Browse By Person: Bartlett, Harry
![]() | Up a level |
Group by: Item Type | Date
Number of items: 43.
Book Chapter
Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho
(2015)
Flaws in the initialisation process of stream ciphers.
In
Daras, Nicholas & Rassias, