default search action
Ed Dawson
Edward Dawson
Person information
- affiliation: Queensland University of Technology, School of Mathematics, Brisbane, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j65]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [i15]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material). IACR Cryptol. ePrint Arch. 2020: 22 (2020)
2010 – 2019
- 2019
- [j64]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault analysis of AEZ. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j63]Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong:
Random Fault Attacks on a Class of Stream Ciphers. Secur. Commun. Networks 2019: 1680263:1-1680263:12 (2019) - [c135]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. ICISC 2019: 297-315 - 2018
- [j62]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptogr. 2(1): 4 (2018) - [j61]Khalid Alissa, Jason Reid, Ed Dawson:
SPCC: a security policy compliance checker plug-in for YAWL. Int. J. Bus. Process. Integr. Manag. 9(1): 22-31 (2018) - [j60]Nimalaprakasan Skandhakumar, Jason Reid, Farzad Salim, Ed Dawson:
A policy model for access control using building information models. Int. J. Crit. Infrastructure Prot. 23: 1-10 (2018) - [j59]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A fundamental flaw in the ++AE authenticated encryption mode. J. Math. Cryptol. 12(1): 37-42 (2018) - [c134]Md. Iftekhar Salam, Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault attacks on Tiaoxin-346. ACSW 2018: 5:1-5:9 - [i14]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. IACR Cryptol. ePrint Arch. 2018: 66 (2018) - 2017
- [j58]Chuah Chai Wen, Ed Dawson, Leonie Simpson:
Stream cipher based key derivation function. Int. J. Secur. Networks 12(2): 70-82 (2017) - [c133]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes. ACISP (1) 2017: 285-305 - [c132]Chuah Chai Wen, Mustafa Mat Deris, Edward Dawson:
On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function. ICISA 2017: 231-240 - [c131]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A Fault-based Attack on AEZ v4.2. TrustCom/BigDataSE/ICESS 2017: 634-641 - [c130]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. TrustCom/BigDataSE/ICESS 2017: 961-966 - [i13]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes. IACR Cryptol. ePrint Arch. 2017: 717 (2017) - 2016
- [c129]Hassan Qahur Al Mahri, Leonie Ruth Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Forgery attacks on ++AE authenticated encryption mode. ACSW 2016: 33 - [c128]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Ruth Simpson, Ed Dawson, Josef Pieprzyk:
Finding state collisions in the authenticated encryption stream cipher ACORN. ACSW 2016: 36 - [c127]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. ATIS 2016: 15-26 - [c126]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. ATIS 2016: 41-53 - [i12]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2016: 743 (2016) - 2015
- [c125]Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim:
BP-XACML an Authorisation Policy Language for Business Processes. ACISP 2015: 307-325 - [c124]Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Correcting flaws in Mitchell's analysis of EPBC. AISC 2015: 57-60 - [i11]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2015: 918 (2015) - 2014
- [c123]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Weak key-IV Pairs in the A5/1 Stream Cipher. AISC 2014: 23-36 - [c122]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers (Poster). AISC 2014: 77-81 - [c121]Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher. SETA 2014: 220-233 - 2013
- [j57]Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson:
Budget-aware Role Based Access Control. Comput. Secur. 35: 37-50 (2013) - [j56]Mufeed Al Mashrafi, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Indirect message injection for MAC generation. J. Math. Cryptol. 7(3): 253-277 (2013) - [c120]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slid Pairs in the Initialisation of the A5/1 Stream Cipher. AISC 2013: 3-12 - [c119]Chuah Chai Wen, Ed Dawson, Leonie Simpson:
Key Derivation Function: The SCKDF Scheme. SEC 2013: 125-138 - [e8]Ed Dawson:
Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings. Lecture Notes in Computer Science 7779, Springer 2013, ISBN 978-3-642-36094-7 [contents] - [i10]Sui-Guan Teo, Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State convergence in bit-based stream ciphers. IACR Cryptol. ePrint Arch. 2013: 96 (2013) - [i9]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers. IACR Cryptol. ePrint Arch. 2013: 240 (2013) - 2012
- [j55]Nimalaprakasan Skandhakumar, Jason Reid, Ed Dawson, Robin Drogemuller, Farzad Salim:
An Authorization Framework using Building Information Models. Comput. J. 55(10): 1244-1264 (2012) - [c118]Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. ACISP 2012: 138-151 - [c117]Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
State convergence in the initialisation of the Sfinks stream cipher. AISC 2012: 27-32 - [c116]Harry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
