default search action
Ed Dawson
Person information
- affiliation: Queensland University of Technology, School of Mathematics, Brisbane, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j65]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [i15]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material). IACR Cryptol. ePrint Arch. 2020: 22 (2020)
2010 – 2019
- 2019
- [j64]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault analysis of AEZ. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j63]Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong:
Random Fault Attacks on a Class of Stream Ciphers. Secur. Commun. Networks 2019: 1680263:1-1680263:12 (2019) - [c135]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. ICISC 2019: 297-315 - 2018
- [j62]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptogr. 2(1): 4 (2018) - [j61]Khalid Alissa, Jason Reid, Ed Dawson:
SPCC: a security policy compliance checker plug-in for YAWL. Int. J. Bus. Process. Integr. Manag. 9(1): 22-31 (2018) - [j60]Nimalaprakasan Skandhakumar, Jason Reid, Farzad Salim, Ed Dawson:
A policy model for access control using building information models. Int. J. Crit. Infrastructure Prot. 23: 1-10 (2018) - [j59]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A fundamental flaw in the ++AE authenticated encryption mode. J. Math. Cryptol. 12(1): 37-42 (2018) - [c134]Md. Iftekhar Salam, Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault attacks on Tiaoxin-346. ACSW 2018: 5:1-5:9 - [i14]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. IACR Cryptol. ePrint Arch. 2018: 66 (2018) - 2017
- [j58]Chuah Chai Wen, Ed Dawson, Leonie Simpson:
Stream cipher based key derivation function. Int. J. Secur. Networks 12(2): 70-82 (2017) - [c133]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes. ACISP (1) 2017: 285-305 - [c132]Chuah Chai Wen, Mustafa Mat Deris, Edward Dawson:
On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function. ICISA 2017: 231-240 - [c131]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A Fault-based Attack on AEZ v4.2. TrustCom/BigDataSE/ICESS 2017: 634-641 - [c130]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. TrustCom/BigDataSE/ICESS 2017: 961-966 - [i13]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes. IACR Cryptol. ePrint Arch. 2017: 717 (2017) - 2016
- [c129]Hassan Qahur Al Mahri, Leonie Ruth Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Forgery attacks on ++AE authenticated encryption mode. ACSW 2016: 33 - [c128]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Ruth Simpson, Ed Dawson, Josef Pieprzyk:
Finding state collisions in the authenticated encryption stream cipher ACORN. ACSW 2016: 36 - [c127]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. ATIS 2016: 15-26 - [c126]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. ATIS 2016: 41-53 - [i12]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2016: 743 (2016) - 2015
- [c125]Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim:
BP-XACML an Authorisation Policy Language for Business Processes. ACISP 2015: 307-325 - [c124]Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Correcting flaws in Mitchell's analysis of EPBC. AISC 2015: 57-60 - [i11]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2015: 918 (2015) - 2014
- [c123]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Weak key-IV Pairs in the A5/1 Stream Cipher. AISC 2014: 23-36 - [c122]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers (Poster). AISC 2014: 77-81 - [c121]Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher. SETA 2014: 220-233 - 2013
- [j57]Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson:
Budget-aware Role Based Access Control. Comput. Secur. 35: 37-50 (2013) - [j56]Mufeed Al Mashrafi, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Indirect message injection for MAC generation. J. Math. Cryptol. 7(3): 253-277 (2013) - [c120]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slid Pairs in the Initialisation of the A5/1 Stream Cipher. AISC 2013: 3-12 - [c119]Chuah Chai Wen, Ed Dawson, Leonie Simpson:
Key Derivation Function: The SCKDF Scheme. SEC 2013: 125-138 - [e8]Ed Dawson:
Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings. Lecture Notes in Computer Science 7779, Springer 2013, ISBN 978-3-642-36094-7 [contents] - [i10]Sui-Guan Teo, Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State convergence in bit-based stream ciphers. IACR Cryptol. ePrint Arch. 2013: 96 (2013) - [i9]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers. IACR Cryptol. ePrint Arch. 2013: 240 (2013) - 2012
- [j55]Nimalaprakasan Skandhakumar, Jason Reid, Ed Dawson, Robin Drogemuller, Farzad Salim:
An Authorization Framework using Building Information Models. Comput. J. 55(10): 1244-1264 (2012) - [c118]Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. ACISP 2012: 138-151 - [c117]Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
State convergence in the initialisation of the Sfinks stream cipher. AISC 2012: 27-32 - [c116]Harry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
A General Model for MAC Generation Using Direct Injection. Inscrypt 2012: 198-215 - [c115]Nimalaprakasan Skandhakumar, Farzad Salim, Jason Reid, Ed Dawson:
Physical Access Control Administration Using Building Information Models. CSS 2012: 236-250 - [c114]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slide attacks on the Sfinks stream cipher. ICSPCS 2012: 1-10 - [c113]Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson:
A Framework for Security Analysis of Key Derivation Functions. ISPEC 2012: 199-216 - 2011
- [j54]Kun Peng, Ed Dawson, Feng Bao:
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. Int. J. Inf. Sec. 10(1): 33-47 (2011) - [j53]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
An exploration of affine group laws for elliptic curves. J. Math. Cryptol. 5(1): 1-50 (2011) - [c112]Farzad Salim, Jason Reid, Ed Dawson, Uwe Dulleck:
An Approach to Access Control under Uncertainty. ARES 2011: 1-8 - [c111]Farzad Salim, Uwe Dulleck, Jason Reid, Ed Dawson:
Optimal Budget Allocation in Budget-based Access Control. ARES 2011: 591-596 - [c110]Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson:
State convergence and the effectiveness of time-memory-data tradeoffs. IAS 2011: 92-97 - [c109]Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State Convergence in the Initialisation of Stream Ciphers. ACISP 2011: 75-88 - [c108]Quan Pham, Jason Reid, Ed Dawson:
A Model for Constraint and Delegation Management. ISPEC 2011: 362-371 - [c107]Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson:
Algebraic analysis of the SSS stream cipher. SIN 2011: 199-204 - 2010
- [j52]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
On a taxonomy of delegation. Comput. Secur. 29(5): 565-579 (2010) - [j51]Farzad Salim, Jason Reid, Ed Dawson:
Authorization models for secure information sharing: a survey and research agenda. ISC Int. J. Inf. Secur. 2(2): 69-87 (2010) - [c106]Ed Dawson, Jason Reid, Farzad Salim, Mark Burdon:
Information Sharing in the 21st century: Progress and Challenges. AISC 2010: 2 - [c105]Farzad Salim, Jason Reid, Ed Dawson:
An Administrative Model for UCON ABC. AISC 2010: 32-38 - [c104]Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks. AISC 2010: 67-74 - [c103]Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson:
Towards a Game Theoretic Authorisation Model. GameSec 2010: 208-219 - [i8]Sui-Guan Teo, Leonie Simpson, Ed Dawson:
Bias in the nonlinear filter generator output sequence. IACR Cryptol. ePrint Arch. 2010: 105 (2010) - [i7]Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson:
State convergence and keyspace reduction of the Mixer stream cipher. IACR Cryptol. ePrint Arch. 2010: 628 (2010)
2000 – 2009
- 2009
- [j50]Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Comput. Electr. Eng. 35(1): 9-17 (2009) - [j49]Baoyuan Kang, Colin Boyd, Ed Dawson:
Identity-based strong designated verifier signature schemes: Attacks and new construction. Comput. Electr. Eng. 35(1): 49-53 (2009) - [j48]Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 82(2): 270-273 (2009) - [c102]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Jacobi Quartic Curves Revisited. ACISP 2009: 452-468 - [c101]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Faster Group Operations on Elliptic Curves. AISC 2009: 7-19 - [c100]Muhammad Reza Z'aba, Håvard Raddum, Leonie Simpson, Ed Dawson, Matt Henricksen, Kenneth Koon-Ho Wong:
Algebraic Analysis of LEX. AISC 2009: 33-45 - [c99]Muhammad Reza Z'aba, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Linearity within the SMS4 Block Cipher. Inscrypt 2009: 248-265 - [c98]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
On a Taxonomy of Delegation. SEC 2009: 353-363 - [i6]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Jacobi Quartic Curves Revisited. IACR Cryptol. ePrint Arch. 2009: 312 (2009) - 2008
- [j47]Kun Peng, Feng Bao, Ed Dawson:
Correct, Private, Flexible and Efficient Range Test. J. Res. Pract. Inf. Technol. 40(4): 275-289 (2008) - [j46]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [c97]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Twisted Edwards Curves Revisited. ASIACRYPT 2008: 326-343 - [c96]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
Commitment Issues in Delegation Process. AISC 2008: 27-38 - [c95]Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson:
Bit-Pattern Based Integral Attack. FSE 2008: 363-381 - [p1]Ed Dawson, Matthew Henricksen, Leonie Simpson:
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. The eSTREAM Finalists 2008: 20-38 - [i5]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Twisted Edwards Curves Revisited. IACR Cryptol. ePrint Arch. 2008: 522 (2008) - 2007
- [j45]Kun Peng, Colin Boyd, Ed Dawson:
Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): 6 (2007) - [c94]Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson:
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. ACISP 2007: 11-28 - [c93]Kun Peng, Ed Dawson:
A Range Test Secure in the Active Adversary Model. ACSW 2007: 159-162 - [c92]Mark Burdon, Juan Manuel González Nieto, Sharon Christensen, Ed Dawson, William D. Duncan, Bill Lane:
Access Control in Federated Databases: How Legal Issues Shape Security. EGOV 2007: 228-239 - [c91]Hüseyin Hisil, Gary Carter, Ed Dawson:
New Formulae for Efficient Elliptic Curve Arithmetic. INDOCRYPT 2007: 138-151 - [c90]Kun Peng, Ed Dawson:
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. ISPEC 2007: 209-224 - [c89]Quan Pham, Adrian McCullagh, Ed Dawson:
Consistency of User Attribute in Federated Systems. TrustBus 2007: 165-177 - [e7]Josef Pieprzyk, Hossein Ghodosi, Ed Dawson:
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4586, Springer 2007, ISBN 978-3-540-73457-4 [contents] - [e6]Ed Dawson, Duncan S. Wong:
Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings. Lecture Notes in Computer Science 4464, Springer 2007, ISBN 978-3-540-72159-8 [contents] - [i4]Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Faster Group Operations on Elliptic Curves. IACR Cryptol. ePrint Arch. 2007: 441 (2007) - 2006
- [j44]Kun Peng, Colin Boyd, Ed Dawson:
Batch verification of validity of bids in homomorphic e-auction. Comput. Commun. 29(15): 2798-2805 (2006) - [j43]Praveen Gauravaram, Adrian McCullagh, Ed Dawson:
The legal and practical implications of recent attacks on 128-bit cryptographic hash functions. First Monday 11(1) (2006) - [j42]Martin P. Betts, Peter Black, Sharon Christensen, Ed Dawson, Rong Du, William D. Duncan, Ernest Foo, Juan Manuel González Nieto:
Towards Secure and Legal E-Tendering. J. Inf. Technol. Constr. 11: 89-102 (2006) - [c88]Matthew Henricksen, Ed Dawson:
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. ACISP 2006: 52-63 - [c87]Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto:
A Novel Range Test. ACISP 2006: 247-258 - [c86]Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ACISP 2006: 407-420 - [c85]Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto:
SKMA: a key management architecture for SCADA systems. ACSW 2006: 183-192 - [c84]Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309 - [c83]Kun Peng, Colin Boyd, Ed Dawson:
Sealed-Bid Micro Auctions. SEC 2006: 246-257 - 2005
- [j41]Yousef Bani Hammad, Gary Carter, Ed Dawson, W. Müller, Yvonne Hitchcock:
RAK factoring algorithm. Australas. J Comb. 33: 291-306 (2005) - [j40]Javier López, José A. Montenegro, José Luis Vivas, Eiji Okamoto, Ed Dawson:
Specification and design of advanced authentication and authorization services. Comput. Stand. Interfaces 27(5): 467-478 (2005) - [j39]Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson:
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. Comput. Syst. Sci. Eng. 20(6) (2005) - [j38]Juan Manuel González Nieto, Colin Boyd, Ed Dawson:
A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptogr. 36(3): 301-316 (2005) - [j37]Joanne Fuller, William Millan, Ed Dawson:
Multi-objective Optimisation of Bijective S-Boxes. New Gener. Comput. 23(3): 201-218 (2005) - [c82]Ming Yao, Kun Peng, Ed Dawson:
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. ACISP 2005: 158-169 - [c81]Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López:
A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260 - [c80]Kun Peng, Colin Boyd, Ed Dawson:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204 - [c79]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96 - [c78]Kun Peng, Colin Boyd, Ed Dawson:
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388 - [c77]Kun Peng, Colin Boyd, Ed Dawson:
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98 - [c76]Matthew Henricksen, Ed Dawson:
Rekeying Issues in the MUGI Stream Cipher. Selected Areas in Cryptography 2005: 175-188 - [e5]Ed Dawson, Serge Vaudenay:
Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings. Lecture Notes in Computer Science 3715, Springer 2005, ISBN 3-540-28938-0 [contents] - [i3]William Millan, Ed Dawson:
LILI-II is not Broken. IACR Cryptol. ePrint Arch. 2005: 234 (2005) - [i2]Kun Peng, Colin Boyd, Ed Dawson:
Batch Verification of Validity of Bids in Homomorphic E-auction. IACR Cryptol. ePrint Arch. 2005: 346 (2005) - [i1]Praveen Gauravaram, William Millan, Juanma González Nieto, Ed Dawson:
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function. IACR Cryptol. ePrint Arch. 2005: 390 (2005) - 2004
- [j36]L. Burnett, William Millan, Ed Dawson, Andrew J. Clark:
Simpler methods for generating better Boolean functions with good cryptographic properties. Australas. J Comb. 29: 231-248 (2004) - [j35]William Millan, Joanne Fuller, Ed Dawson:
New Concepts in Evolutionary Search for Boolean Functions in Cryptology. Comput. Intell. 20(3): 463-474 (2004) - [j34]Ed Dawson:
Preface to the special issue on PKI. Int. J. Inf. Sec. 2(2): 65 (2004) - [j33]Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Int. J. Inf. Sec. 3(2): 86-98 (2004) - [j32]Chuan-Kun Wu, Ed Dawson:
Correlation immunity and resiliency of symmetric Boolean functions. Theor. Comput. Sci. 312(2-3): 321-335 (2004) - [c75]Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson:
A Mobile Agent System Providing Offer Privacy. ACISP 2004: 301-312 - [c74]Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508 - [c73]Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Secure Key Issuing in ID-based Cryptography. ACSW 2004: 69-74 - [c72]Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71 - [c71]Jaimee Brown, Ed Dawson, Juan Manuel González Nieto:
Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109 - [c70]Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock:
Improvements to the RAK Factoring Algorithm. Cryptographic Algorithms and their Uses 2004: 152- - [c69]Joanne Fuller, William Millan, Ed Dawson:
Multi-objective optimisation of bijective s-boxes. IEEE Congress on Evolutionary Computation 2004: 1525-1532 - [c68]Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson:
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173 - [c67]Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon-Jae Lee, Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher. ICISC 2004: 33-50 - [c66]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66 - [c65]Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72 - [c64]Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454 - [c63]Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson:
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. TrustBus 2004: 132-141 - [c62]Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson:
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. TrustBus 2004: 152-161 - [e4]Ed Dawson, Wolfgang Klemm:
Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings. Queensland University of Technology 2004, ISBN 1-74107-064-3 [contents] - 2003
- [j31]Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier López:
Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Comput. Commun. 26(16): 1826-1838 (2003) - [c61]Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The Security of Fixed versus Random Elliptic Curves in Cryptography. ACISP 2003: 55-66 - [c60]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Five Sealed-bid Auction Models. ACSW 2003: 77-86 - [c59]Joanne Fuller, Ed Dawson, William Millan:
Evolutionary generation of bent functions for cryptography. IEEE Congress on Evolutionary Computation 2003: 1655-1661 - [c58]William Millan, Joanne Fuller, Ed Dawson:
New concepts in evolutionary search for Boolean functions in cryptology. IEEE Congress on Evolutionary Computation 2003: 2157-2164 - [c57]Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto:
Privacy and Trusted Computing. DEXA Workshops 2003: 383-388 - [c56]Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Secure e-Voting for Preferential Elections. EGOV 2003: 246-249 - [c55]Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258 - [c54]Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. ICISC 2003: 418-431 - [c53]Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. WISA 2003: 244-256 - [c52]Ming Yao, Ernest Foo, Kun Peng, Ed Dawson:
An Improved Forward Integrity Protocol for Mobile Agents. WISA 2003: 272-285 - 2002
- [j30]Kapali Viswanathan, Colin Boyd, Ed Dawson:
Hybrid Key Escrow: A New Paradigm. Comput. Secur. 21(1): 77-92 (2002) - [j29]Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson:
Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002) - [j28]Ed Dawson, Kapali Viswanathan, Colin Boyd:
Compliant cryptologic protocols. Int. J. Inf. Sec. 1(3): 189-202 (2002) - [c51]Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee, William Millan, Sang-Jae Moon, Leonie Simpson:
The LILI-II Keystream Generator. ACISP 2002: 25-39 - [c50]Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto:
Modelling Trust Structures for Public Key Infrastructures. ACISP 2002: 56-70 - [c49]Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson:
Strengthening the Key Schedule of the AES. ACISP 2002: 226-240 - [c48]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159 - [c47]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420 - [c46]Ed Dawson, Javier López, José A. Montenegro, Eiji Okamoto:
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149 - 2001
- [c45]DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson:
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. ACISP 2001: 334-343 - [c44]Juan Manuel González Nieto, Colin Boyd, Ed Dawson:
A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363 - [c43]Kapali Viswanathan, Colin Boyd, Ed Dawson:
An Analysis of Integrity Services in Protocols. INDOCRYPT 2001: 175-187 - 2000
- [j27]Chuan-Kun Wu, Ed Dawson:
Construction of correlation immune Boolean functions. Australas. J Comb. 21: 141-166 (2000) - [j26]Ed Dawson, Andrew J. Clark, Mark Looi:
Key management in a non-trusted distributed environment. Future Gener. Comput. Syst. 16(4): 319-329 (2000) - [j25]Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson:
Fast Correlation Attacks on the Summation Generator. J. Cryptol. 13(2): 245-262 (2000) - [j24]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 49(10): 1100-1109 (2000) - [c42]Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson:
Key Recovery System for the Commercial Environment. ACISP 2000: 149-162 - [c41]Kapali Viswanathan, Colin Boyd, Ed Dawson:
A Three Phased Schema for Sealed Bid Auction System Design. ACISP 2000: 412-426 - [c40]L. Burnett, Gary Carter, Ed Dawson, William Millan:
Efficient Methods for Generating MARS-Like S-Boxes. FSE 2000: 300-314 - [c39]DongGook Park, Colin Boyd, Ed Dawson:
Micropayments for Wireless Communications. ICISC 2000: 192-205 - [c38]Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson:
Linkability in Practical Electronic Cash Design. ISW 2000: 149-163 - [c37]DongGook Park, Colin Boyd, Ed Dawson:
