QUT ePrints

Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Encryption (080402)"

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Authors/Creators | Item Type
Jump to: A | B | C | D | G | H | I | L | M | P | R | S | T | W | Z
Number of items at this level: 80.

A

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2005) Two Models of Efficient Mixnet-Based Receipt-Free Voting Using (Threshold) Re-encryption. International Journal of Computer Systems Science & Engineering, 20(6), pp. 463-472.

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
Number of full-text downloads 28

Al Hinai, Sultan, Batten, Lynn, Colbert, Bernard, & Wong, Kenneth (2006) Algebraic Attacks on Clock-Controlled Cascade Ciphers. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.
Number of citations in Web of Science® 4

Al Hinai, Sultan, Batten, Lynn, Colbert, Bernard, & Wong, Kenneth (2006) Algebraic Attacks on Clock-Controlled Stream Ciphers. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 8
Number of citations in Web of Science® 11

Al-Hinai, Sultan Z., Dawson, Edward P., Henricksen, Matt, & Simpson, Leonie R. (2007) On the security of the LILI family of stream ciphers against algebraic attacks. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 209
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Alzomai, Mohammed & Josang, Audun (2010) The mobile phone as a multi OTP device using trusted computing. In Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Crown Conference Centre, Melbourne, Victoria, pp. 75-82.
Number of full-text downloads 236
Number of citations in Scopus 4

Annadurai, Suganya, Gauravaram, Praveen, & Hirose, Shoichi (2008) An update on the analysis and design of NMAC and HMAC functions. International Journal of Network Security, 7(1), pp. 49-60.

B

Babbage, Steve, Cid, Carlos, Pramstaller, Norbert, & Raddum, Havard (2007) An Analysis of the Hermes8 Stream Ciphers. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 62

Bao, Feng, Dawson, Ed, & Peng, Kun (2008) Correct, private, flexible and efficient range test. Journal of Research and Practice in Information Technology, 40(4), pp. 267-281.
Number of full-text downloads 25
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Bartlett, Harry, ALMashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2013) A general model for MAC generation using direct injection. Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
Number of full-text downloads 46

Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2014) Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher. In Winterhof, Arne & Schmidt, Kai-Uwe (Eds.) Lecture Notes in Computer Science, Springer-Verlag, Melbourne, VIC. (In Press)

Birkett, James & Stebila, Douglas (2010) Predicate-based key exchange. In Hawkes, Philip & Steinfeld, Ron (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 181
Number of citations in Scopus 8
Number of citations in Web of Science® 5

Boyd, Colin (2008) Applications of elliptic curve pairings in cryptography. In Dorfer, G, Eigenthaler, G, & Kautschitsch, H (Eds.) Contributions to General Algebra 18, 1-4 February 2007, Klagenfurt, Austria.
Number of full-text downloads 126

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. In Pointcheval, D, Mu, Y, & Chen, K (Eds.) Cryptology and Network Security (LNCS 4301), 8-10 December 2006, China, Jiangsu, Suzhou.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2009) Efficient one-round key exchange in the efficient one-round key exchange in the standard model. International Journal of Applied Cryptography, 1, pp. 181-199.
Number of full-text downloads 107
Number of citations in Scopus 19

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2008) Efficient one-round key exchange in the standard model. In Information Security and Privacy : 13th Australasian Conference (ACISP 2008), 7-9 July 2008, Wollongong, NSW.
Number of full-text downloads 42
Number of citations in Scopus 33
Number of citations in Web of Science® 22

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science- Information security, 3650, pp. 374-388.
Number of full-text downloads 112
Number of citations in Scopus 7
Number of citations in Web of Science® 5

Boyd, Colin & Gonzalez Nieto, Juan M. (2011) On forward secrecy in one-round key exchange. In Lecture Notes in Computer Science: Cryptography and Coding, Springer Berlin / Heidelberg, Oxford, UK, pp. 451-468.
Number of full-text downloads 172
Number of citations in Scopus 4

Broadbent, Anne, Gutoski, Gus, & Stebila, Douglas (2013) Quantum one-time programs. Lecture Notes in Computer Science [Advances in Cryptology - CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II], 8043, pp. 344-360.
Number of citations in Scopus 3

Brown, Jaimee, Dawson, Edward P., & Gonzalez Nieto, Juan M. (2004) Implementation of the GBD cryptosystem. In Cryptographic Algorithms and their Uses, 5-6 July 2004, Gold Coast, 5-6 July 2004.
Number of full-text downloads 249

C

Camtepe, Seyit A. & Yener, Bulent (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), pp. 346-358.
Number of citations in Scopus 89
Number of citations in Web of Science® 40

Carter, Gary, Dawson, Edward, & Wong, Kenneth (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Eigenthaler, G, Goldstern, M, Muller, W, & Winkler, R (Eds.) Contributions to General Algebra 17, 26 - 29 May 2005, Austria, Vienna.

