default search action
Leonie Ruth Simpson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Khondokar Fida Hasan, Leonie Simpson, Mir Ali Rezazadeh Baee, Chadni Islam, Ziaur Rahman, Warren Armstrong, Praveen Gauravaram, Matthew McKague:
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies. IEEE Access 12: 23427-23450 (2024) - [j21]Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao, Zung Le:
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. Cryptogr. 8(1): 5 (2024) - [j20]Mir Ali Rezazadeh Baee, Leonie Simpson, Warren Armstrong:
Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata. IEEE Open J. Comput. Soc. 5: 156-169 (2024) - [j19]Mir Ali Rezazadeh Baee, Leonie Simpson, Warren Armstrong:
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework. IEEE Open J. Comput. Soc. 5: 315-328 (2024) - [j18]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles. IEEE Trans. Dependable Secur. Comput. 21(4): 4066-4083 (2024) - 2023
- [j17]Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
Software Vulnerability Detection Using Informed Code Graph Pruning. IEEE Access 11: 135626-135644 (2023) - [j16]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption. IEEE Trans. Dependable Secur. Comput. 20(3): 1799-1817 (2023) - [c48]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. ACISP 2023: 89-108 - [e2]Leonie Simpson, Mir Ali Rezazadeh Baee:
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings. Lecture Notes in Computer Science 13915, Springer 2023, ISBN 978-3-031-35485-4 [contents] - [i10]Khondokar Fida Hasan, Leonie Simpson, Mir Ali Rezazadeh Baee, Chadni Islam, Ziaur Rahman, Warren Armstrong, Praveen Gauravaram, Matthew McKague:
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis. CoRR abs/2307.06520 (2023) - 2022
- [c47]Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery. TrustCom 2022: 1522-1527 - 2021
- [j15]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
Authentication strategies in vehicular communications: a taxonomy and framework. EURASIP J. Wirel. Commun. Netw. 2021(1): 129 (2021) - [j14]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! IEEE Trans. Inf. Forensics Secur. 16: 3678-3693 (2021) - [j13]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications. IEEE Trans. Veh. Technol. 70(9): 9306-9319 (2021) - [c46]Waleed Alkalabi, Leonie Simpson, Hasmukh Morarji:
Barriers and Incentives to Cybersecurity Threat Information Sharing in Developing Countries: A Case Study of Saudi Arabia. ACSW 2021: 2:1-2:8 - [c45]Ya-Wen Chang, Laurianne Sitbon, Leonie Simpson:
Towards a Secured and Safe Online Social Media Design Framework for People with Intellectual Disability. ASSETS 2021: 91:1-91:4 - [c44]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Algebraic Attacks on Grain-Like Keystream Generators. ICISC 2021: 241-270 - 2020
- [j12]Basker Palaniswamy, Seyit Camtepe, Ernest Foo, Leonie Simpson, Mir Ali Rezazadeh Baee, Josef Pieprzyk:
Continuous authentication for VANET. Veh. Commun. 25: 100255 (2020) - [c43]Matthew Beighton, Harry Bartlett, Leonie Simpson:
Security Analysis of Fountain V1. ACSW 2020: 6:1-6:8 - [c42]Joshua Copeland, Leonie Simpson:
Finding Slid Pairs for the Plantlet Stream Cipher. ACSW 2020: 7:1-7:7 - [c41]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output. ATIS 2020: 42-60 - [c40]Sonam Adinolf, Peta Wyeth, Ross Brown, Leonie Simpson:
Near and Dear: Designing Relatable VR Agents for Training Games. OZCHI 2020: 413-425 - [i9]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material). IACR Cryptol. ePrint Arch. 2020: 22 (2020)
2010 – 2019
- 2019
- [j11]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault analysis of AEZ. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j10]Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong:
Random Fault Attacks on a Class of Stream Ciphers. Secur. Commun. Networks 2019: 1680263:1-1680263:12 (2019) - [j9]Mir Ali Rezazadeh Baee, Leonie Simpson, Ernest Foo, Josef Pieprzyk:
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. IEEE Trans. Veh. Technol. 68(12): 11577-11587 (2019) - [c39]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. ICISC 2019: 297-315 - 2018
- [j8]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptogr. 2(1): 4 (2018) - [j7]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A fundamental flaw in the ++AE authenticated encryption mode. J. Math. Cryptol. 12(1): 37-42 (2018) - [c38]Md. Iftekhar Salam, Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault attacks on Tiaoxin-346. ACSW 2018: 5:1-5:9 - [c37]Jiaming James Chen, Jiexuan Edward Chen, Vicky Liu, Laurence D. Fairbairn, Leonie Simpson, Charles Wang, William J. Caelli:
A Viable LoRa Framework for Smart Cities. PACIS 2018: 59 - [i8]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. IACR Cryptol. ePrint Arch. 2018: 66 (2018) - 2017
- [j6]Chuah Chai Wen, Ed Dawson, Leonie Simpson:
Stream cipher based key derivation function. Int. J. Secur. Networks 12(2): 70-82 (2017) - [c36]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes. ACISP (1) 2017: 285-305 - [c35]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A Fault-based Attack on AEZ v4.2. TrustCom/BigDataSE/ICESS 2017: 634-641 - [c34]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. TrustCom/BigDataSE/ICESS 2017: 961-966 - [i7]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes. IACR Cryptol. ePrint Arch. 2017: 717 (2017) - 2016
- [c33]Hassan Qahur Al Mahri, Leonie Ruth Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Forgery attacks on ++AE authenticated encryption mode. ACSW 2016: 33 - [c32]V. Bhartia, Leonie Simpson:
Initialisation flaws in the A5-GMR-1 satphone encryption algorithm. ACSW 2016: 34 - [c31]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Ruth Simpson, Ed Dawson, Josef Pieprzyk:
Finding state collisions in the authenticated encryption stream cipher ACORN. ACSW 2016: 36 - [c30]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. ATIS 2016: 15-26 - [c29]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. ATIS 2016: 41-53 - [i6]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2016: 743 (2016) - 2015
- [c28]Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Correcting flaws in Mitchell's analysis of EPBC. AISC 2015: 57-60 - [i5]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2015: 918 (2015) - 2014
- [c27]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Weak key-IV Pairs in the A5/1 Stream Cipher. AISC 2014: 23-36 - [c26]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers (Poster). AISC 2014: 77-81 - [c25]Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher. SETA 2014: 220-233 - 2013
- [j5]Mufeed Al Mashrafi, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Indirect message injection for MAC generation. J. Math. Cryptol. 7(3): 253-277 (2013) - [c24]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slid Pairs in the Initialisation of the A5/1 Stream Cipher. AISC 2013: 3-12 - [c23]Tony Sahama, Leonie Simpson, Bill Lane:
Security and Privacy in eHealth: Is it possible? Healthcom 2013: 249-253 - [c22]Chuah Chai Wen, Ed Dawson, Leonie Simpson:
Key Derivation Function: The SCKDF Scheme. SEC 2013: 125-138 - [e1]Colin Boyd, Leonie Simpson:
Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. Lecture Notes in Computer Science 7959, Springer 2013, ISBN 978-3-642-39058-6 [contents] - [i4]Sui-Guan Teo, Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State convergence in bit-based stream ciphers. IACR Cryptol. ePrint Arch. 2013: 96 (2013) - [i3]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers. IACR Cryptol. ePrint Arch. 2013: 240 (2013) - 2012
- [j4]Leonie Simpson, Serdar Boztas:
State cycles, initialization and the Trivium stream cipher. Cryptogr. Commun. 4(3-4): 245-258 (2012) - [c21]Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. ACISP 2012: 138-151 - [c20]Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
State convergence in the initialisation of the Sfinks stream cipher. AISC 2012: 27-32 - [c19]Harry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
A General Model for MAC Generation Using Direct Injection. Inscrypt 2012: 198-215 - [c18]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slide attacks on the Sfinks stream cipher. ICSPCS 2012: 1-10 - [c17]Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson:
A Framework for Security Analysis of Key Derivation Functions. ISPEC 2012: 199-216 - 2011
- [c16]Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson:
State convergence and the effectiveness of time-memory-data tradeoffs. IAS 2011: 92-97 - [c15]Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State Convergence in the Initialisation of Stream Ciphers. ACISP 2011: 75-88 - [c14]Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson:
Algebraic analysis of the SSS stream cipher. SIN 2011: 199-204 - 2010
- [i2]Sui-Guan Teo, Leonie Simpson, Ed Dawson:
Bias in the nonlinear filter generator output sequence. IACR Cryptol. ePrint Arch. 2010: 105 (2010) - [i1]Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson:
State convergence and keyspace reduction of the Mixer stream cipher. IACR Cryptol. ePrint Arch. 2010: 628 (2010)
2000 – 2009
- 2009
- [c13]Leonie Simpson, Matthew Henricksen, Wun-She Yap:
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. ACISP 2009: 108-121 - [c12]Muhammad Reza Z'aba, Håvard Raddum, Leonie Simpson, Ed Dawson, Matt Henricksen, Kenneth Koon-Ho Wong:
Algebraic Analysis of LEX. AISC 2009: 33-45 - [c11]Muhammad Reza Z'aba, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Linearity within the SMS4 Block Cipher. Inscrypt 2009: 248-265 - 2008
- [p1]Ed Dawson, Matthew Henricksen, Leonie Simpson:
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. The eSTREAM Finalists 2008: 20-38 - 2007
- [c10]Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson:
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. ACISP 2007: 11-28 - 2006
- [c9]Leonie Ruth Simpson, Matthew Henricksen:
Improved Cryptanalysis of MAG. ACISP 2006: 64-75 - 2004
- [c8]Kevin Chen, William Millan, Leonie Ruth Simpson:
Perspectives on Word Based Stream Ciphers. Cryptographic Algorithms and their Uses 2004: 14-27 - [c7]Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon-Jae Lee, Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher. ICISC 2004: 33-50 - 2003
- [c6]Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. ICISC 2003: 418-431 - 2002
- [j3]Helen Gustafson, Leonie Ruth Simpson, Jovan Dj. Golic:
Analysis of a measure of correlation between two binary strings of different lengths. Australas. J Comb. 25: 185-200 (2002) - [c5]Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee, William Millan, Sang-Jae Moon, Leonie Simpson:
The LILI-II Keystream Generator. ACISP 2002: 25-39 - 2000
- [c4]Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan:
LILI Keystream Generator. Selected Areas in Cryptography 2000: 248-261
1990 – 1999
- 1999
- [j2]Leonie Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson:
A Fast Correlation Attack on Multiplexer Generators. Inf. Process. Lett. 70(2): 89-93 (1999) - 1998
- [c3]Leonie Simpson, Jovan Dj. Golic, Ed Dawson:
A Probabilistic Correlation Attack on the Shrinking Generator. ACISP 1998: 147-158 - [c2]David A. Wagner, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier:
Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305 - 1997
- [j1]Jovan Dj. Golic, Mahmoud Salmasizadeh, Leonie Simpson, Ed Dawson:
Fast Correlation Attacks on Nonlinear Filter Generators. Inf. Process. Lett. 64(1): 37-42 (1997) - [c1]M. Salmasidazeh, Leonie Simpson, Jovan Dj. Golic, Ed Dawson:
Fast Correlation Attacks and Multiple Linear Approximations. ACISP 1997: 228-239
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint