default search action
Matt Henricksen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c30]Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. ACNS 2017: 253-272 - 2015
- [c29]Jiqiang Lu, Zhen Li, Matt Henricksen:
Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract). ACNS 2015: 350-369 - 2014
- [j5]Jiqiang Lu, Wun-She Yap, Matt Henricksen, Swee-Huay Heng:
Differential attack on nine rounds of the SEED block cipher. Inf. Process. Lett. 114(3): 116-123 (2014) - [j4]Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng, Matt Henricksen:
Security analysis of GCM for communication. Secur. Commun. Networks 7(5): 854-864 (2014) - [j3]Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng, Matt Henricksen:
Parallelizable MAC revisited. Secur. Commun. Networks 7(7): 1115-1127 (2014) - 2013
- [j2]Sze Ling Yeo, Wun-She Yap, Joseph K. Liu, Matt Henricksen:
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions". IEEE Commun. Lett. 17(8): 1521-1523 (2013) - [c28]Matt Henricksen, Shinsaku Kiyomoto:
AVON - A Fast Hash Function for Intel SIMD Architectures. SECRYPT 2013: 482-487 - [c27]Kun Peng, Matt Henricksen:
Multiplicative Homomorphic E-Auction with Formally Provable Security. WISTP 2013: 1-17 - 2012
- [c26]Kun Peng, Matt Henricksen:
How to Fix Two RSA-Based PVSS Schemes - Exploration and Solution. ACISP 2012: 223-234 - [c25]Matt Henricksen:
Two Dragons - A Family of Fast Word-based Stream Ciphers. SECRYPT 2012: 35-44 - 2011
- [c24]Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen:
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. CANS 2011: 76-97 - [c23]Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima:
MASHA - Low Cost Authentication with a New Stream Cipher. ISC 2011: 63-78 - [c22]Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:
AES Variants Secure against Related-Key Differential and Boomerang Attacks. WISTP 2011: 191-207 - [i1]Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:
AES Variants Secure Against Related-Key Differential and Boomerang Attacks. IACR Cryptol. ePrint Arch. 2011: 72 (2011) - 2010
- [c21]Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka:
Side-Channel Analysis of the K2 Stream Cipher. ACISP 2010: 53-73
2000 – 2009
- 2009
- [j1]Nasour Bagheri, Matt Henricksen, Lars R. Knudsen, Majid Naderi, B. Sadeghyian:
Cryptanalysis of an iterated halving-based hash function: CRUSH. IET Inf. Secur. 3(4): 129-138 (2009) - [c20]Leonie Simpson, Matthew Henricksen, Wun-She Yap:
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. ACISP 2009: 108-121 - [c19]Matt Henricksen:
A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers. ASIAN 2009: 69-78 - [c18]Muhammad Reza Z'aba, Håvard Raddum, Leonie Simpson, Ed Dawson, Matt Henricksen, Kenneth Koon-Ho Wong:
Algebraic Analysis of LEX. AISC 2009: 33-45 - 2008
- [c17]Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson:
Bit-Pattern Based Integral Attack. FSE 2008: 363-381 - [c16]Matthew Henricksen:
Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks. HPCC 2008: 795-800 - [p1]Ed Dawson, Matthew Henricksen, Leonie Simpson:
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. The eSTREAM Finalists 2008: 20-38 - 2007
- [c15]Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson:
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. ACISP 2007: 11-28 - [c14]Matthew Henricksen, William J. Caelli, Peter R. Croll:
Securing Grid Data Using Mandatory Access Controls. ACSW 2007: 25-32 - [c13]Peter R. Croll, Matthew Henricksen, William J. Caelli, Vicky Liu:
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. MedInfo 2007: 498-502 - [c12]Matthew Henricksen, Lars R. Knudsen:
Cryptanalysis of the CRUSH Hash Function. Selected Areas in Cryptography 2007: 74-83 - 2006
- [c11]Matthew Henricksen, Ed Dawson:
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. ACISP 2006: 52-63 - [c10]Leonie Ruth Simpson, Matthew Henricksen:
Improved Cryptanalysis of MAG. ACISP 2006: 64-75 - 2005
- [c9]Matthew Henricksen, Ed Dawson:
Rekeying Issues in the MUGI Stream Cipher. Selected Areas in Cryptography 2005: 175-188 - 2004
- [c8]Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson:
A Mobile Agent System Providing Offer Privacy. ACISP 2004: 301-312 - [c7]Matthew Henricksen, Ming Yao, Ernest Foo:
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. Cryptographic Algorithms and their Uses 2004: 110-124 - [c6]Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson:
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173 - [c5]Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon-Jae Lee, Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher. ICISC 2004: 33-50 - [c4]Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson:
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. TrustBus 2004: 132-141 - 2003
- [c3]Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith:
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. ACISP 2003: 403-415 - [c2]Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. ICISC 2003: 418-431 - 2002
- [c1]Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson:
Strengthening the Key Schedule of the AES. ACISP 2002: 226-240
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint