Raphael C.-W. Phan
Raphael C.-W. Phan
Professor at Monash University
Verified email at monash.edu
TitleCited byYear
Sha-3 proposal blake
JP Aumasson, L Henzen, W Meier, RCW Phan
Submission to NIST 92, 2008
The 8051 Microcontroller
IS MacKenzie, RCW Phan
Prentice Hall, 2006
Facial expression recognition in the encrypted domain based on local fisher discriminant analysis
Y Rahulamathavan, RCW Phan, JA Chambers, DJ Parish
IEEE Transactions on Affective Computing 4 (1), 83-92, 2012
Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI
RCW Phan
IEEE Transactions on Dependable and secure Computing 6 (4), 316-320, 2008
Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES)
RCW Phan
Information processing letters 91 (1), 33-38, 2004
Privacy of recent RFID authentication protocols
K Ouafi, RCW Phan
International Conference on Information Security Practice and Experienceá…, 2008
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
Traceable privacy of recent provably-secure RFID protocols
K Ouafi, RCW Phan
International conference on applied cryptography and network security, 479-489, 2008
Lbp with six intersection points: Reducing redundant information in lbp-top for micro-expression recognition
Y Wang, J See, RCW Phan, YH Oh
Asian conference on computer vision, 525-537, 2014
Mini advanced encryption standard (mini-AES): a testbed for cryptanalysis students
RCW Phan
Cryptologia 26 (4), 283-306, 2002
Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud
Y Rahulamathavan, RCW Phan, S Veluru, K Cumanan, M Rajarajan
IEEE Transactions on Dependable and Secure Computing 11 (5), 467-479, 2013
Efficient spatio-temporal local binary patterns for spontaneous facial micro-expression recognition
Y Wang, J See, RCW Phan, YH Oh
PloS one 10 (5), e0124674, 2015
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
International Conference on Applied Cryptography and Network Security, 369-382, 2004
Subtle expression recognition using optical strain weighted features
ST Liong, J See, RCW Phan, AC Le Ngo, YH Oh, KS Wong
Asian Conference on Computer Vision, 644-657, 2014
Providing security in 4G systems: unveiling the challenges
M Aiash, G Mapp, A Lasebae, R Phan
2010 Sixth Advanced International Conference on Telecommunications, 439-444, 2010
The hash function family LAKE
JP Aumasson, W Meier, RCW Phan
International Workshop on Fast Software Encryption, 36-53, 2008
Distinguishers for ciphers and known key attack against Rijndael with large blocks
M Minier, RCW Phan, B Pousse
International Conference on Cryptology in Africa, 60-76, 2009
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
RCW Phan, BM Goi
International Conference on Applied Cryptography and Network Security, 33-39, 2005
Proxy re-signatures in the standard model
SSM Chow, RCW Phan
International Conference on Information Security, 260-276, 2008
Privacy-preserving clinical decision support system using gaussian kernel-based classification
Y Rahulamathavan, S Veluru, RCW Phan, JA Chambers, M Rajarajan
IEEE journal of biomedical and health informatics 18 (1), 56-66, 2013
The system can't perform the operation now. Try again later.
Articles 1–20