Ruth Ng
Ruth Ng
Home
Featured Publications
All Publications
Contact
Light
Dark
Automatic
Publications
Type
Conference paper
Preprint
Date
2022
2021
2019
2014
2013
0001
SoK: Security Evaluation of SBox-Based Block Ciphers
In this work, we present a systematization of cryptanalysis of SBox-based block ciphers.
Joelle Lim
,
Derrick Ng
,
Ruth Ng
PDF
Cite
Improved Structured Encryption for SQL Databases via Hybrid Indexing (ACNS 2021)
We introduce a new join indexing technique for Structurally Encrypted SQL databases, then employ it in hybrid indexes which use client-side leakage-aware query optimization.
David Cash
,
Ruth Ii-Yung Ng
,
Adam Rivkin
PDF
Cite
Code
Video
DOI
Nonces are Noticed: AEAD Revisited (CRYPTO 2019)
We draw attention to a gap between theory and usage of nonce-based symmetric encryption and bridge it with new definitions and schemes.
Mihir Bellare
,
Ruth Ii-Yung Ng
,
Björn Tackmann
PDF
Cite
Video
DOI
A Probabilistic Analysis of CASCADE (QCRYPT 2014)
We provide a rigorous analysis of BINARY and CASCADE, and compare the latter to a more efficient variant. We then revisit existing calculations of their accuracy, and confirm our analysis with simulations.
Ruth Ii-Yung Ng
PDF
Cite
Poster
Technical Report
On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers (SECRYPT 2013)
We apply the XOR sandwiching paradigm to 2-Key and 3-Key Triple-DES to extend their keylengths, then study the added security afforded by this against cryptanalytic attacks.
Ruth Ii-Yung Ng
,
Khoongming Khoo
,
Raphael C-W Phan
PDF
Cite
DOI
An Accurate Analysis of the BINARY Information Reconciliation Protocol by Generating Functions (QCRYPT 2013)
We analyze the accuracy of information reconciliation protocols BINARY and CASCADE using generating functions, then corroborate these results with simulations.
Sean Seet
,
Ruth Ii-Yung Ng
,
Khoongming Khoo
PDF
Cite
Poster
Cite
×