QUT ePrints

Browse By Person: Millan, William

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 21.

Journal Article

Chen, Kevin, Henricksen, Matthew P., Millan, William L., Fuller, Joanne, Simpson, Leonie, Dawson, Edward, et al. (2005) Dragon: A Fast Word Based Stream Cipher. Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2004), 3506, pp. 33-50.
Number of full-text downloads 136
Number of citations in Scopus 3

Fuller, Joanne, Millan, William, & Dawson, Edward (2005) Multi-objective optimisation of bijective s-boxes. New Generation Computing: computing paradigms and computational intelligence, 23(3), pp. 201-218.
Number of citations in Scopus 3

Gauravaram, Praveen & Millan, William (2004) Cryptanalysis of the Cellular Authentication and Voice Encryption Algorithm. Institute of Electronics, Information and Communication Engineers (IEICE) Electronics Express, 1(15), pp. 453-459.

Burnett, Linda, Clark, Andrew, Dawson, Edward, & Millan, William (2004) Simpler Methods for Generating Better Boolean Functions with Good Cryptographic Properties. The Australasian Journal of Combinatorics, 29, pp. 231-247.
Number of citations in Scopus 3

Conference Paper

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Millan, William (2005) New Cryptographic Applications of Boolean Function Equivalence Classes. In Boyd, C & Neito, J (Eds.) Information Security and Privacy - 10th Australasian Conference, ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Gauravaram, Praveen, May, Lauren, & Millan, William (2004) CRUSH: A New Cryptographic Hash Function Using Iterated Halving Technique. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Chen, Kevin, Simpson, Leonie R., Henricksen, Matthew, & Millan, William L. (2004) A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. In Lim, Jong In & Lee, Dong Hoon (Eds.) Information Security and Cryptology - ICISC 2003. Sixth International Conference ., November, Seoul, Korea.

Gauravaram, Praveen S. & Millan, William L. (2004) Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). In International Workshop on Cryptographic Algorithms and their Uses, July, 2004, Gold Coast, Australia.
Number of full-text downloads 634

Dawson, Edward, Fuller, Joanne, & Millan, William (2004) Multi-Objective Optimisation of Bijective S-Boxes. In Greenwood, G (Ed.) Proceedings of the 2004 Congress on Evolutionary Computation (CEC2004), 19-23 June 2004, Portland, United States.
Number of citations in Scopus 4

Chen, Kevin, Millan, William, & Simpson, Leonie (2004) Perspectives on Word Based Stream Ciphers. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Dawson, Edward, Fuller, Joanne, & Millan, William (2003) Evolutionary Generation of Bent Functions for Cryptography. In Abbass, H & Verma, B (Eds.) 2003 Congress on Evolutionary Computation - CEC 2003 Proceedings Vol.3, 8-12 December, 2003, Canberra, Australian Capital Territory.
Number of citations in Scopus 2

Fuller, Joanne & Millan, William (2003) Linear Redundancy in S-Boxes. In Johansson, T (Ed.) Fast Software Encryption - FSE 2003, February 2003, Lund, Sweden.
Number of citations in Scopus 16
Number of citations in Web of Science® 17

Dawson, Edward, Fuller, Joanne, & Millan, William (2003) New Concepts on Evolutionary Search for Boolean Functions in Cryptology. In Abbass, H & Verma, B (Eds.) 2003 Congress on Evolutionary Computation - CEC 2003, Proceedings Volume 3, 8-12 December, 2003, Canberra, Australian Capital Territory.

Dawson, Edward, Fuller, Joanne, & Millan, William (2002) Efficient Algorithms for Analysis of Cryptographic Boolean Functions. In Billington,, Donovan,, & Khodkar, (Eds.) 13th Australasian Workshop on Combinatorial Algorithms (AWOCA 2002), 7-10 July, 2002, Fraser Island, Queensland.

Clark, John, Jacob, Jeremy, Millan, William, Naitra, Subhamoy, & Stepney, Susan (2002) Evolving Boolean Functions Satisfying Multiple Criteria. In Menzez, & Sarkar, (Eds.) Progress in Cryptology - INDOCRYPT 2002, 16-18 December, 2002, Hyderabad, India.
Number of citations in Web of Science® 24

Clark, Andrew J., Fuller, Joanne E., Golic, Jovan Dj, Dawson, Edward P., Lee, Hoon-Jae, Millan, William L., et al. (2002) The LILI-II Keystream Generator. In 7th Australian Conference on Information Security and Privacy, 3-5 July 2002, Melbourne, Victoria.
Number of full-text downloads 369
Number of citations in Web of Science® 16

Carter, Gary, Dawson, Edward, Henricksen, Matthew, May, Lauren, & Millan, William (2002) Strengthening the Key Schedule of the AES. In Batten, & Seberry, (Eds.) Information Security and Privacy (ACISP 02), 3-5 July, 2002, Melbourne.
Number of citations in Web of Science® 6

Burnett, Linda, Carter, Gary, Dawson, Edward, & Millan, William (2001) Efficient Methods for Generating MARS-Like S-Boxes. In New York, U (Ed.) Fast Software Encryption, 10-12 April 2000.

Simpson, Leonie R., Dawson, Edward P., Golic, Jovan D.J., & Millan, William L. (2001) LILI Keystream Generator. In Selected Areas of Cryptography, 7th Annual International Workshop, SAC 2000, 14-15 August 2000, Ontario, Canada.
Number of full-text downloads 160

QUT Thesis

Millan, William L (1997) Analysis and design of Boolean functions for cryptographic applications. PhD thesis, Queensland University of Technology.

This list was generated on Sat Oct 18 12:29:26 2014 EST.