#### Filter Results:

- Full text PDF available (11)

#### Publication Year

2008

2014

- This year (0)
- Last 5 years (3)
- Last 10 years (11)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen
- CANS
- 2011

In this paper, we present EPCBC, a lightweight cipher that has 96-bit key size and 48-bit/96-bit block size. This is suitable for Electronic Product Code (EPC) encryption, which uses low-cost passive RFID-tags and exactly 96 bits as a unique identifier on the item level. EPCBC is based on a generalized PRESENT with block size 48 and 96 bits for the main… (More)

- Khoongming Khoo, Thomas Peyrin, Axel Poschmann, Huihui Yap
- IACR Cryptology ePrint Archive
- 2014

In this article, we propose a new comparison metric, the figure of adversarial merit (FOAM), which combines the inherent security provided by cryptographic structures and components with their implementation properties. To the best of our knowledge, this is the first such metric proposed to ensure a fairer comparison of cryptographic designs. We then apply… (More)

- Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
- Cryptography and Communications
- 2009

In this paper, we study GF-NLFSR, a Generalized Unbalanced Feistel Network (GUFN) which can be considered as an extension of the outer function FO of the KASUMI block cipher. We show that the differential and linear probabilities of any n + 1 rounds of an n-cell GF-NLFSR are both bounded by p 2, where the corresponding probability of the round function is… (More)

- Jiali Choy, Huihui Yap, +4 authors Chik How Tan
- AFRICACRYPT
- 2012

Collision resistance is a fundamental property required for cryptographic hash functions. One way to ensure collision resistance is to use hash functions based on public key cryptography (PKC) which reduces collision resistance to a hard mathematical problem, but such primitives are usually slow. A more practical approach is to use symmetric-key design… (More)

- Jiali Choy, Huihui Yap
- IACR Cryptology ePrint Archive
- 2009

Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search. In… (More)

- Jiali Choy, Huihui Yap, Khoongming Khoo
- CANS
- 2009

The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2, which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the eprint XSL attack on BES and showed that the attack complexity should be 2. Later at IEEE-YCS 2008, Qu and Liu counter-proposed that the compact XSL attack on BES-128 works and has… (More)

- Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
- IACR Cryptology ePrint Archive
- 2009

In this paper, we study GF-NLFSR, a Generalized Unbalanced Feistel Network (GUFN) which can be considered as an extension of the outer function FO of the KASUMI block cipher. We show that the differential and linear probabilities of any n + 1 rounds of an n-cell GF-NLFSR are both bounded by p, where the corresponding probability of the round function is p.… (More)

- Huihui Yap, Khoongming Khoo, Axel Poschmann
- AFRICACRYPT
- 2010

The n-cell GF-NLFSR (Generalized Feistel-NonLinear Feedback Shift Register) structure [8] is a generalized unbalanced Feistel network that can be considered as a generalization of the outer function FO of the KASUMI block cipher. An advantage of this cipher over other n-cell generalized Feistel networks, e.g. SMS4 [11] and Camellia [5], is that it is… (More)

- Huihui Yap, Khoongming Khoo, Axel Poschmann
- IACR Cryptology ePrint Archive
- 2010

The n-cell GF-NLFSR (Generalized Feistel-NonLinear Feedback Shift Register) structure [8] is a generalized unbalanced Feistel network that can be considered as a generalization of the outer function FO of the KASUMI block cipher. An advantage of this cipher over other n-cell generalized Feistel networks, e.g. SMS4 [11] and Camellia [5], is that it is… (More)

- Herni Halim, H C Lau, +16 authors Rapid Meta
- 2008

Articles in Journals: 1. N/A Chapters in Books: 1. S. Halim and H.C. Lau. Tuning Tabu Search Strategies via Visual Diagnosis. In Metaheuristics: Progress in Complex Systems Optimization, ch 19, pp 365-388, 2007. Springer. [1]. Rank 3 according to SoC, NUS. Conference Full Papers: 1. S. Halim, R.H.C. Yap, and H.C. Lau. An Integrated White+Black Box Approach… (More)