|
Search the dblp DataBase
Ed Dawson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Matthew Henricksen, Ed Dawson
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:52-63 [Conf]
- Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:25-39 [Conf]
- Ed Dawson, He Jingmin
Another approach to software key escrow encryption. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:87-95 [Conf]
- Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:407-420 [Conf]
- Jovan Dj. Golic, Andrew Clark, Ed Dawson
Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:88-102 [Conf]
- Gary Carter, Ed Dawson, Lauren Nielsen
Key Schedules of Iterative Block Ciphers. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:80-89 [Conf]
- Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto
Modelling Trust Structures for Public Key Infrastructures. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:56-70 [Conf]
- Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
The Security of Fixed versus Random Elliptic Curves in Cryptography. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:55-66 [Conf]
- Chuan-Kun Wu, Ed Dawson
On construction of resilient functions. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:79-86 [Conf]
- Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
Key Recovery System for the Commercial Environment. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:149-162 [Conf]
- Jen Lim, Colin Boyd, Ed Dawson
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:216-227 [Conf]
- DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:334-343 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto
A Novel Range Test. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:247-258 [Conf]
- Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson
Strengthening the Key Schedule of the AES. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:226-240 [Conf]
- William Millan, Andrew Clark, Ed Dawson
Boolean Function Design Using Hill Climbing Methods. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:1-11 [Conf]
- William Millan, Ed Dawson
On the Security of Self-Synchronous Ciphers. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:159-170 [Conf]
- Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson
A Mobile Agent System Providing Offer Privacy. [Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:301-312 [Conf]
- Ming Yao, Kun Peng, Ed Dawson
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:158-169 [Conf]
- M. Salmasidazeh, Leone Simpson, Jovan Dj. Golic, Ed Dawson
Fast Correlation Attacks and Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:228-239 [Conf]
- Leone Simpson, Jovan Dj. Golic, Ed Dawson
A Probabilistic Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:147-158 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
A Three Phased Schema for Sealed Bid Auction System Design. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:412-426 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Publicly Verifiable Key Escrow with Limited Time Span. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:36-50 [Conf]
- Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:494-508 [Conf]
- Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto
SKMA: a key management architecture for SCADA systems. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:183-192 [Conf]
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:69-74 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
Five Sealed-bid Auction Models. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2003, pp:77-86 [Conf]
- Ed Dawson
Cryptanalysis of Summation Generator. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:209-215 [Conf]
- Ed Dawson, Bruce Goldburg
Universal Logic Sequences. [Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:426-432 [Conf]
- Bruce Goldburg, Ed Dawson, S. Sridharan
A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1991, pp:299-311 [Conf]
- Helen Gustafson, Ed Dawson, William J. Caelli
Comparison of Block Ciphers. [Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:208-220 [Conf]
- Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez
A Novel Method to Maintain Privacy in Mobile Agent Applications. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:247-260 [Conf]
- Jaimee Brown, Ed Dawson, Juan Manuel González Nieto
Implementation of the GBD Cryptosystem. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:94-109 [Conf]
- Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock
Improvements to the RAK Factoring Algorithm. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:152-0 [Conf]
- Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:57-71 [Conf]
- Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
Discrete Optimisation and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:186-200 [Conf]
- Helen Gustafson, Ed Dawson, Jovan Dj. Golic
Randomness Measures Related to Subset Occurrence. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:132-143 [Conf]
- He Jingmin, Ed Dawson
A New Key Escrow Cryptosystem. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:105-114 [Conf]
- He Jingmin, Ed Dawson
How to Fairly Reconstruct a Shared Secret. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:115-124 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:188-204 [Conf]
- Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto
Privacy and Trusted Computing. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:383-388 [Conf]
- Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. [Citation Graph (0, 0)][DBLP] EC-Web, 2004, pp:164-173 [Conf]
- Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan
Secure e-Voting for Preferential Elections. [Citation Graph (0, 0)][DBLP] EGOV, 2003, pp:246-249 [Conf]
- Bruce Goldburg, Ed Dawson, S. Sridharan
The Automated Cryptoanalysis of Analog Speech Scramblers. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:422-430 [Conf]
- William Millan, Andrew Clark, Ed Dawson
Heuristic Design of Cryptographically Strong Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:489-499 [Conf]
- Andrew Clark, Jovan Dj. Golic, Ed Dawson
A Comparison of Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1996, pp:145-157 [Conf]
- L. Burnett, Gary Carter, Ed Dawson, William Millan
Efficient Methods for Generating MARS-Like S-Boxes. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:300-314 [Conf]
- Ed Dawson, Chuan-Kun Wu
Construction of correlation immune Boolean functions. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:170-180 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
Ciphertext Comparison, a New Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:84-96 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:147-159 [Conf]
- William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:263-274 [Conf]
- William Millan, Andrew Clark, Ed Dawson
An effective genetic algorithm for finding highly nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:149-158 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Signature Scheme for Controlled Environments. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:119-134 [Conf]
- Juan Manuel González Nieto, Colin Boyd, Ed Dawson
A Public Key Cryptosystem Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:352-363 [Conf]
- Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:33-50 [Conf]
- Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:418-431 [Conf]
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:245-258 [Conf]
- Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell
A security architecture for third generation wireless systems. [Citation Graph (0, 0)][DBLP] ICISC, 1998, pp:15-32 [Conf]
- DongGook Park, Colin Boyd, Ed Dawson
Micropayments for Wireless Communications. [Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:192-205 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
An Efficient and Verifiable Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:51-66 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
Non-interactive Auction Schemewith Strong Privacy. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:407-420 [Conf]
- Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:296-309 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Secure Selection Protocols. [Citation Graph (0, 0)][DBLP] ICISC, 1999, pp:132-146 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Strong Binding for Software Key Escrow. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:134-139 [Conf]
- Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
Multiplicative Homomorphic E-Voting. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:61-72 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
An Analysis of Integrity Services in Protocols. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:175-187 [Conf]
- Kun Peng, Ed Dawson
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:209-224 [Conf]
- Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:136-149 [Conf]
- Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson
Linkability in Practical Electronic Cash Design. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:149-163 [Conf]
- DongGook Park, Colin Boyd, Ed Dawson
Classification of Authentication Protocols: A Practical Approach. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:194-208 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:374-388 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:84-98 [Conf]
- Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
Key Recovery in Third Generation Wireless Communication Systems. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:223-237 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
A Correct, Private, and Efficient Mix Network. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:439-454 [Conf]
- Matthew Henricksen, Ed Dawson
Rekeying Issues in the MUGI Stream Cipher. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2005, pp:175-188 [Conf]
- Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan
LILI Keystream Generator. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:248-261 [Conf]
- David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
- Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson
A taxonomy of electronic cash schemes. [Citation Graph (0, 0)][DBLP] SEC, 1997, pp:337-348 [Conf]
- Ed Dawson, Diane Donovan
Shamir's Scheme Says It all. [Citation Graph (0, 0)][DBLP] SEC, 1993, pp:91-102 [Conf]
- Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli
Measuring the Strength of Ciphers. [Citation Graph (0, 0)][DBLP] SEC, 1992, pp:235-247 [Conf]
- He Jingmin, Ed Dawson
On the reconstruction of shared secrets. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:209-218 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson
Sealed-Bid Micro Auctions. [Citation Graph (0, 0)][DBLP] SEC, 2006, pp:246-257 [Conf]
- Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. [Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:152-161 [Conf]
- Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. [Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:132-141 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:244-256 [Conf]
- Ming Yao, Ernest Foo, Kun Peng, Ed Dawson
An Improved Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:272-285 [Conf]
- Jovan Dj. Golic, Andrew Clark, Ed Dawson
Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP] Australian Computer Journal, 1999, v:31, n:2, pp:44-53 [Journal]
- Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez
Virtual certificates and synthetic certificates: new paradigms for improving public key validation. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:16, pp:1826-1838 [Journal]
- Kun Peng, Colin Boyd, Ed Dawson
Batch verification of validity of bids in homomorphic e-auction. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2798-2805 [Journal]
- William J. Caelli, Ed Dawson, Scott A. Rea
PKI, elliptic curve cryptography, and digital signatures. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:1, pp:47-66 [Journal]
- Ed Dawson, Helen Gustafson
A Method for Measuring Entropy of Symmetric Cipher Key Generators. [Citation Graph (0, 0)][DBLP] Computers & Security, 1998, v:17, n:2, pp:177-184 [Journal]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Hybrid Key Escrow: A New Paradigm. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:1, pp:77-92 [Journal]
- Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- He Jingmin, Ed Dawson
Shared Secret Reconstruction. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1998, v:14, n:3, pp:221-237 [Journal]
- Juan Manuel González Nieto, Colin Boyd, Ed Dawson
A Public Key Cryptosystem Based On A Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:36, n:3, pp:301-316 [Journal]
- Praveen Gauravaram, Adrian McCullagh, Ed Dawson
The legal and practical implications of recent attacks on 128-bit cryptographic hash functions. [Citation Graph (0, 0)][DBLP] First Monday, 2006, v:11, n:1, pp:- [Journal]
- Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
- Ed Dawson
Preface to the special issue on PKI. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:2, n:2, pp:65- [Journal]
- Ed Dawson, Kapali Viswanathan, Colin Boyd
Compliant cryptologic protocols. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:3, pp:189-202 [Journal]
- Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:86-98 [Journal]
- Jovan Dj. Golic, Mahmoud Salmasizadeh, Leone Simpson, Ed Dawson
Fast Correlation Attacks on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1997, v:64, n:1, pp:37-42 [Journal]
- Leone Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson
A Fast Correlation Attack on Multiplexer Generators. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1999, v:70, n:2, pp:89-93 [Journal]
- Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson
Fast Correlation Attacks on the Summation Generator. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2000, v:13, n:2, pp:245-262 [Journal]
- Bruce Goldburg, S. Sridharan, Ed Dawson
Design and Cryptanalysis of Transform-Based Analog Speech Scamblers. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:735-744 [Journal]
- Jovan Dj. Golic, Andrew Clark, Ed Dawson
Generalized Inversion Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2000, v:49, n:10, pp:1100-1109 [Journal]
- Chuan-Kun Wu, Ed Dawson
Correlation immunity and resiliency of symmetric Boolean functions. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2004, v:312, n:2-3, pp:321-335 [Journal]
- Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:11-28 [Conf]
- Mark Burdon, Juan Gonzalez Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane
Access Control in Federated Databases: How Legal Issues Shape Security. [Citation Graph (0, 0)][DBLP] EGOV, 2007, pp:228-239 [Conf]
- Quan Pham, Adrian McCullagh, Ed Dawson
Consistency of User Attribute in Federated Systems. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:165-177 [Conf]
- Ed Dawson, Andrew Clark, Mark Looi
Key management in a non-trusted distributed environment. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2000, v:16, n:4, pp:319-329 [Journal]
- Kun Peng, Colin Boyd, Ed Dawson
Batch zero-knowledge proof and verification and its applications. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]
Jacobi Quartic Curves Revisited. [Citation Graph (, )][DBLP]
A Range Test Secure in the Active Adversary Model. [Citation Graph (, )][DBLP]
Twisted Edwards Curves Revisited. [Citation Graph (, )][DBLP]
Bit-Pattern Based Integral Attack. [Citation Graph (, )][DBLP]
New Formulae for Efficient Elliptic Curve Arithmetic. [Citation Graph (, )][DBLP]
On a Taxonomy of Delegation. [Citation Graph (, )][DBLP]
New Concepts in Evolutionary Search for Boolean Functions in Cryptology. [Citation Graph (, )][DBLP]
On a taxonomy of delegation. [Citation Graph (, )][DBLP]
Search in 0.145secs, Finished in 0.151secs
|