Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kenneth Koon-Ho Wong is active.

Publication


Featured researches published by Kenneth Koon-Ho Wong.


international conference on the theory and application of cryptology and information security | 2008

Twisted Edwards Curves Revisited

Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson

This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a wide range of applications. Notably, the new addition algorithm uses


international conference on pairing-based cryptography | 2009

Faster Pairings on Special Weierstrass Curves

Craig Costello; Hüseyin Hisil; Colin Boyd; Juan Manuel González Nieto; Kenneth Koon-Ho Wong

8\mathrm{\textbf{M}}


australasian conference on information security and privacy | 2009

Jacobi Quartic Curves Revisited

Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson

for suitably selected curve constants. In comparison, the fastest point addition algorithms for (twisted) Edwards curves stated in the literature use


australasian conference on information security and privacy | 2006

Algebraic attacks on clock-controlled stream ciphers

Sultan Al-Hinai; Lynn Margaret Batten; Bernard D. Colbert; Kenneth Koon-Ho Wong

9\mathrm{\textbf{M}} + 1\mathrm{\textbf{S}}


trust security and privacy in computing and communications | 2017

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS

Iftekhar Salam; Leonie Simpson; Harry Bartlett; Ed Dawson; Josef Pieprzyk; Kenneth Koon-Ho Wong

. It is also shown that the new addition algorithm can be implemented with four processors dropping the effective cost to


international conference on cryptology in india | 2006

Algebraic attacks on clock-controlled cascade ciphers

Kenneth Koon-Ho Wong; Bernard D. Colbert; Lynn Margaret Batten; Sultan Al-Hinai

2\mathrm{\textbf{M}}


australasian conference on information security and privacy | 2010

Improved algebraic cryptanalysis of QUAD, Bivium and Trivium via graph partitioning on equation systems

Kenneth Koon-Ho Wong; Gregory V. Bard

. This implies an effective speed increase by the full factor of 4 over the sequential case. Our results allow faster implementation of elliptic curve scalar multiplication. In addition, the new point addition algorithm can be used to provide a natural protection from side channel attacks based on simple power analysis (SPA).


Journal of Mathematical Cryptology | 2011

An exploration of affine group laws for elliptic curves

Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson

This paper presents efficient formulas for computing cryptographic pairings on the curve y 2 = c x 3 + 1 over fields of large characteristic. We provide examples of pairing-friendly elliptic curves of this form which are of interest for efficient pairing implementations.


international conference on signal processing and communication systems | 2012

Slide attacks on the Sfinks stream cipher

Ali Alhamdan; Harry Bartlett; Ed Dawson; Leonie Simpson; Kenneth Koon-Ho Wong

This paper provides new results about efficient arithmetic on Jacobi quartic form elliptic curves, y 2 = d x 4 + 2 a x 2 + 1. With recent bandwidth-efficient proposals, the arithmetic on Jacobi quartic curves became solidly faster than that of Weierstrass curves. These proposals use up to 7 coordinates to represent a single point. However, fast scalar multiplication algorithms based on windowing techniques, precompute and store several points which require more space than what it takes with 3 coordinates. Also note that some of these proposals require d = 1 for full speed. Unfortunately, elliptic curves having 2-times-a-prime number of points, cannot be written in Jacobi quartic form if d = 1. Even worse the contemporary formulae may fail to output correct coordinates for some inputs. This paper provides improved speeds using fewer coordinates without causing the above mentioned problems. For instance, our proposed point doubling algorithm takes only 2 multiplications, 5 squarings, and no multiplication with curve constants when d is arbitrary and a = ±1/2.


International Conference on Sequences and Their Applications | 2014

Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher

Harry Bartlett; Ali Alhamdan; Leonie Simpson; Ed Dawson; Kenneth Koon-Ho Wong

We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems. In the general set-up, we assume that the output bit of one shift register controls the clocking of other registers in the system and produces a family of equations relating the output bits to the internal state bits. We then apply this general theory to four specific stream ciphers: the (strengthened) stop-and-go generator, the alternating step generator, the self-decimated generator and the step1/step2 generator. In the case of the strengthened stop-and-go generator and of the self-decimated generator, we obtain the initial state of the registers in a significantly faster time than any other known attack. In the other two situations, we do better than or as well as all attacks but the correlation attack. In all cases, we demonstrate that the degree of a functional relationship between the registers can be bounded by two. Finally, we determine the effective key length of all four systems.

Collaboration


Dive into the Kenneth Koon-Ho Wong's collaboration.

Top Co-Authors

Avatar

Ed Dawson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Leonie Simpson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Harry Bartlett

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Gary Carter

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hassan Qahur Al Mahri

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ali Alhamdan

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Sui-Guan Teo

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Iftekhar Salam

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Juan Manuel González Nieto

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge