default search action
Khoongming Khoo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j11]Sze Ling Yeo, Duc-Phong Le, Khoongming Khoo:
Improved algebraic attacks on lightweight block ciphers. J. Cryptogr. Eng. 11(1): 1-19 (2021) - [i14]Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo:
Algebraic Differential Fault Analysis on SIMON block cipher. IACR Cryptol. ePrint Arch. 2021: 436 (2021)
2010 – 2019
- 2019
- [j10]Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo:
Algebraic Differential Fault Analysis on SIMON Block Cipher. IEEE Trans. Computers 68(11): 1561-1572 (2019) - 2018
- [c30]Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim:
Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count. AFRICACRYPT 2018: 51-71 - 2017
- [j9]Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. IACR Trans. Symmetric Cryptol. 2017(2): 59-83 (2017) - [c29]Sze Ling Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low:
An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis. ACNS 2017: 518-536 - [i13]Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim:
Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version). IACR Cryptol. ePrint Arch. 2017: 1084 (2017) - 2016
- [i12]Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. IACR Cryptol. ePrint Arch. 2016: 25 (2016) - 2015
- [c28]Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. FSE 2015: 471-493 - [i11]Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. IACR Cryptol. ePrint Arch. 2015: 258 (2015) - 2014
- [c27]Khoongming Khoo, Thomas Peyrin, Axel York Poschmann, Huihui Yap:
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. CHES 2014: 433-450 - [i10]Khoongming Khoo, Thomas Peyrin, Axel Poschmann, Huihui Yap:
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. IACR Cryptol. ePrint Arch. 2014: 530 (2014) - 2013
- [j8]Huihui Yap, Khoongming Khoo, Axel Poschmann:
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4. Int. J. Appl. Cryptogr. 3(1): 1-20 (2013) - [c26]Ruth Ng Ii-Yung, Khoongming Khoo, Raphael C.-W. Phan:
On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers. SECRYPT 2013: 305-312 - 2012
- [c25]Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks. AFRICACRYPT 2012: 270-286 - [c24]Khoongming Khoo, Chik How Tan:
New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers. AsiaCCS 2012: 20-21 - [i9]Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks. IACR Cryptol. ePrint Arch. 2012: 234 (2012) - 2011
- [j7]Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap:
Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure. Cryptogr. Commun. 3(3): 141-164 (2011) - [j6]Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling:
Side-Channel Resistant Crypto for Less than 2, 300 GE. J. Cryptol. 24(2): 322-345 (2011) - [c23]Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen:
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. CANS 2011: 76-97 - [c22]Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan:
A Comparison of Post-Processing Techniques for Biased Random Number Generators. WISTP 2011: 175-190 - [c21]Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:
AES Variants Secure against Related-Key Differential and Boomerang Attacks. WISTP 2011: 191-207 - [i8]Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:
AES Variants Secure Against Related-Key Differential and Boomerang Attacks. IACR Cryptol. ePrint Arch. 2011: 72 (2011) - 2010
- [c20]Huihui Yap, Khoongming Khoo, Axel Poschmann:
Parallelizing the Camellia and SMS4 Block Ciphers. AFRICACRYPT 2010: 387-406 - [i7]Huihui Yap, Khoongming Khoo, Axel Poschmann:
Parallelizing the Camellia and SMS4 Block Ciphers - Extended version. IACR Cryptol. ePrint Arch. 2010: 426 (2010)
2000 – 2009
- 2009
- [j5]Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee:
Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 11-21 (2009) - [c19]Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap:
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. ACISP 2009: 73-89 - [c18]Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk:
