, Kenneth Koon-Ho, Dawson, Edward Pyle, & Simpson, Leonie Ruth (2010) Algebraic analysis of small Scale LEX-BES. International Journal of Cryptology Research, 2(1), pp. 51-62.

Costello, Craig, Hisil, Huseyin, Boyd, Colin, Gonzalez Nieto, Juan Manuel, & Wong, Kenneth Koon-Ho (2009) Faster pairings on special Weierstrass curves. Lecture Notes in Computer Science, LNCS 5, pp. 89-101.
Number of full-text downloads 106
Number of citations in Scopus 12
Number of citations in Web of Science® 12

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Jacobi quartic curves revisited. Lecture Notes in Computer Science, LNCS 5594, pp. 452-468.
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2008) Twisted Edwards curves revisited. Lecture Notes in Computer Science, LNCS 5350, pp. 326-343.
Number of citations in Scopus 28
Number of citations in Web of Science® 16

Conference Paper

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
Number of full-text downloads 12

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Number of full-text downloads 23

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Number of full-text downloads 82

ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Number of full-text downloads 45

Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.

Teo, Sui-Guan, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence and the effectiveness of time-memory-data tradeoffs. In Abraham, Ajith, Zheng, Daniel, Agrawal, Dharma, Abdollah, Mohd Faizal, Corchado, Emilio, Casola, Valentina, et al. (Eds.) Proceedings of the 7th International Conference on Information Assurance and Security, IEEE, Universiti Teknikal Malaysia Melaka , Malacca, Malaysia, pp. 92-97.
Number of full-text downloads 72

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 90
Number of citations in Scopus 1

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Delaying mismatched field multiplications in pairing computations. In Arithmetic of Finite Fields : Third International Workshop, WAIFI 2010, Proceedings, Springer Verlag, Istanbul, Turkey, pp. 196-214.
Number of full-text downloads 69

Z'aba, Muhammad Reza, Wong, Kenneth, Dawson, Edward, & Simpson, Leonie (2010) Algebraic analysis of small scale LEX-BES. In Proceeding of the 2nd International Cryptology Conference 2010, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia, pp. 77-82.
Number of full-text downloads 131

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Avoiding full extension field arithmetic in pairing computations. In Progress in Cryptology - AFRICACRYPT 2010, Springer Verlag, Stellenbosch, South Africa, pp. 203-224.
Number of full-text downloads 62
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Wong, Kenneth Koon-Ho & Bard, Gregory V. (2010) Improved algebraic cryptanalysis of QUAD, Bivium and Trivium via graph partitioning on equation systems. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney, pp. 19-36.
Number of full-text downloads 348

Z'aba, Muhammad Reza, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2010) Linearity within the SMS4 Block Cipher. In Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer-Verlag, Beijing, China, pp. 248-265.
Number of full-text downloads 164

Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2010) An analysis of the RC4 family of stream ciphers against algebraic attacks. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology CRPIT, Australian Computer Society, Brisbane, Australia, pp. 67-74.
Number of full-text downloads 319

Z'aba, Muhammad Reza, Raddum, Havard, Simpson, Leonie, Dawson, Ed, Henricksen, Matt, & Wong, Kenneth (2009) Algebraic Analysis of LEX. In Brankovic, Ljiljana & Susilo, Willy (Eds.) Australasian Information Security Conference (AISC2009), 20-23 January 2009, Wellington, New Zealand.
Number of full-text downloads 126

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Faster group operations on elliptic curves. In Information Security 2009 : proceedings of the 7th Australasian Information Security Conference, CRPIT/Springer, Wellington, New Zealand, pp. 11-19.
Number of full-text downloads 65
Number of citations in Scopus 4

Al Hinai, Sultan, Batten, Lynn, Colbert, Bernard, & Wong, Kenneth (2006) Algebraic Attacks on Clock-Controlled Cascade Ciphers. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.
Number of citations in Web of Science® 4

Al Hinai, Sultan, Batten, Lynn, Colbert, Bernard, & Wong, Kenneth (2006) Algebraic Attacks on Clock-Controlled Stream Ciphers. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 8
Number of citations in Web of Science® 11

Carter, Gary, Dawson, Edward, & Wong, Kenneth (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Eigenthaler, G, Goldstern, M, Muller, W, & Winkler, R (Eds.) Contributions to General Algebra 17, 26 - 29 May 2005, Austria, Vienna.

QUT Thesis

Working Paper

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 119

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 41

This list was generated on Sat Jul 19 08:32:00 2014 EST.