Choy, Jiali; Chew, Guanhan; Khoo, Khoongming; Yap, Huihui Cryptographic properties and application of a generalized unbalanced Feistel network structure. (English) Zbl 1235.94046 Cryptogr. Commun. 3, No. 3, 141-164 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Choy} et al., Cryptogr. Commun. 3, No. 3, 141--164 (2011; Zbl 1235.94046) Full Text: DOI
Choy, Jiali; Chew, Guanhan; Khoo, Khoongming; Yap, Huihui Cryptographic properties and application of a generalized unbalanced Feistel network structure. (English) Zbl 1307.94048 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 73-89 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Choy} et al., Lect. Notes Comput. Sci. 5594, 73--89 (2009; Zbl 1307.94048) Full Text: DOI
Choy, Jiali; Khoo, Khoongming New applications of differential bounds of the SDS structure. (English) Zbl 1182.94038 Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 367-384 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Choy} and \textit{K. Khoo}, Lect. Notes Comput. Sci. 5222, 367--384 (2008; Zbl 1182.94038) Full Text: DOI
Khoo, Khoongming; Lim, Chu-Wee; Gong, Guang Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. (English) Zbl 1275.94031 Appl. Algebra Eng. Commun. Comput. 19, No. 4, 323-338 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Khoo} et al., Appl. Algebra Eng. Commun. Comput. 19, No. 4, 323--338 (2008; Zbl 1275.94031) Full Text: DOI
Khoo, Khoongming; Gong, Guang; Stinson, Douglas R. A new characterization of semi-bent and bent functions on finite fields. (English) Zbl 1172.11311 Des. Codes Cryptography 38, No. 2, 279-295 (2006). MSC: 11T71 94A60 PDFBibTeX XMLCite \textit{K. Khoo} et al., Des. Codes Cryptography 38, No. 2, 279--295 (2006; Zbl 1172.11311) Full Text: DOI