The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

William Millan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
    The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:25-39 [Conf]
  2. Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
    Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:407-420 [Conf]
  3. Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson
    Strengthening the Key Schedule of the AES. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:226-240 [Conf]
  4. William Millan
    New Cryptographic Applications of Boolean Function Equivalence Classes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:572-583 [Conf]
  5. William Millan
    How to Improve the Nonlinearity of Bijective S-Boxes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:181-192 [Conf]
  6. William Millan, Andrew Clark, Ed Dawson
    Boolean Function Design Using Hill Climbing Methods. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:1-11 [Conf]
  7. William Millan, Ed Dawson
    On the Security of Self-Synchronous Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:159-170 [Conf]
  8. Kevin Chen, William Millan, Leonie Ruth Simpson
    Perspectives on Word Based Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:14-27 [Conf]
  9. Praveen Gauravaram, William Millan
    Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:1-13 [Conf]
  10. Praveen Gauravaram, William Millan, Lauren May
    CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:28-39 [Conf]
  11. William Millan
    Low Order Approximation of Cipher Functions. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:144-155 [Conf]
  12. William Millan, Andrew Clark, Ed Dawson
    Heuristic Design of Cryptographically Strong Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:489-499 [Conf]
  13. Joanne Fuller, William Millan
    Linear Redundancy in S-Boxes. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:74-86 [Conf]
  14. L. Burnett, Gary Carter, Ed Dawson, William Millan
    Efficient Methods for Generating MARS-Like S-Boxes. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:300-314 [Conf]
  15. William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson
    Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:263-274 [Conf]
  16. William Millan, Andrew Clark, Ed Dawson
    An effective genetic algorithm for finding highly nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:149-158 [Conf]
  17. Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
    Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:33-50 [Conf]
  18. Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson
    A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:418-431 [Conf]
  19. William Millan
    Cryptanalysis of the alleged CAVE algorithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:107-119 [Conf]
  20. John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan
    Evolving Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:246-259 [Conf]
  21. Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan
    LILI Keystream Generator. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:248-261 [Conf]
  22. David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
    Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
  23. William Millan, Praveen Gauravaram
    Cryptanalysis of the cellular authentication and voice encryption algorithm. [Citation Graph (0, 0)][DBLP]
    IEICE Electronic Express, 2004, v:1, n:15, pp:453-459 [Journal]

  24. New Concepts in Evolutionary Search for Boolean Functions in Cryptology. [Citation Graph (, )][DBLP]


Search in 0.069secs, Finished in 0.070secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002