Chen, Brenden C. & Chandran, Vinod (2007) Biometric Based Cryptographic Key Generation from Faces. In Digital Image Computing: Techniques and Applications (DICTA), 3rd - 5th December, Adelaide, Australia.
Number of full-text downloads 736
Number of citations in Scopus 17

Cliff, Yvonne, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) How to extract and expand randomness : a summary and explanation of existing results. In Applied Cryptography and Network Security, 2-5 June 2009, Place de l'Etoile , Paris.
Number of full-text downloads 170

Costello, Craig & Stebila, Douglas (2010) Fixed argument pairings. In Abdalla, Michel & Barreto, Paulo S.L.M. (Eds.) Progress in Cryptology -- LATINCRYPT 2010, Springer, Puebla, Mexico, pp. 92-108.
Number of full-text downloads 51
Number of citations in Scopus 2
Number of citations in Web of Science® 1

D

Dawson, Ed, Henricksen, Matthew, Raddum, Havard, & Z'Aba, Muhammad (2008) Bit-pattern based integral attack. Fast Software Encryption (LNCS), 5086, pp. 363-381.
Number of citations in Scopus 14
Number of citations in Web of Science® 14

Dawson, Ed, Henricksen, Matthew, & Simpson, Leonie (2008) The Dragon stream cipher: Design, analysis and implementation issues. In Robshaw, M & OBillet, O (Eds.) New Stream Cipher Designs: The eSTREAM Finalists. Springer, Germany, Heidelberg, pp. 20-38.

Dawson, Edward & Henricksen, Matthew (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 60

Dawson, Edward & Henricksen, Matthew (2006) Rekeying Issues in the MUGI Stream Cipher. In Preneel, P & Tavares, S (Eds.) Selected Areas in Cryptography (LNCS 3897), 11 - 12 August 2005, Canada, Ontario, Kingston.
Number of full-text downloads 89
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Dawson, Edward P., Clark, Andrew J., & Looi, Mark H. (2000) Key management in a non-trusted distributed environment. Future Generation Computer Systems, 16(4), pp. 319-329.
Number of full-text downloads 183
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Donovan, Diane, Lefevre, James, & Simpson, Leonie (2008) A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers. In Balakrishnan, R & Veni Madhavan, C (Eds.) Proceedings of the International Conference on Discrete Mathematics, 2006, 15-18 December, 2006, Bangalore, India.

G

Gauravaram, Praveen & Kelsey, John (2008) Linear -XOR and additive checksums don't protect Damgard-Merkle hashes from generic attacks. In Malkin, Tal (Ed.) Topics in Cryptology - CT-RSA 2008, 8-11 April 2008, United States of America, San Francisco,.
Number of citations in Scopus 10
Number of citations in Web of Science® 11

Gauravaram, Praveen S. & Millan, William L. (2004) Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). In International Workshop on Cryptographic Algorithms and their Uses, July, 2004, Gold Coast, Australia.
Number of full-text downloads 614

Giesen, Florian, Kohlar, Florian, & Stebila, Douglas (2013) On the security of TLS renegotiation. In Gligor, V. & Yung, M. (Eds.) Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), ACM, Berlin Congress Centre, Berlin. (In Press)
Number of full-text downloads 68

Goldberg, Ian, Ustaoglu, Berkant, & Stebila, Douglas (2012) Anonymity and one-way authentication in key exchange protocols. Designs, Codes and Cryptography, 67(2), pp. 245-269.
Number of full-text downloads 130
Number of citations in Scopus 5

Golic, Jovan Dj, Clark, Andrew J., & Dawson, Edward P. (2000) Generalized inversion attack on nonlinear filter generators. IEEE Transactions on Computers, 49(10), pp. 1100-1109.
Number of full-text downloads 177
Number of citations in Scopus 18
Number of citations in Web of Science® 13

Gonzalez Nieto, Juan, Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2013) Publicly verifiable ciphertexts. Journal of Computer Security, 21(5), pp. 749-778.
Number of full-text downloads 42

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2010) Generic one round group key exchange in the standard model. In Lee, Donghoon & Hong, Seokhie (Eds.) Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korean Institute of Information Security and Cryptology, Korea, pp. 1-15.
Number of full-text downloads 618
Number of citations in Scopus 5

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In Public Key Cryptography 2009, March 18-20, 2009, Irvine, CA, USA.
Number of citations in Scopus 10

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Strong designated verifier signature in a multi-user setting. In Seventh Australasian Information Security Conference (AISC 2009), Jan 20-23, 2009, Wellington, New Zealand.
Number of full-text downloads 89

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Universally composable contributory group key exchange. In Asian ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 10 - 12 March 2009, Sydney.
Number of citations in Scopus 6

Gorantla, M. Choudary, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Attribute-based authenticated key exchange. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 325
Number of citations in Scopus 7
Number of citations in Web of Science® 4

H

Helleseth, Tor & Molland (Visiting Scholar), Hoverd (2005) A Linear Weakness in the Klimov-Shamir T-function. In Grant, A & Kennedy, R (Eds.) Proceedings of the 2005 IEEE International Symposium on Information Theory (ISIT 05), 4 September - 9 September 2005, Australia, South Australia, Adelaide.

Henricksen, Matthew & Simpson, Leonie (2006) Improved Cryptanalysis of MAG. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Web of Science® 1

Hisil, Huseyin, Carter, Gary P., & Dawson, Edward P. (2007) New Formulae for Efficient Elliptic Curve Arithmetic. Progress in Cryptology – INDOCRYPT 2007 (LNCS), 4859, pp. 138-151.
Number of full-text downloads 577
Number of citations in Scopus 18
Number of citations in Web of Science® 11

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2011) An exploration of affine group laws for elliptic curves. Journal of Mathematical Cryptology, 5(1), pp. 1-50.

I

Igoe, Kevin & Stebila, Douglas (2011) X.509v3 Certificates for Secure Shell authentication. Internet Engineering Task Force.
Number of full-text downloads 170

L

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Efficient certificateless KEM in the standard model. In Hong, Seokhie & Lee, Donghoon (Eds.) Lecture Notes in Computer Science : Information, Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korea University, Seoul, pp. 34-46.
Number of full-text downloads 158
Number of citations in Scopus 1

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) Strongly Secure Certificateless Key Agreement. Lecture Notes in Computer Science (LNCS), 5671, pp. 206-230.
Number of full-text downloads 430
Number of citations in Scopus 16
Number of citations in Web of Science® 14

Lippold, Georg & Gonzalez Nieto, Juan Manuel (2010) Certificateless key agreement in the standard model. In Boyd, Colin & Susilo, Willy (Eds.) Proceedings of the 8th Australasian Information Security Conference (AISC 2010), ACS, Queensland University of Technology, Brisbane, Queensland, pp. 75-85.
Number of full-text downloads 252

M

Mosca, Michele & Stebila, Douglas (2010) Quantum coins. In Bruen, Aiden A. & Wehlau, David L. (Eds.) Contemporary Mathematics, American Mathematical Society, Toronto, Ontario, pp. 35-47.
Number of full-text downloads 142
Number of citations in Web of Science® 4

Muhlbauer, Adam, Salim, Farzad, Safavi-Naini, Reihaneh, Sheppard, Nicholas P., & Surminen, Martin (2008) Location constraints in digital rights management. Computer Communications, 31(6), pp. 1173-1180.
Number of full-text downloads 107
Number of citations in Scopus 9
Number of citations in Web of Science® 1

P

Paterson, Kenneth G. & Stebila, Douglas (2010) One-time-password-authenticated key exchange. In Steinfeld, Ron & Hawkes, Philip (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 436
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Peng, Kun, Boyd, Colin, & Dawson, Edward (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 14
Number of citations in Web of Science® 6

Peng, Kun & Dawson, Edward P. (2007) Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. In Dawson, Edward P. & Wong, Duncan S. (Eds.) Third International Conference, ISPEC 2007: Information Security Practice and Experience, May 7-9, 2007, Hong Kong, China.
Number of full-text downloads 71
Number of citations in Scopus 9
Number of citations in Web of Science® 8

Poettering, Bertram & Stebila, Douglas (2014) Double-authentication-preventing signatures. In Kutyłowski, Mirosław & Vaidya, Jaideep (Eds.) Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS 2014), Part 1, Springer, Wroclaw, Poland, pp. 436-453. (In Press)
Number of full-text downloads 18

R

Raddum, Havard & Semaev, Igor (2008) Solving MRHS linear equations. Designs, Codes and Cryptography, 49(1-3), pp. 147-160.

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 114

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 205
Number of citations in Scopus 5

Reid, Jason F., Gonzalez Nieto, Juan M., Tang, Tee, & Senadji, Bouchra (2007) Detecting relay attacks with timing-based protocols. In Bao, Feng & Miller , Steven (Eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), Singapore, pp. 204-213.
Number of full-text downloads 167
Number of citations in Scopus 54

S

Simpson, Leonie & Boztas, Serdar (2012) State cycles, initialization and the Trivium stream cipher. Cryptography and Communications, 4(3-4), pp. 245-258.

Simpson, Leonie R., Henricksen, Matthew, & Yap, Wun-She (2009) Improved cryptanalysis of the Common Scrambling Algorithm Stream Cipher. In Proceedings of the 14th Australasian Conference on Information Security and Privacy, 1-3 July 2009, Brisbane, Australia.
Number of full-text downloads 2,807
Number of citations in Scopus 1

South, Leah & Stebila, Douglas (2013) Count-min sketches for estimating password frequency within Hamming distance two. Lecture Notes in Computer Science [Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 Proceedings], 7959, pp. 388-402.

Stebila, Douglas (2010) Reinforcing bad behaviour : the misuse of security indicators on popular websites. In Proceedings of the 22nd Australasian Conference on Computer-Human Interaction (OZCHI 2010), ACM, Queensland University of Technology, Brisbane, pp. 248-251.
Number of full-text downloads 250

Stebila, Douglas & Green, Jon (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force.
Number of full-text downloads 90

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 223
Number of citations in Scopus 7
Number of citations in Web of Science® 1

Stebila, Douglas, Mosca, Michele, & Lutkenhaus, Norbert (2009) The case for quantum key distribution. In Sergienko , A, Villoresi , P, & Pascazio , S (Eds.) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Springer, Vico Equense, Italy, pp. 283-296.
Number of full-text downloads 122
Number of citations in Scopus 4

Stebila, Douglas, Udupi, Poornaprajna, & Chang, Sheueling (2010) Multi-factor password-authenticated key exchange. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology, Australian Computer Society, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 159

Steketee, Chris, Brown, Jaimee, Gonzalez Nieto, Juan M., & Montague, Paul (2005) GBD threshold cryptography with an application to RSA key recovery. Lecture Notes in Computer Science, 3574, pp. 394-405.
Number of full-text downloads 215

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2009) Using re-encryption to escrow private information escrow bound to multiple conditions. (Submitted (not yet accepted for publication))
Number of full-text downloads 64

T

Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward (2013) State convergence in bit-based stream ciphers. [Working Paper] (Submitted (not yet accepted for publication))
Number of full-text downloads 42

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed (2014) Algebraic analysis of Trivium-like ciphers. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
Number of full-text downloads 16

Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished)
Number of full-text downloads 125

W

Wong, Kenneth Koon-Ho & Bard, Gregory V. (2010) Improved algebraic cryptanalysis of QUAD, Bivium and Trivium via graph partitioning on equation systems. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney, pp. 19-36.
Number of full-text downloads 352

Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2010) An analysis of the RC4 family of stream ciphers against algebraic attacks. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology CRPIT, Australian Computer Society, Brisbane, Australia, pp. 67-74.
Number of full-text downloads 330

Z

Z'aba, Muhammad Reza, Raddum, Havard, Simpson, Leonie, Dawson, Ed, Henricksen, Matt, & Wong, Kenneth (2009) Algebraic Analysis of LEX. In Brankovic, Ljiljana & Susilo, Willy (Eds.) Australasian Information Security Conference (AISC2009), 20-23 January 2009, Wellington, New Zealand.
Number of full-text downloads 127

Z'aba, Muhammad Reza, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2010) Linearity within the SMS4 Block Cipher. In Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer-Verlag, Beijing, China, pp. 248-265.
Number of full-text downloads 167

Z'aba, Muhammad Reza, Wong, Kenneth, Dawson, Edward, & Simpson, Leonie (2010) Algebraic analysis of small scale LEX-BES. In Proceeding of the 2nd International Cryptology Conference 2010, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia, pp. 77-82.
Number of full-text downloads 133

Z'aba, Muhammad Reza, Wong, Kenneth Koon-Ho, Dawson, Edward Pyle, & Simpson, Leonie Ruth (2010) Algebraic analysis of small Scale LEX-BES. International Journal of Cryptology Research, 2(1), pp. 51-62.

This list was generated on Sat Aug 30 09:23:44 2014 EST.