QUT ePrints

Browse By Person: Simpson, Leonie

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 40.

Book Chapter

Dawson, Ed, Henricksen, Matthew, & Simpson, Leonie (2008) The Dragon stream cipher: Design, analysis and implementation issues. In Robshaw, M & OBillet, O (Eds.) New Stream Cipher Designs: The eSTREAM Finalists. Springer, Germany, Heidelberg, pp. 20-38.

Dawson, Edward P. & Simpson, Leonie R. (2002) Analysis and Design Issues for Synchronous Stream Ciphers. In Niederreiter, Harald (Ed.) Coding Theory and Cryptology. Singapore University Press World Scientific, Singapore, pp. 49-90.

Dawson, Edward, Golic, Jovan, & Simpson, Leonie (2001) A Survey of Divide and Conquer Atacks on Certain Irregularly Clocked Stream Ciphers. In Cryptography And Computational Number Theory. Birkhauser Verlag, Basel, Switzerland, pp. 165-186.

Journal Article

Bartlett, Harry, ALMashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2013) A general model for MAC generation using direct injection. Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
Number of full-text downloads 51

Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Indirect message injection for MAC generation. Journal of Mathematical Cryptology, 7(3), pp. 253-277.
Number of full-text downloads 5

Chuah, Chai Wen, Dawson, Edward, & Simpson, Leonie (2013) Key derivation function : the SCKDF scheme. IFIP Advances in Information and Communication Technology, 405, pp. 125-138.

Simpson, Leonie & Boztas, Serdar (2012) State cycles, initialization and the Trivium stream cipher. Cryptography and Communications, 4(3-4), pp. 245-258.

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Simpson, Leonie R., & Dawson, Edward (2012) State convergence and keyspace reduction of the mixer stream cipher. Journal of Discrete Mathematical Sciences and Cryptography, 15, pp. 89-104.
Number of full-text downloads 72

Chuah, Chai Wen, Dawson, Edward, Gonzalez Nieto, Juan Manuel, & Simpson, Leonie (2012) A framework for security analysis of key derivation functions. Lecture Notes in Computer Science, 7232, pp. 199-216.
Number of full-text downloads 49

Z'aba, Muhammad Reza, Wong, Kenneth Koon-Ho, Dawson, Edward Pyle, & Simpson, Leonie Ruth (2010) Algebraic analysis of small Scale LEX-BES. International Journal of Cryptology Research, 2(1), pp. 51-62.

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. International Journal of Cryptology Research, 2(1), pp. 27-37.
Number of full-text downloads 121

Chen, Kevin, Henricksen, Matthew P., Millan, William L., Fuller, Joanne, Simpson, Leonie, Dawson, Edward, et al. (2005) Dragon: A Fast Word Based Stream Cipher. Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2004), 3506, pp. 33-50.
Number of full-text downloads 139
Number of citations in Scopus 3

Gustafson, Helen M., Simpson, Leonie R., & Golic, Jovan (2002) Analysis of a measure of correlation between two binary strings of different lengths. Australasian Journal of Combinatorics, 25, pp. 185-199.
Number of full-text downloads 356

Conference Paper

Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2014) Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher. In Winterhof, Arne & Schmidt, Kai-Uwe (Eds.) Lecture Notes in Computer Science, Springer-Verlag, Melbourne, VIC. (In Press)

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
Number of full-text downloads 17

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Number of full-text downloads 39

Sahama, Tony, Simpson, Leonie, & Lane, Bill (2013) Security and privacy in eHealth : is it possible? A sociotechnical analysis. In Rodrigues, Joel Rodrigue (Ed.) 15th International Conference on e-Health Networking, Applications and Services, 9 -12 October 2013, Lisbon, Portugal. (In Press)
Number of full-text downloads 213

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Number of full-text downloads 101

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2012) Slide attacks on the Sfinks stream cipher. In Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
Number of full-text downloads 53

ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Number of full-text downloads 50

Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.

Teo, Sui-Guan, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence and the effectiveness of time-memory-data tradeoffs. In Abraham, Ajith, Zheng, Daniel, Agrawal, Dharma, Abdollah, Mohd Faizal, Corchado, Emilio, Casola, Valentina, et al. (Eds.) Proceedings of the 7th International Conference on Information Assurance and Security, IEEE, Universiti Teknikal Malaysia Melaka , Malacca, Malaysia, pp. 92-97.
Number of full-text downloads 81

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 97
Number of citations in Scopus 1

Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth, Simpson, Leonie, Bartlett, Harry, & Dawson, Edward (2011) Algebraic analysis of the SSS stream cipher. In Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.
Number of full-text downloads 69

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. In Proceedings of International Cryptology Conference 2010, Hotel Equatorial Melaka, Melaka.

Z'aba, Muhammad Reza, Wong, Kenneth, Dawson, Edward, & Simpson, Leonie (2010) Algebraic analysis of small scale LEX-BES. In Proceeding of the 2nd International Cryptology Conference 2010, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia, pp. 77-82.
Number of full-text downloads 147

Z'aba, Muhammad Reza, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2010) Linearity within the SMS4 Block Cipher. In Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer-Verlag, Beijing, China, pp. 248-265.
Number of full-text downloads 172

Teo, Sui-Guan, Al-Mashrafi, Mufeed, Simpson, Leonie R., & Dawson, Edward (2009) Analysis of authenticated encryption stream ciphers. In Proceedings (Abstracts and Papers) of the 20th National Conference of Australian Society for Operations Research, Australian Society for Operations Research Inc, Gold Coast.
Number of full-text downloads 404

Simpson, Leonie R., Henricksen, Matthew, & Yap, Wun-She (2009) Improved cryptanalysis of the Common Scrambling Algorithm Stream Cipher. In Proceedings of the 14th Australasian Conference on Information Security and Privacy, 1-3 July 2009, Brisbane, Australia.
Number of full-text downloads 2,920
Number of citations in Scopus 1

Donovan, Diane, Lefevre, James, & Simpson, Leonie (2008) A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers. In Balakrishnan, R & Veni Madhavan, C (Eds.) Proceedings of the International Conference on Discrete Mathematics, 2006, 15-18 December, 2006, Bangalore, India.

Al-Hinai, Sultan Z., Dawson, Edward P., Henricksen, Matt, & Simpson, Leonie R. (2007) On the security of the LILI family of stream ciphers against algebraic attacks. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 218
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Henricksen, Matthew & Simpson, Leonie (2006) Improved Cryptanalysis of MAG. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Web of Science® 1

Chen, Kevin, Simpson, Leonie R., Henricksen, Matthew, & Millan, William L. (2004) A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. In Lim, Jong In & Lee, Dong Hoon (Eds.) Information Security and Cryptology - ICISC 2003. Sixth International Conference ., November, Seoul, Korea.

Chen, Kevin, Millan, William, & Simpson, Leonie (2004) Perspectives on Word Based Stream Ciphers. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Clark, Andrew J., Fuller, Joanne E., Golic, Jovan Dj, Dawson, Edward P., Lee, Hoon-Jae, Millan, William L., et al. (2002) The LILI-II Keystream Generator. In 7th Australian Conference on Information Security and Privacy, 3-5 July 2002, Melbourne, Victoria.
Number of full-text downloads 376
Number of citations in Web of Science® 16

Simpson, Leonie R., Dawson, Edward P., Golic, Jovan D.J., & Millan, William L. (2001) LILI Keystream Generator. In Selected Areas of Cryptography, 7th Annual International Workshop, SAC 2000, 14-15 August 2000, Ontario, Canada.
Number of full-text downloads 160

Conference Item

Gajanayake, Randike, Sahama, Tony R., Simpson, Leonie, & Lane, William B. (2014) 1st International Workshop on Secure and Privacy-Aware Information Management in eHealth. In 16th International Conference on E-health Networking, Application & Services, 15-18 October 2014, Natal, Brazil. (Unpublished)
Number of full-text downloads 11

QUT Thesis

Simpson, Leonie Ruth (2000) Divide and conquer attacks on shift register based stream ciphers. PhD thesis, Queensland University of Technology.

Working Paper

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 140

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 51

This list was generated on Sat Nov 22 07:01:30 2014 EST.