Chuan-Wen Loe

Learn More
Release of soluble Granzymes (sGranzymes) is considered to reflect activation of cytotoxic T lymphocytes and NK cells. sGranzymes and a number of pro-inflammatory cytokines were measured in plasma of malaria patients with natural or experimentally induced Plasmodium falciparum infections. Concentrations of sGranzyme A and B, IL-10, IL-12p70 and CRP were(More)
We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those(More)
A cross sectional study on the prevalence of Campylobacter jejuni/coli and its possible aetiologic role in childhood diarrhoea in Yaounde was undertaken in 272 children presenting with diarrhoea and 157 age matched controls from April 1989 to October 1990. Stool cultures were performed according to standard techniques for Campylobacter jejuni/coli shigella(More)
Complexity Science studies the collective behaviour of a system of interacting agents, and a graph (network) is often an apt representation to visualize such systems. Traditionally the agents are expressed as the vertices, and an edge between a vertex pair implies that there are interactions between them. However the modern outlook in Network Science is to(More)
Le Fort I osteotomies were performed on three juvenile Macaca nemestrina monkeys with midface deficiencies from prior extraoral traction. The maxillas of these monkeys were moved anteriorly an amount necessary to achieve about 8 mm. of horizontal overjet. Interosseous wires were used to stabilize the segments; the animals were not placed in intermaxillary(More)
In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits and apply the meet-in-the-middle attack on multiple ciphertexts. The second attack (TMTO-MTM) is derived from applying the time-memory trade-off attack to the(More)
We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those(More)
We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those(More)