Extensions of the Cube Attack Based on Low Degree Annihilators. CANS 2009: 87-102 - [c17]Jiali Choy, Huihui Yap, Khoongming Khoo:
An Analysis of the Compact XSL Attack on BES and Embedded SMS4. CANS 2009: 103-118 - [c16]Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim:
On a Construction of Short Digests for Authenticating Ad Hoc Networks. ICCSA (2) 2009: 863-876 - [c15]Guanhan Chew, Aileen Zhang, Khoongming Khoo:
Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions. SECRYPT 2009: 159-162 - [i6]Jiali Choy, Khoongming Khoo, Chuan-Wen Loe:
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. IACR Cryptol. ePrint Arch. 2009: 20 (2009) - [i5]Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk:
Extensions of the Cube Attack based on Low Degree Annihilators. IACR Cryptol. ePrint Arch. 2009: 49 (2009) - [i4]Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap:
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version). IACR Cryptol. ePrint Arch. 2009: 178 (2009) - 2008
- [j4]Khoongming Khoo, Chu-Wee Lim, Guang Gong:
Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. Appl. Algebra Eng. Commun. Comput. 19(4): 323-338 (2008) - [j3]Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe:
On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity. Adv. Math. Commun. 2(2): 201-221 (2008) - [c14]Jiali Choy, Khoongming Khoo, Chuan-Wen Loe:
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. ICICS 2008: 157-173 - [c13]Jiali Choy, Khoongming Khoo:
New Applications of Differential Bounds of the SDS Structure. ISC 2008: 367-384 - [c12]Guanhan Chew, Khoongming Khoo:
A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers. SECRYPT 2008: 300-305 - [i3]Jiali Choy, Khoongming Khoo:
New Applications of Differential Bounds of the SDS Structure. IACR Cryptol. ePrint Arch. 2008: 395 (2008) - 2007
- [j2]Khoongming Khoo, Guang Gong:
New Construction for Balanced Boolean Functions with Very High Nonlinearity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 29-35 (2007) - [c11]Chu-Wee Lim, Khoongming Khoo:
An Analysis of XSL Applied to BES. FSE 2007: 242-253 - [c10]Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe:
Generalized Correlation Analysis of Vectorial Boolean Functions. FSE 2007: 382-398 - [c9]Chuan-Wen Loe, Khoongming Khoo:
Side Channel Attacks on Irregularly Decimated Generators. ICISC 2007: 116-130 - [c8]Swee-Huay Heng, Wun-She Yap, Khoongming Khoo:
Linkability of Some Blind Signature Schemes. WISTP 2007: 80-89 - [i2]Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe:
On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity. IACR Cryptol. ePrint Arch. 2007: 207 (2007) - [i1]Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee:
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions. IACR Cryptol. ePrint Arch. 2007: 242 (2007) - 2006
- [j1]Khoongming Khoo, Guang Gong, Douglas R. Stinson:
A New Characterization of Semi-bent and Bent Functions on Finite Fields*. Des. Codes Cryptogr. 38(2): 279-295 (2006) - [c7]Khoongming Khoo, Guang Gong, Hian-Kiat Lee:
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. ACNS 2006: 194-209 - [c6]Khoongming Khoo, Swee-Huay Heng:
New Constructions of Universal Hash Functions Based on Function Sums. ICCSA (3) 2006: 416-425 - [c5]Chuan-Wen Loe, Khoongming Khoo:
Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. SECRYPT 2006: 135-140 - 2005
- [c4]Khoongming Khoo, Guat-Ee Tan, Hian-Kiat Lee, Guang Gong:
Comparison of boolean function design. ISIT 2005: 1111-1115 - 2004
- [c3]Khoongming Khoo, Swee-Huay Heng:
Universal hash functions over GF(2n). ISIT 2004: 205 - 2003
- [c2]Khoongming Khoo, Guang Gong:
New Constructions for Resilient and Highly Nonlinear Boolean Functions. ACISP 2003: 498-509 - [c1]Guang Gong, Khoongming Khoo:
Additive Autocorrelation of Resilient Boolean Functions. Selected Areas in Cryptography 2003: 275-290
Coauthor Index
aka: Axel York Poschmann
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint