Follow
Ruth Ng
Ruth Ng
Verified email at dso.org.sg - Homepage
Title
Cited by
Cited by
Year
Nonces are noticed: AEAD revisited
M Bellare, R Ng, B Tackmann
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
342019
Improved structured encryption for SQL databases via hybrid indexing
D Cash, R Ng, A Rivkin
International Conference on Applied Cryptography and Network Security, 480-510, 2021
152021
An Accurate Analysis of the BINARY Information Reconciliation Protocol by Generating Functions
S Seet, R Ng, K Khoo
International Conference on Quantum Cryptography, Waterloo, Canada, 117, 2013
32013
A probabilistic analysis of CASCADE
R Ng
International conference on quantum cryptography, 2014
22014
On the security of the XOR sandwiching paradigm for multiple keyed block ciphers
R Ng, K Khoo, RCW Phan
2013 International Conference on Security and Cryptography (SECRYPT), 2013
22013
Structured encryption for indirect addressing
R Ng, A Hoover, D Cash, E Ee
Cryptology ePrint Archive, 2023
12023
A PROBABILISTIC ANALYSIS OF BINARY AND CASCADE
R NG
1
Leakage-Abuse Attacks Against Structured Encryption for SQL
A Hoover, R Ng, D Khu, J Lim, D Ng, J Lim, Y Song
Cryptology ePrint Archive, 2024
2024
SoK: Security Evaluation of SBox-Based Block Ciphers
J Lim, D Ng, R Ng
Cryptology ePrint Archive, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–9