The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ed Dawson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthew Henricksen, Ed Dawson
    Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:52-63 [Conf]
  2. Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
    The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:25-39 [Conf]
  3. Ed Dawson, He Jingmin
    Another approach to software key escrow encryption. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:87-95 [Conf]
  4. Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
    Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:407-420 [Conf]
  5. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:88-102 [Conf]
  6. Gary Carter, Ed Dawson, Lauren Nielsen
    Key Schedules of Iterative Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:80-89 [Conf]
  7. Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto
    Modelling Trust Structures for Public Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:56-70 [Conf]
  8. Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
    The Security of Fixed versus Random Elliptic Curves in Cryptography. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:55-66 [Conf]
  9. Chuan-Kun Wu, Ed Dawson
    On construction of resilient functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:79-86 [Conf]
  10. Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
    Key Recovery System for the Commercial Environment. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:149-162 [Conf]
  11. Jen Lim, Colin Boyd, Ed Dawson
    Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:216-227 [Conf]
  12. DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson
    Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:334-343 [Conf]
  13. Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto
    A Novel Range Test. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:247-258 [Conf]
  14. Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson
    Strengthening the Key Schedule of the AES. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:226-240 [Conf]
  15. William Millan, Andrew Clark, Ed Dawson
    Boolean Function Design Using Hill Climbing Methods. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:1-11 [Conf]
  16. William Millan, Ed Dawson
    On the Security of Self-Synchronous Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:159-170 [Conf]
  17. Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson
    A Mobile Agent System Providing Offer Privacy. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:301-312 [Conf]
  18. Ming Yao, Kun Peng, Ed Dawson
    Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:158-169 [Conf]
  19. M. Salmasidazeh, Leone Simpson, Jovan Dj. Golic, Ed Dawson
    Fast Correlation Attacks and Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:228-239 [Conf]
  20. Leone Simpson, Jovan Dj. Golic, Ed Dawson
    A Probabilistic Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:147-158 [Conf]
  21. Kapali Viswanathan, Colin Boyd, Ed Dawson
    A Three Phased Schema for Sealed Bid Auction System Design. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:412-426 [Conf]
  22. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Publicly Verifiable Key Escrow with Limited Time Span. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:36-50 [Conf]
  23. Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:494-508 [Conf]
  24. Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto
    SKMA: a key management architecture for SCADA systems. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:183-192 [Conf]
  25. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:69-74 [Conf]
  26. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Five Sealed-bid Auction Models. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:77-86 [Conf]
  27. Ed Dawson
    Cryptanalysis of Summation Generator. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:209-215 [Conf]
  28. Ed Dawson, Bruce Goldburg
    Universal Logic Sequences. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:426-432 [Conf]
  29. Bruce Goldburg, Ed Dawson, S. Sridharan
    A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:299-311 [Conf]
  30. Helen Gustafson, Ed Dawson, William J. Caelli
    Comparison of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:208-220 [Conf]
  31. Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez
    A Novel Method to Maintain Privacy in Mobile Agent Applications. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:247-260 [Conf]
  32. Jaimee Brown, Ed Dawson, Juan Manuel González Nieto
    Implementation of the GBD Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:94-109 [Conf]
  33. Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock
    Improvements to the RAK Factoring Algorithm. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:152-0 [Conf]
  34. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
    A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:57-71 [Conf]
  35. Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
    Discrete Optimisation and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:186-200 [Conf]
  36. Helen Gustafson, Ed Dawson, Jovan Dj. Golic
    Randomness Measures Related to Subset Occurrence. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:132-143 [Conf]
  37. He Jingmin, Ed Dawson
    A New Key Escrow Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:105-114 [Conf]
  38. He Jingmin, Ed Dawson
    How to Fairly Reconstruct a Shared Secret. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:115-124 [Conf]
  39. Kun Peng, Colin Boyd, Ed Dawson
    Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:188-204 [Conf]
  40. Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto
    Privacy and Trusted Computing. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:383-388 [Conf]
  41. Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson
    Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2004, pp:164-173 [Conf]
  42. Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Secure e-Voting for Preferential Elections. [Citation Graph (0, 0)][DBLP]
    EGOV, 2003, pp:246-249 [Conf]
  43. Bruce Goldburg, Ed Dawson, S. Sridharan
    The Automated Cryptoanalysis of Analog Speech Scramblers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:422-430 [Conf]
  44. William Millan, Andrew Clark, Ed Dawson
    Heuristic Design of Cryptographically Strong Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:489-499 [Conf]
  45. Andrew Clark, Jovan Dj. Golic, Ed Dawson
    A Comparison of Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:145-157 [Conf]
  46. L. Burnett, Gary Carter, Ed Dawson, William Millan
    Efficient Methods for Generating MARS-Like S-Boxes. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:300-314 [Conf]
  47. Ed Dawson, Chuan-Kun Wu
    Construction of correlation immune Boolean functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:170-180 [Conf]
  48. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Ciphertext Comparison, a New Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:84-96 [Conf]
  49. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:147-159 [Conf]
  50. William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson
    Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:263-274 [Conf]
  51. William Millan, Andrew Clark, Ed Dawson
    An effective genetic algorithm for finding highly nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:149-158 [Conf]
  52. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Signature Scheme for Controlled Environments. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:119-134 [Conf]
  53. Juan Manuel González Nieto, Colin Boyd, Ed Dawson
    A Public Key Cryptosystem Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:352-363 [Conf]
  54. Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
    Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:33-50 [Conf]
  55. Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson
    A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:418-431 [Conf]
  56. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:245-258 [Conf]
  57. Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell
    A security architecture for third generation wireless systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:15-32 [Conf]
  58. DongGook Park, Colin Boyd, Ed Dawson
    Micropayments for Wireless Communications. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:192-205 [Conf]
  59. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    An Efficient and Verifiable Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:51-66 [Conf]
  60. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Non-interactive Auction Schemewith Strong Privacy. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:407-420 [Conf]
  61. Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson
    Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:296-309 [Conf]
  62. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Secure Selection Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:132-146 [Conf]
  63. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Strong Binding for Software Key Escrow. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:134-139 [Conf]
  64. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Multiplicative Homomorphic E-Voting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:61-72 [Conf]
  65. Kapali Viswanathan, Colin Boyd, Ed Dawson
    An Analysis of Integrity Services in Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:175-187 [Conf]
  66. Kun Peng, Ed Dawson
    Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:209-224 [Conf]
  67. Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto
    A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:136-149 [Conf]
  68. Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson
    Linkability in Practical Electronic Cash Design. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:149-163 [Conf]
  69. DongGook Park, Colin Boyd, Ed Dawson
    Classification of Authentication Protocols: A Practical Approach. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:194-208 [Conf]
  70. Kun Peng, Colin Boyd, Ed Dawson
    A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:374-388 [Conf]
  71. Kun Peng, Colin Boyd, Ed Dawson
    Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:84-98 [Conf]
  72. Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
    Key Recovery in Third Generation Wireless Communication Systems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:223-237 [Conf]
  73. Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
    A Correct, Private, and Efficient Mix Network. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:439-454 [Conf]
  74. Matthew Henricksen, Ed Dawson
    Rekeying Issues in the MUGI Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:175-188 [Conf]
  75. Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan
    LILI Keystream Generator. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:248-261 [Conf]
  76. David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
    Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
  77. Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson
    A taxonomy of electronic cash schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:337-348 [Conf]
  78. Ed Dawson, Diane Donovan
    Shamir's Scheme Says It all. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:91-102 [Conf]
  79. Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli
    Measuring the Strength of Ciphers. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:235-247 [Conf]
  80. He Jingmin, Ed Dawson
    On the reconstruction of shared secrets. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:209-218 [Conf]
  81. Kun Peng, Colin Boyd, Ed Dawson
    Sealed-Bid Micro Auctions. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:246-257 [Conf]
  82. Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
    An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:152-161 [Conf]
  83. Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson
    Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:132-141 [Conf]
  84. Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
    Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:244-256 [Conf]
  85. Ming Yao, Ernest Foo, Kun Peng, Ed Dawson
    An Improved Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:272-285 [Conf]
  86. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1999, v:31, n:2, pp:44-53 [Journal]
  87. Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez
    Virtual certificates and synthetic certificates: new paradigms for improving public key validation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1826-1838 [Journal]
  88. Kun Peng, Colin Boyd, Ed Dawson
    Batch verification of validity of bids in homomorphic e-auction. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2798-2805 [Journal]
  89. William J. Caelli, Ed Dawson, Scott A. Rea
    PKI, elliptic curve cryptography, and digital signatures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:1, pp:47-66 [Journal]
  90. Ed Dawson, Helen Gustafson
    A Method for Measuring Entropy of Symmetric Cipher Key Generators. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:177-184 [Journal]
  91. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Hybrid Key Escrow: A New Paradigm. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:1, pp:77-92 [Journal]
  92. Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
    Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  93. He Jingmin, Ed Dawson
    Shared Secret Reconstruction. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:14, n:3, pp:221-237 [Journal]
  94. Juan Manuel González Nieto, Colin Boyd, Ed Dawson
    A Public Key Cryptosystem Based On A Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:3, pp:301-316 [Journal]
  95. Praveen Gauravaram, Adrian McCullagh, Ed Dawson
    The legal and practical implications of recent attacks on 128-bit cryptographic hash functions. [Citation Graph (0, 0)][DBLP]
    First Monday, 2006, v:11, n:1, pp:- [Journal]
  96. Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
    Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
  97. Ed Dawson
    Preface to the special issue on PKI. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:65- [Journal]
  98. Ed Dawson, Kapali Viswanathan, Colin Boyd
    Compliant cryptologic protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:189-202 [Journal]
  99. Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
    The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:86-98 [Journal]
  100. Jovan Dj. Golic, Mahmoud Salmasizadeh, Leone Simpson, Ed Dawson
    Fast Correlation Attacks on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:64, n:1, pp:37-42 [Journal]
  101. Leone Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson
    A Fast Correlation Attack on Multiplexer Generators. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:2, pp:89-93 [Journal]
  102. Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson
    Fast Correlation Attacks on the Summation Generator. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:2, pp:245-262 [Journal]
  103. Bruce Goldburg, S. Sridharan, Ed Dawson
    Design and Cryptanalysis of Transform-Based Analog Speech Scamblers. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:735-744 [Journal]
  104. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Generalized Inversion Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:10, pp:1100-1109 [Journal]
  105. Chuan-Kun Wu, Ed Dawson
    Correlation immunity and resiliency of symmetric Boolean functions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:312, n:2-3, pp:321-335 [Journal]
  106. Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson
    On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:11-28 [Conf]
  107. Mark Burdon, Juan Gonzalez Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane
    Access Control in Federated Databases: How Legal Issues Shape Security. [Citation Graph (0, 0)][DBLP]
    EGOV, 2007, pp:228-239 [Conf]
  108. Quan Pham, Adrian McCullagh, Ed Dawson
    Consistency of User Attribute in Federated Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:165-177 [Conf]
  109. Ed Dawson, Andrew Clark, Mark Looi
    Key management in a non-trusted distributed environment. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:319-329 [Journal]
  110. Kun Peng, Colin Boyd, Ed Dawson
    Batch zero-knowledge proof and verification and its applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]

  111. Jacobi Quartic Curves Revisited. [Citation Graph (, )][DBLP]


  112. A Range Test Secure in the Active Adversary Model. [Citation Graph (, )][DBLP]


  113. Twisted Edwards Curves Revisited. [Citation Graph (, )][DBLP]


  114. Bit-Pattern Based Integral Attack. [Citation Graph (, )][DBLP]


  115. New Formulae for Efficient Elliptic Curve Arithmetic. [Citation Graph (, )][DBLP]


  116. On a Taxonomy of Delegation. [Citation Graph (, )][DBLP]


  117. New Concepts in Evolutionary Search for Boolean Functions in Cryptology. [Citation Graph (, )][DBLP]


  118. On a taxonomy of delegation. [Citation Graph (, )][DBLP]


Search in 0.145secs, Finished in 0.151secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002