Classification of Authentication Protocols: A Practical Approach. ISW 2000: 194-208 - [c36]Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson:
Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237 - [c35]Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan:
LILI Keystream Generator. Selected Areas in Cryptography 2000: 248-261 - [e3]Ed Dawson, Andrew J. Clark, Colin Boyd:
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings. Lecture Notes in Computer Science 1841, Springer 2000, ISBN 3-540-67742-9 [contents]
1990 – 1999
- 1999
- [j23]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Inversion Attack and Branching. Aust. Comput. J. 31(2): 44-53 (1999) - [j22]William J. Caelli, Ed Dawson, Scott A. Rea:
PKI, elliptic curve cryptography, and digital signatures. Comput. Secur. 18(1): 47-66 (1999) - [j21]Leonie Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson:
A Fast Correlation Attack on Multiplexer Generators. Inf. Process. Lett. 70(2): 89-93 (1999) - [j20]Helen Gustafson, Ed Dawson, Jovan Dj. Golic, Anthony N. Pettitt:
Methods for testing subblock patterns. Stat. Comput. 9(4): 279-286 (1999) - [c34]William Millan, Andrew J. Clark, Ed Dawson:
Boolean Function Design Using Hill Climbing Methods. ACISP 1999: 1-11 - [c33]Kapali Viswanathan, Colin Boyd, Ed Dawson:
Publicly Verifiable Key Escrow with Limited Time Span. ACISP 1999: 36-50 - [c32]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Inversion Attack and Branching. ACISP 1999: 88-102 - [c31]Kapali Viswanathan, Colin Boyd, Ed Dawson:
Signature Scheme for Controlled Environments. ICICS 1999: 119-134 - [c30]William Millan, L. Burnett, Gary Carter, Andrew J. Clark, Ed Dawson:
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. ICICS 1999: 263-274 - [c29]Kapali Viswanathan, Colin Boyd, Ed Dawson:
Secure Selection Protocols. ICISC 1999: 132-146 - [c28]Kapali Viswanathan, Colin Boyd, Ed Dawson:
Strong Binding for Software Key Escrow. ICPP Workshops 1999: 134-139 - 1998
- [j19]Ed Dawson, Helen Gustafson:
A Method for Measuring Entropy of Symmetric Cipher Key Generators. Comput. Secur. 17(2): 177-184 (1998) - [j18]He Jingmin, Ed Dawson:
Shared Secret Reconstruction. Des. Codes Cryptogr. 14(3): 221-237 (1998) - [c27]Gary Carter, Ed Dawson, Lauren Nielsen:
Key Schedules of Iterative Block Ciphers. ACISP 1998: 80-89 - [c26]Leonie Simpson, Jovan Dj. Golic, Ed Dawson:
A Probabilistic Correlation Attack on the Shrinking Generator. ACISP 1998: 147-158 - [c25]William Millan, Andrew J. Clark, Ed Dawson:
Heuristic Design of Cryptographically Strong Balanced Boolean Functions. EUROCRYPT 1998: 489-499 - [c24]Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell:
A security architecture for third generation wireless systems. ICISC 1998: 15-32 - [c23]David A. Wagner, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier:
Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305 - [e2]Colin Boyd, Ed Dawson:
Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings. Lecture Notes in Computer Science 1438, Springer 1998, ISBN 3-540-64732-5 [contents] - 1997
- [j17]Ed Dawson, Chuan-Kun Wu:
On the linear structure of symmetric Boolean functions. Australas. J Comb. 16: 239-244 (1997) - [j16]Andrew J. Clark, Ed Dawson:
A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher. Cryptologia 21(2): 129-138 (1997) - [j15]Jovan Dj. Golic, Mahmoud Salmasizadeh, Leonie Simpson, Ed Dawson:
Fast Correlation Attacks on Nonlinear Filter Generators. Inf. Process. Lett. 64(1): 37-42 (1997) - [j14]Helen Gustafson, Ed Dawson, Jovan Dj. Golic:
Automated statistical methods for measuring the strength of block ciphers. Stat. Comput. 7(2): 125-135 (1997) - [c22]William Millan, Ed Dawson:
On the Security of Self-Synchronous Ciphers. ACISP 1997: 159-170 - [c21]Jen Lim, Colin Boyd, Ed Dawson:
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. ACISP 1997: 216-227 - [c20]M. Salmasidazeh, Leonie Simpson, Jovan Dj. Golic, Ed Dawson:
Fast Correlation Attacks and Multiple Linear Approximations. ACISP 1997: 228-239 - [c19]William Millan, Andrew J. Clark, Ed Dawson:
An effective genetic algorithm for finding highly nonlinear Boolean Functions. ICICS 1997: 149-158 - [c18]Ed Dawson, Chuan-Kun Wu:
Construction of correlation immune Boolean functions. ICICS 1997: 170-180 - [c17]Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson:
A taxonomy of electronic cash schemes. SEC 1997: 337-348 - 1996
- [j13]Ed Dawson, Diane M. Donovan, Alan Offer:
Quasigroups, isotopisms and authentication schemes. Australas. J Comb. 13: 75-88 (1996) - [j12]Andrew J. Clark, Ed Dawson, Helen Bergen:
Combinatorial Optimization and the Knapsack Cipher. Cryptologia 20(1): 85-93 (1996) - [j11]Ed Dawson, Lauren Nielsen:
Automated Cryptanalysis of XOR Plaintext Strings. Cryptologia 20(2): 165-181 (1996) - [c16]Chuan-Kun Wu, Ed Dawson:
On construction of resilient functions. ACISP 1996: 79-86 - [c15]Ed Dawson, He Jingmin:
Another approach to software key escrow encryption. ACISP 1996: 87-95 - [c14]Andrew J. Clark, Jovan Dj. Golic, Ed Dawson:
A Comparison of Fast Correlation Attacks. FSE 1996: 145-157 - [c13]He Jingmin, Ed Dawson:
On the reconstruction of shared secrets. SEC 1996: 209-218 - 1995
- [c12]He Jingmin, Ed Dawson:
A New Key Escrow Cryptosystem. Cryptography: Policy and Algorithms 1995: 105-114 - [c11]He Jingmin, Ed Dawson:
How to Fairly Reconstruct a Shared Secret. Cryptography: Policy and Algorithms 1995: 115-124 - [c10]Helen Gustafson, Ed Dawson, Jovan Dj. Golic:
Randomness Measures Related to Subset Occurrence. Cryptography: Policy and Algorithms 1995: 132-143 - [c9]Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew J. Clark, Abdollah Khodkar, Ed Dawson:
Discrete Optimisation and Fast Correlation Attacks. Cryptography: Policy and Algorithms 1995: 186-200 - [e1]Ed Dawson, Jovan Dj. Golic:
Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings. Lecture Notes in Computer Science 1029, Springer 1995, ISBN 3-540-60759-5 [contents] - 1994
- [j10]Helen Gustafson, Anthony N. Pettitt, Ed Dawson, L. J. O'Connor:
Linear dependencies in product ciphers. Australas. J Comb. 10: 115-130 (1994) - [j9]Ed Dawson, Diane M. Donovan:
The breadth of Shamir's secret-sharing scheme. Comput. Secur. 13(1): 69-78 (1994) - [j8]Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli:
A computer package for measuring the strength of encryption algorithms. Comput. Secur. 13(8): 687-697 (1994) - [j7]Ed Dawson, Andrew J. Clark:
Divide and Conquer Attacks on Certain Classes of Stream Ciphers. Cryptologia 18(1): 25-40 (1994) - 1993
- [j6]Ed Dawson, Ebadollah S. Mahmoodian, Alan Rahilly:
Orthogonal arrays and ordered threshold schemes. Australas. J Comb. 8: 27-44 (1993) - [j5]Caroline Allinson, Helen Bergen, Ed Dawson:
Message collision in block ciphers with message authentication. Comput. Secur. 12(8): 781-787 (1993) - [j4]Bruce Goldburg, S. Sridharan, Ed Dawson:
Design and Cryptanalysis of Transform-Based Analog Speech Scamblers. IEEE J. Sel. Areas Commun. 11(5): 735-744 (1993) - [c8]Ed Dawson, Diane M. Donovan:
Shamir's Scheme Says It all. SEC 1993: 91-102 - 1992
- [j3]Ed Dawson, Helen Gustafson, Anthony N. Pettitt:
Strict key avalanche criterion. Australas. J Comb. 6: 147-154 (1992) - [c7]Ed Dawson:
Cryptanalysis of Summation Generator. AUSCRYPT 1992: 209-215 - [c6]Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli:
Measuring the Strength of Ciphers. SEC 1992: 235-247 - 1991
- [j2]Ed Dawson, Helen Gustafson, N. Davies:
Black box analysis of stream ciphers. Australas. J Comb. 4: 59-70 (1991) - [c5]Bruce Goldburg, Ed Dawson, S. Sridharan:
A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. ASIACRYPT 1991: 299-311 - [c4]Bruce Goldburg, Ed Dawson, S. Sridharan:
The Automated Cryptanalysis of Analog Speech Scramblers. EUROCRYPT 1991: 422-430 - 1990
- [j1]Ed Dawson, John A. Asenstorfer, P. Gray:
Cryptographic properties of Groth sequences. Australas. J Comb. 1: 53-66 (1990) - [c3]Helen Gustafson, Ed Dawson, William J. Caelli:
Comparison of Block Ciphers. AUSCRYPT 1990: 208-220 - [c2]Ed Dawson, Bruce Goldburg:
Universal Logic Sequences. AUSCRYPT 1990: 426-432 - [c1]S. Sridharan, Ed Dawson, Bruce Goldburg:
Speech encryption using discrete orthogonal transforms. ICASSP 1990: 1647-1650
Coauthor Index
aka: Matthew Henricksen
aka: Juanma González Nieto
aka: Leonie Simpson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint