|
Search the dblp DataBase
William Millan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:25-39 [Conf]
- Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:407-420 [Conf]
- Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson
Strengthening the Key Schedule of the AES. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:226-240 [Conf]
- William Millan
New Cryptographic Applications of Boolean Function Equivalence Classes. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:572-583 [Conf]
- William Millan
How to Improve the Nonlinearity of Bijective S-Boxes. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:181-192 [Conf]
- William Millan, Andrew Clark, Ed Dawson
Boolean Function Design Using Hill Climbing Methods. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:1-11 [Conf]
- William Millan, Ed Dawson
On the Security of Self-Synchronous Ciphers. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:159-170 [Conf]
- Kevin Chen, William Millan, Leonie Ruth Simpson
Perspectives on Word Based Stream Ciphers. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:14-27 [Conf]
- Praveen Gauravaram, William Millan
Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:1-13 [Conf]
- Praveen Gauravaram, William Millan, Lauren May
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:28-39 [Conf]
- William Millan
Low Order Approximation of Cipher Functions. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:144-155 [Conf]
- William Millan, Andrew Clark, Ed Dawson
Heuristic Design of Cryptographically Strong Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:489-499 [Conf]
- Joanne Fuller, William Millan
Linear Redundancy in S-Boxes. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:74-86 [Conf]
- L. Burnett, Gary Carter, Ed Dawson, William Millan
Efficient Methods for Generating MARS-Like S-Boxes. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:300-314 [Conf]
- William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:263-274 [Conf]
- William Millan, Andrew Clark, Ed Dawson
An effective genetic algorithm for finding highly nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:149-158 [Conf]
- Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:33-50 [Conf]
- Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:418-431 [Conf]
- William Millan
Cryptanalysis of the alleged CAVE algorithm. [Citation Graph (0, 0)][DBLP] ICISC, 1998, pp:107-119 [Conf]
- John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan
Evolving Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:246-259 [Conf]
- Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan
LILI Keystream Generator. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:248-261 [Conf]
- David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
- William Millan, Praveen Gauravaram
Cryptanalysis of the cellular authentication and voice encryption algorithm. [Citation Graph (0, 0)][DBLP] IEICE Electronic Express, 2004, v:1, n:15, pp:453-459 [Journal]
New Concepts in Evolutionary Search for Boolean Functions in Cryptology. [Citation Graph (, )][DBLP]
Search in 0.007secs, Finished in 0.009secs
|