Kenneth Koon‐Ho Wong

ORCID: 0000-0003-1732-6149
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Chaos-based Image/Signal Encryption
  • Cryptography and Residue Arithmetic
  • Climate variability and models
  • Cryptography and Data Security
  • Polynomial and algebraic computation
  • Atmospheric and Environmental Gas Dynamics
  • Meteorological Phenomena and Simulations
  • Error Correcting Code Techniques
  • graph theory and CDMA systems
  • Geophysics and Gravity Measurements
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Algebraic Geometry and Number Theory
  • Advanced Malware Detection Techniques
  • Climate change impacts on agriculture
  • Advanced Numerical Analysis Techniques
  • Air Quality and Health Impacts
  • Climate change and permafrost
  • Embedded Systems Design Techniques
  • Hydrology and Drought Analysis
  • demographic modeling and climate adaptation
  • Climate Change and Health Impacts
  • Parallel Computing and Optimization Techniques
  • Interconnection Networks and Systems

Queensland University of Technology
2013-2023

Queensland Government
2020-2023

University of Hong Kong
2018

Queensland Department of Environment and Science
2011-2016

Nanyang Technological University
2002

Bureau of Meteorology
1990

Abstract. We use a coupled atmosphere-ocean global climate model (CSIRO-Mk3.6) to investigate the drivers of trends in summer rainfall and circulation vicinity northern Australia. As part Coupled Model Intercomparison Project Phase 5 (CMIP5), we perform 10-member 21st century ensemble driven by Representative Concentration Pathway 4.5 (RCP4.5). To roles different forcing agents, also multiple ensembles historical change, which are analysed for period 1951–2010. The runs include "all...

10.5194/acp-12-6377-2012 article EN cc-by Atmospheric chemistry and physics 2012-07-23

A comprehensive set of climate modelling experiments has been performed to provide input into the Coupled Model Intercomparison Project - phase 5 (CMIP5). The CSIRO-Mk3.6 model was used prepare a joint CMIP5 submission under partnership between Commonwealth Scientific and Industrial Research Organisation (CSIRO) Queensland Climate Change Centre Excellence (QCCCE). includes data for 163 variables from 22 experiments. raw output post-processed format using Output Rewriter publicly released on...

10.22499/2.6301.001 article EN Australian Meteorological and Oceanographic Journal 2013-03-01

Heatwaves are defined as unusually high temperature events that occur for at least three consecutive days with major impacts to human health, economy, agriculture and ecosystems. This paper investigates: 1) changes in heatwave characteristics such peak temperature, number of events, frequency duration over a past 67-year period Australia; 2) projected this century Queensland, northeast 3) the avoided limiting global warming by 1.5 °C, 2.0 °C 3.0 °C. The results reveal heatwaves have...

10.1016/j.scitotenv.2020.140521 article EN cc-by-nc-nd The Science of The Total Environment 2020-06-25

The relationship between the relative variability of annual rainfall, long-term mean latitude, and correlation rainfall Southern Oscillation Index is examined, using data from 974 stations. A nonlinear these variables accounts for 94% variance in variability. Relative typically increases as decreases, latitude effect increases. There an interaction so that on weakens

10.1175/1520-0442(1990)003<0163:dorvom>2.0.co;2 article EN Journal of Climate 1990-01-01

Abstract High‐resolution climate change projections are increasingly necessary to inform policy and adaptation planning. Downscaling of global models (GCMs) is required simulate the at spatial scale relevant for local impacts. Here, we dynamically downscaled 15 CMIP6 GCMs a 10 km resolution over Australia using Conformal Cubic Atmospheric model (CCAM), creating largest ensemble high‐resolution Australia. We compared host simulations Australian Gridded Climate Data (AGCD) observational data...

10.1029/2023ef003548 article EN cc-by Earth s Future 2023-11-01

and the Commonwealth Scientific Industrial Research Organisation (CSIRO).It now has approximately 10 research support scientists working on this project which first began in 2009.This on-going consists of following four main components:

10.36334/modsim.2011.f5.collier article EN Chan, F., Marinova, D. and Anderssen, R.S. (eds) MODSIM2011, 19th International Congress on Modelling and Simulation. 2011-12-12

We use single-forcing historical simulations with a coupled atmosphere–ocean global climate model to compare the effects of anthropogenic aerosols (AAs) and increasing long-lived greenhouse gases (LLGHGs) on simulated winter circulation in Southern Hemisphere (SH). Our primary focus is subtropical jet, which an important source baroclinic instability, especially Australasian region, where speed jet largest. For period 1950 2005, our suggest that AAs weaken whereas LLGHGs strengthen jet. The...

10.1088/1748-9326/8/1/014030 article EN cc-by Environmental Research Letters 2013-02-27

Abstract Deforestation exacerbates climate change through greenhouse gas emissions, but other climatic alterations linked to the local biophysical changes from deforestation remain poorly understood. Here, we assess impact of tropical on fire weather risk—defined as conditions conducive wildfires—using high-resolution convection-permitting simulations. We consider two land cover scenarios for island Borneo: in 1980 ( forest scenario ) and 2050 force a model, using boundary ERA-Interim...

10.1088/1748-9326/ac8f5c article EN cc-by Environmental Research Letters 2022-09-05

This paper describes a single-chip implementation of the data encryption standard (DES) using Xilinx XC4000 series field programmable gate array technology under XACTstep design flow integration system. The details for key scheduling, S-boxes, permutations and round-function are described. process included schematic design, functional timing simulation verification. final used 224 combinational logic blocks (CLBs) 54 input/output (IOBs) has an speed 26.7 Mbps.

10.1109/glocom.1998.776849 article EN 2002-11-27

Abstract. We use a coupled atmosphere-ocean global climate model (CSIRO-Mk3.6) to investigate the roles of different forcing agents as drivers summer rainfall trends in Australasian region. Our results suggest that anthropogenic aerosols have contributed observed multi-decadal increase over north-western Australia. As part Coupled Model Intercomparison Project Phase 5 (CMIP5), we performed multiple 10-member ensembles historical change, which are analysed for period 1951–2010. The runs...

10.5194/acpd-12-5107-2012 article EN cc-by 2012-02-15

Simulations of mean climate characteristics and atmospheric circulation patterns in the tropical region Australia during austral summer (December to February) are assessed by comparing against observations. An examination observed climatologies sea level pressure, winds at lower upper levels rainfall with simulated show that model captures spatial structures fairly well. However, there some discrepancies magnitudes between modelled parameters. The can reasonably reproduce link Australian...

10.22499/2.6301.002 article EN Australian Meteorological and Oceanographic Journal 2013-03-01

This paper analyzes the authenticated encryption algorithm ACORN, a candidate in CAESAR cryptographic competition. We identify weaknesses state update function of ACORN which result collisions internal ACORN. shows that for given set key and initialization vector values we can construct two distinct input messages collision state. Using standard PC be found almost instantly when secret is known. flaw used by message sender to create forged will accepted as legitimate.

10.1145/2843043.2843353 article EN Proceedings of the Australasian Computer Science Week Multiconference 2016-02-01

In this paper, we show that stream ciphers with a particular form of ciphertext output function are vulnerable to differential fault attacks using random faults. The CAESAR competition candidates Tiaoxin-346 and AEGIS-128L both fall into category, our attack can be used recover the secret key entire state practical complexity. case AEGIS-128L, applied in ciphertext-only scenario. Our more than previous on these ciphers, which assumed bit-flipping Although also consider other ways mitigating...

10.1155/2019/1680263 article EN Security and Communication Networks 2019-07-01

We investigated the application of cube attacks to MORUS, a candidate in CAESAR competition. applied attack version MORUS where initialization phase is reduced from 16 steps 4. Our analysis shows that can successfully recover secret key MORUS-640 with total complexity about 2^10 for this version, and similarly MORUS-1280 2^9. Additionally, we obtained cubes resulting distinguishers 5 MORUS- 1280; these distinguish cipher output function random 2^8. All our are verified experimentally....

10.1109/trustcom/bigdatase/icess.2017.337 article EN 2017-08-01

This paper investigates the application of fault attacks to authenticated encryption stream cipher algorithm MORUS. We propose on MORUS with two different goals: one breach confidentiality component, and other integrity component. For attack component MORUS, we types key recovery. The first type is a partial recovery using permanent model, except for variants where full recovered this model. second transient at cost higher number faults compared Finally, describe which performs forgery bit-flipping

10.3390/cryptography2010004 article EN cc-by Cryptography 2018-01-30
Coming Soon ...