A General Model for MAC Generation Using Direct Injection. Inscrypt 2012: 198-215 - [c115]Nimalaprakasan Skandhakumar, Farzad Salim, Jason Reid, Ed Dawson:
Physical Access Control Administration Using Building Information Models. CSS 2012: 236-250 - [c114]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slide attacks on the Sfinks stream cipher. ICSPCS 2012: 1-10 - [c113]Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson:
A Framework for Security Analysis of Key Derivation Functions. ISPEC 2012: 199-216 - 2011
- [j54]Kun Peng, Ed Dawson, Feng Bao:
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. Int. J. Inf. Sec. 10(1): 33-47 (2011) - [j53]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
An exploration of affine group laws for elliptic curves. J. Math. Cryptol. 5(1): 1-50 (2011) - [c112]Farzad Salim, Jason Reid, Ed Dawson, Uwe Dulleck:
An Approach to Access Control under Uncertainty. ARES 2011: 1-8 - [c111]Farzad Salim, Uwe Dulleck, Jason Reid, Ed Dawson:
Optimal Budget Allocation in Budget-based Access Control. ARES 2011: 591-596 - [c110]Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson:
State convergence and the effectiveness of time-memory-data tradeoffs. IAS 2011: 92-97 - [c109]Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State Convergence in the Initialisation of Stream Ciphers. ACISP 2011: 75-88 - [c108]Quan Pham, Jason Reid, Ed Dawson:
A Model for Constraint and Delegation Management. ISPEC 2011: 362-371 - [c107]Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson:
Algebraic analysis of the SSS stream cipher. SIN 2011: 199-204 - 2010
- [j52]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
On a taxonomy of delegation. Comput. Secur. 29(5): 565-579 (2010) - [j51]Farzad Salim, Jason Reid, Ed Dawson:
Authorization models for secure information sharing: a survey and research agenda. ISC Int. J. Inf. Secur. 2(2): 69-87 (2010) - [c106]Ed Dawson, Jason Reid, Farzad Salim, Mark Burdon:
Information Sharing in the 21st century: Progress and Challenges. AISC 2010: 2 - [c105]Farzad Salim, Jason Reid, Ed Dawson:
An Administrative Model for UCON ABC. AISC 2010: 32-38 - [c104]Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks. AISC 2010: 67-74 - [c103]Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson:
Towards a Game Theoretic Authorisation Model. GameSec 2010: 208-219 - [i8]Sui-Guan Teo, Leonie Simpson, Ed Dawson:
Bias in the nonlinear filter generator output sequence. IACR Cryptol. ePrint Arch. 2010: 105 (2010) - [i7]Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson:
State convergence and keyspace reduction of the Mixer stream cipher. IACR Cryptol. ePrint Arch. 2010: 628 (2010)
2000 – 2009
- 2009
- [j50]Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Comput. Electr. Eng. 35(1): 9-17 (2009) - [j49]Baoyuan Kang, Colin Boyd, Ed Dawson:
Identity-based strong designated verifier signature schemes: Attacks and new construction. Comput. Electr. Eng. 35(1): 49-53 (2009) - [j48]Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 82(2): 270-273 (2009) - [c102]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Jacobi Quartic Curves Revisited. ACISP 2009: 452-468 - [c101]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Faster Group Operations on Elliptic Curves. AISC 2009: 7-19 - [c100]Muhammad Reza Z'aba, Håvard Raddum, Leonie Simpson, Ed Dawson, Matt Henricksen, Kenneth Koon-Ho Wong:
Algebraic Analysis of LEX. AISC 2009: 33-45 - [c99]Muhammad Reza Z'aba, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Linearity within the SMS4 Block Cipher. Inscrypt 2009: 248-265 - [c98]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
On a Taxonomy of Delegation. SEC 2009: 353-363 - [i6]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Jacobi Quartic Curves Revisited. IACR Cryptol. ePrint Arch. 2009: 312 (2009) - 2008
- [j47]Kun Peng, Feng Bao, Ed Dawson:
Correct, Private, Flexible and Efficient Range Test. J. Res. Pract. Inf. Technol. 40(4): 275-289 (2008) - [j46]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [c97]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Twisted Edwards Curves Revisited. ASIACRYPT 2008: 326-343 - [c96]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
Commitment Issues in Delegation Process. AISC 2008: 27-38 - [c95]Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson:
Bit-Pattern Based Integral Attack. FSE 2008: 363-381 - [p1]Ed Dawson, Matthew Henricksen, Leonie Simpson:
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. The eSTREAM Finalists 2008: 20-38 - [i5]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Twisted Edwards Curves Revisited. IACR Cryptol. ePrint Arch. 2008: 522 (2008) - 2007
- [j45]Kun Peng, Colin Boyd, Ed Dawson:
Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): 6 (2007) - [c94]Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson:
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. ACISP 2007: 11-28 - [c93]Kun Peng, Ed Dawson:
A Range Test Secure in the Active Adversary Model. ACSW 2007: 159-162 - [c92]Mark Burdon, Juan Manuel González Nieto, Sharon Christensen, Ed Dawson, William D. Duncan, Bill Lane:
Access Control in Federated Databases: How Legal Issues Shape Security. EGOV 2007: 228-239 - [c91]Hüseyin Hisil, Gary Carter, Ed Dawson:
New Formulae for Efficient Elliptic Curve Arithmetic. INDOCRYPT 2007: 138-151 - [c90]Kun Peng, Ed Dawson:
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. ISPEC 2007: 209-224 - [c89]Quan Pham, Adrian McCullagh, Ed Dawson:
Consistency of User Attribute in Federated Systems. TrustBus 2007: 165-177 - [e7]Josef Pieprzyk, Hossein Ghodosi, Ed Dawson:
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4586, Springer 2007, ISBN 978-3-540-73457-4 [contents] - [e6]Ed Dawson, Duncan S. Wong:
Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings. Lecture Notes in Computer Science 4464, Springer 2007, ISBN 978-3-540-72159-8 [contents] - [i4]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Faster Group Operations on Elliptic Curves. IACR Cryptol. ePrint Arch. 2007: 441 (2007) - 2006
- [j44]Kun Peng, Colin Boyd, Ed Dawson:
Batch verification of validity of bids in homomorphic e-auction. Comput. Commun. 29(15): 2798-2805 (2006) - [j43]Praveen Gauravaram, Adrian McCullagh, Ed Dawson:
The legal and practical implications of recent attacks on 128-bit cryptographic hash functions. First Monday 11(1) (2006) - [j42]Martin P. Betts, Peter Black, Sharon Christensen, Ed Dawson, Rong Du, William D. Duncan, Ernest Foo, Juan Manuel González Nieto:
Towards Secure and Legal E-Tendering. J. Inf. Technol. Constr. 11: 89-102 (2006) - [c88]Matthew Henricksen, Ed Dawson:
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. ACISP 2006: 52-63 - [c87]Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto:
A Novel Range Test. ACISP 2006: 247-258 - [c86]Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ACISP 2006: 407-420 - [c85]Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto:
SKMA: a key management architecture for SCADA systems. ACSW 2006: 183-192 - [c84]Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309 - [c83]Kun Peng, Colin Boyd, Ed Dawson:
Sealed-Bid Micro Auctions. SEC 2006: 246-257 - 2005
- [j41]Yousef Bani Hammad, Gary Carter, Ed Dawson, W. Müller, Yvonne Hitchcock:
RAK factoring algorithm. Australas. J Comb. 33: 291-306 (2005) - [j40]Javier López, José A. Montenegro, José Luis Vivas, Eiji Okamoto, Ed Dawson:
Specification and design of advanced authentication and authorization services. Comput. Stand. Interfaces 27(5): 467-478 (2005) - [j39]Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson:
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. Comput. Syst. Sci. Eng. 20(6) (2005) - [j38]Juan Manuel González Nieto, Colin Boyd, Ed Dawson:
A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptogr. 36(3): 301-316 (2005) - [j37]Joanne Fuller, William Millan, Ed Dawson:
Multi-objective Optimisation of Bijective S-Boxes. New Gener. Comput. 23(3): 201-218 (2005) - [c82]Ming Yao, Kun Peng, Ed Dawson:
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. ACISP 2005: 158-169 - [c81]Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López:
A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260 - [c80]Kun Peng, Colin Boyd, Ed Dawson:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204 - [c79]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96 - [c78]Kun Peng, Colin Boyd, Ed Dawson:
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388 - [c77]Kun Peng, Colin Boyd, Ed Dawson:
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98 - [c76]Matthew Henricksen, Ed Dawson:
Rekeying Issues in the MUGI Stream Cipher. Selected Areas in Cryptography 2005: 175-188 - [e5]Ed Dawson, Serge Vaudenay:
Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings. Lecture Notes in Computer Science 3715, Springer 2005, ISBN 3-540-28938-0 [contents] - [i3]William Millan, Ed Dawson:
LILI-II is not Broken. IACR Cryptol. ePrint Arch. 2005: 234 (2005) - [i2]Kun Peng, Colin Boyd, Ed Dawson:
Batch Verification of Validity of Bids in Homomorphic E-auction. IACR Cryptol. ePrint Arch. 2005: 346 (2005) - [i1]Praveen Gauravaram, William Millan, Juanma González Nieto, Ed Dawson:
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function. IACR Cryptol. ePrint Arch. 2005: 390 (2005) - 2004
- [j36]L. Burnett, William Millan, Ed Dawson, Andrew J. Clark:
Simpler methods for generating better Boolean functions with good cryptographic properties. Australas. J Comb. 29: 231-248 (2004) - [j35]William Millan, Joanne Fuller, Ed Dawson:
New Concepts in Evolutionary Search for Boolean Functions in Cryptology. Comput. Intell. 20(3): 463-474 (2004) - [j34]Ed Dawson:
Preface to the special issue on PKI. Int. J. Inf. Sec. 2(2): 65 (2004) - [j33]Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Int. J. Inf. Sec. 3(2): 86-98 (2004) - [j32]Chuan-Kun Wu, Ed Dawson:
Correlation immunity and resiliency of symmetric Boolean functions. Theor. Comput. Sci. 312(2-3): 321-335 (2004) - [c75]Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson:
A Mobile Agent System Providing Offer Privacy. ACISP 2004: 301-312 - [c74]