Kenneth Koon-Ho Wong
Queensland University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kenneth Koon-Ho Wong.
international conference on the theory and application of cryptology and information security | 2008
Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a wide range of applications. Notably, the new addition algorithm uses
international conference on pairing-based cryptography | 2009
Craig Costello; Hüseyin Hisil; Colin Boyd; Juan Manuel González Nieto; Kenneth Koon-Ho Wong
8\mathrm{\textbf{M}}
australasian conference on information security and privacy | 2009
Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson
for suitably selected curve constants. In comparison, the fastest point addition algorithms for (twisted) Edwards curves stated in the literature use
australasian conference on information security and privacy | 2006
Sultan Al-Hinai; Lynn Margaret Batten; Bernard D. Colbert; Kenneth Koon-Ho Wong
9\mathrm{\textbf{M}} + 1\mathrm{\textbf{S}}
trust security and privacy in computing and communications | 2017
Iftekhar Salam; Leonie Simpson; Harry Bartlett; Ed Dawson; Josef Pieprzyk; Kenneth Koon-Ho Wong
. It is also shown that the new addition algorithm can be implemented with four processors dropping the effective cost to
international conference on cryptology in india | 2006
Kenneth Koon-Ho Wong; Bernard D. Colbert; Lynn Margaret Batten; Sultan Al-Hinai
2\mathrm{\textbf{M}}
australasian conference on information security and privacy | 2010
Kenneth Koon-Ho Wong; Gregory V. Bard
. This implies an effective speed increase by the full factor of 4 over the sequential case. Our results allow faster implementation of elliptic curve scalar multiplication. In addition, the new point addition algorithm can be used to provide a natural protection from side channel attacks based on simple power analysis (SPA).
Journal of Mathematical Cryptology | 2011
Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson
This paper presents efficient formulas for computing cryptographic pairings on the curve y 2 = c x 3 + 1 over fields of large characteristic. We provide examples of pairing-friendly elliptic curves of this form which are of interest for efficient pairing implementations.
international conference on signal processing and communication systems | 2012
Ali Alhamdan; Harry Bartlett; Ed Dawson; Leonie Simpson; Kenneth Koon-Ho Wong
This paper provides new results about efficient arithmetic on Jacobi quartic form elliptic curves, y 2 = d x 4 + 2 a x 2 + 1. With recent bandwidth-efficient proposals, the arithmetic on Jacobi quartic curves became solidly faster than that of Weierstrass curves. These proposals use up to 7 coordinates to represent a single point. However, fast scalar multiplication algorithms based on windowing techniques, precompute and store several points which require more space than what it takes with 3 coordinates. Also note that some of these proposals require d = 1 for full speed. Unfortunately, elliptic curves having 2-times-a-prime number of points, cannot be written in Jacobi quartic form if d = 1. Even worse the contemporary formulae may fail to output correct coordinates for some inputs. This paper provides improved speeds using fewer coordinates without causing the above mentioned problems. For instance, our proposed point doubling algorithm takes only 2 multiplications, 5 squarings, and no multiplication with curve constants when d is arbitrary and a = ±1/2.
International Conference on Sequences and Their Applications | 2014
Harry Bartlett; Ali Alhamdan; Leonie Simpson; Ed Dawson; Kenneth Koon-Ho Wong
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems. In the general set-up, we assume that the output bit of one shift register controls the clocking of other registers in the system and produces a family of equations relating the output bits to the internal state bits. We then apply this general theory to four specific stream ciphers: the (strengthened) stop-and-go generator, the alternating step generator, the self-decimated generator and the step1/step2 generator. In the case of the strengthened stop-and-go generator and of the self-decimated generator, we obtain the initial state of the registers in a significantly faster time than any other known attack. In the other two situations, we do better than or as well as all attacks but the correlation attack. In all cases, we demonstrate that the degree of a functional relationship between the registers can be bounded by two. Finally, we determine the effective key length of all four systems.