#### Filter Results:

- Full text PDF available (11)

#### Publication Year

1981

2016

- This year (0)
- Last 5 years (5)
- Last 10 years (10)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

#### Organism

Learn More

- C C Hermsen, Y Konijnenberg, +7 authors R W Sauerwein
- Clinical and experimental immunology
- 2003

Release of soluble Granzymes (sGranzymes) is considered to reflect activation of cytotoxic T lymphocytes and NK cells. sGranzymes and a number of pro-inflammatory cytokines were measured in plasma of malaria patients with natural or experimentally induced Plasmodium falciparum infections. Concentrations of sGranzyme A and B, IL-10, IL-12p70 and CRP were… (More)

- S Koulla-Shiro, C Loe, T Ekoe
- The Central African journal of medicine
- 1995

A cross sectional study on the prevalence of Campylobacter jejuni/coli and its possible aetiologic role in childhood diarrhoea in Yaounde was undertaken in 272 children presenting with diarrhoea and 157 age matched controls from April 1989 to October 1990. Stool cultures were performed according to standard techniques for Campylobacter jejuni/coli shigella… (More)

- Chuan-Wen Loe, Henrik Jeldtoft Jensen
- ArXiv
- 2014

Multiplex is a set of graphs on the same vertex set, i.e. It is a generalized graph to model multiple relationships with parallel edges between vertices. This paper is a literature review of existing communities detection algorithms for multiplex and a comparative analysis of them.

- Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
- FSE
- 2007

We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher through-put than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those… (More)

- Chuan-Wen Loe, Henrik Jeldtoft Jensen
- ArXiv
- 2012

Random networks generators like Erd˝ os-Rényi, Watts-Strogatz and Barabási-Albert models are used as models to study real-world networks. Let G 1 (V, E 1) and G 2 (V, E 2) be two such networks on the same vertex set V. This paper studies the degree distribution and clustering coefficient of the resultant networks,

- Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
- IACR Cryptology ePrint Archive
- 2008

In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits and apply the meet-in-the-middle attack on multiple ciphertexts. The second attack (TMTO-MTM) is derived from applying the time-memory trade-off attack to the… (More)

- Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
- Adv. in Math. of Comm.
- 2008

We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those… (More)

- Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
- IACR Cryptology ePrint Archive
- 2007

We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However , as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those… (More)

- Chuan-Wen Loe, Henrik Jeldtoft Jensen
- J. Complex Networks
- 2016

The vertices of an interval graph represent intervals over a real line where overlapping intervals denote that their corresponding vertices are adjacent. This implies that the vertices are measurable by a metric and there exists a linear structure in the system. The generalization is an embedding of a graph onto a multi-dimensional Euclidean space and it… (More)

- Chuan-Wen Loe, Khoongming Khoo
- ICISC
- 2007

We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis and bit-flipping fault analysis. We also modify the attacks to non side-channel cryptanalyses, but on the assumption that the key/IV mixing is not well designed. This paper hopes to provide… (More)