default search action
Kenneth Koon-Ho Wong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c36]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. ACISP 2023: 89-108 - 2021
- [c35]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Algebraic Attacks on Grain-Like Keystream Generators. ICISC 2021: 241-270 - 2020
- [c34]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output. ATIS 2020: 42-60 - [i16]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material). IACR Cryptol. ePrint Arch. 2020: 22 (2020)
2010 – 2019
- 2019
- [j6]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault analysis of AEZ. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j5]Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong:
Random Fault Attacks on a Class of Stream Ciphers. Secur. Commun. Networks 2019: 1680263:1-1680263:12 (2019) - [c33]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. ICISC 2019: 297-315 - 2018
- [j4]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptogr. 2(1): 4 (2018) - [j3]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A fundamental flaw in the ++AE authenticated encryption mode. J. Math. Cryptol. 12(1): 37-42 (2018) - [c32]Md. Iftekhar Salam, Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault attacks on Tiaoxin-346. ACSW 2018: 5:1-5:9 - [i15]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. IACR Cryptol. ePrint Arch. 2018: 66 (2018) - 2017
- [c31]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes. ACISP (1) 2017: 285-305 - [c30]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A Fault-based Attack on AEZ v4.2. TrustCom/BigDataSE/ICESS 2017: 634-641 - [c29]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. TrustCom/BigDataSE/ICESS 2017: 961-966 - [i14]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes. IACR Cryptol. ePrint Arch. 2017: 717 (2017) - 2016
- [c28]Hassan Qahur Al Mahri, Leonie Ruth Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Forgery attacks on ++AE authenticated encryption mode. ACSW 2016: 33 - [c27]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Ruth Simpson, Ed Dawson, Josef Pieprzyk:
Finding state collisions in the authenticated encryption stream cipher ACORN. ACSW 2016: 36 - [c26]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. ATIS 2016: 15-26 - [c25]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. ATIS 2016: 41-53 - [i13]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2016: 743 (2016) - 2015
- [c24]Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Correcting flaws in Mitchell's analysis of EPBC. AISC 2015: 57-60 - [i12]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2015: 918 (2015) - 2014
- [c23]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Weak key-IV Pairs in the A5/1 Stream Cipher. AISC 2014: 23-36 - [c22]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers (Poster). AISC 2014: 77-81 - [c21]Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher. SETA 2014: 220-233 - 2013
- [j2]Mufeed Al Mashrafi, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Indirect message injection for MAC generation. J. Math. Cryptol. 7(3): 253-277 (2013) - [c20]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slid Pairs in the Initialisation of the A5/1 Stream Cipher. AISC 2013: 3-12 - [i11]Sui-Guan Teo, Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State convergence in bit-based stream ciphers. IACR Cryptol. ePrint Arch. 2013: 96 (2013) - [i10]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers. IACR Cryptol. ePrint Arch. 2013: 240 (2013) - 2012
- [c19]Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. ACISP 2012: 138-151 - [c18]Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
State convergence in the initialisation of the Sfinks stream cipher. AISC 2012: 27-32 - [c17]Harry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
A General Model for MAC Generation Using Direct Injection. Inscrypt 2012: 198-215 - [c16]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slide attacks on the Sfinks stream cipher. ICSPCS 2012: 1-10 - 2011
- [j1]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
An exploration of affine group laws for elliptic curves. J. Math. Cryptol. 5(1): 1-50 (2011) - [c15]Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson:
State convergence and the effectiveness of time-memory-data tradeoffs. IAS 2011: 92-97 - [c14]Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State Convergence in the Initialisation of Stream Ciphers. ACISP 2011: 75-88 - [c13]Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson:
Algebraic analysis of the SSS stream cipher. SIN 2011: 199-204 - 2010
- [c12]Kenneth Koon-Ho Wong, Gregory V. Bard:
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. ACISP 2010: 19-36 - [c11]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. AFRICACRYPT 2010: 203-224 - [c10]Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks. AISC 2010: 67-74 - [c9]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Delaying Mismatched Field Multiplications in Pairing Computations. WAIFI 2010: 196-214 - [i9]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. IACR Cryptol. ePrint Arch. 2010: 104 (2010) - [i8]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Delaying Mismatched Field Multiplications in Pairing Computations. IACR Cryptol. ePrint Arch. 2010: 123 (2010) - [i7]Kenneth Koon-Ho Wong, Gregory V. Bard:
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. IACR Cryptol. ePrint Arch. 2010: 349 (2010) - [i6]Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson:
State convergence and keyspace reduction of the Mixer stream cipher. IACR Cryptol. ePrint Arch. 2010: 628 (2010)
2000 – 2009
- 2009
- [c8]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Jacobi Quartic Curves Revisited. ACISP 2009: 452-468 - [c7]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Faster Group Operations on Elliptic Curves. AISC 2009: 7-19 - [c6]Muhammad Reza Z'aba, Håvard Raddum, Leonie Simpson, Ed Dawson, Matt Henricksen, Kenneth Koon-Ho Wong:
Algebraic Analysis of LEX. AISC 2009: 33-45 - [c5]Muhammad Reza Z'aba, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Linearity within the SMS4 Block Cipher. Inscrypt 2009: 248-265 - [c4]Craig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Faster Pairings on Special Weierstrass Curves. Pairing 2009: 89-101 - [i5]Craig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Faster Pairings on Special Weierstrass Curves. IACR Cryptol. ePrint Arch. 2009: 243 (2009) - [i4]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Jacobi Quartic Curves Revisited. IACR Cryptol. ePrint Arch. 2009: 312 (2009) - [i3]Kenneth Koon-Ho Wong, Gregory V. Bard, Robert H. Lewis:
Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications. IACR Cryptol. ePrint Arch. 2009: 343 (2009) - 2008
- [c3]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Twisted Edwards Curves Revisited. ASIACRYPT 2008: 326-343 - [i2]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Twisted Edwards Curves Revisited. IACR Cryptol. ePrint Arch. 2008: 522 (2008) - 2007
- [i1]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Faster Group Operations on Elliptic Curves. IACR Cryptol. ePrint Arch. 2007: 441 (2007) - 2006
- [c2]Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong:
Algebraic Attacks on Clock-Controlled Stream Ciphers. ACISP 2006: 1-16 - [c1]Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai:
Algebraic Attacks on Clock-Controlled Cascade Ciphers. INDOCRYPT 2006: 32-47
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint