Nonces are noticed: AEAD revisited M Bellare, R Ng, B Tackmann Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 34 | 2019 |
Improved structured encryption for SQL databases via hybrid indexing D Cash, R Ng, A Rivkin International Conference on Applied Cryptography and Network Security, 480-510, 2021 | 15 | 2021 |
An Accurate Analysis of the BINARY Information Reconciliation Protocol by Generating Functions S Seet, R Ng, K Khoo International Conference on Quantum Cryptography, Waterloo, Canada, 117, 2013 | 3 | 2013 |
A probabilistic analysis of CASCADE R Ng International conference on quantum cryptography, 2014 | 2 | 2014 |
On the security of the XOR sandwiching paradigm for multiple keyed block ciphers R Ng, K Khoo, RCW Phan 2013 International Conference on Security and Cryptography (SECRYPT), 2013 | 2 | 2013 |
Structured encryption for indirect addressing R Ng, A Hoover, D Cash, E Ee Cryptology ePrint Archive, 2023 | 1 | 2023 |
A PROBABILISTIC ANALYSIS OF BINARY AND CASCADE R NG | 1 | |
Leakage-Abuse Attacks Against Structured Encryption for SQL A Hoover, R Ng, D Khu, J Lim, D Ng, J Lim, Y Song Cryptology ePrint Archive, 2024 | | 2024 |
SoK: Security Evaluation of SBox-Based Block Ciphers J Lim, D Ng, R Ng Cryptology ePrint Archive, 2022 | | 2022 |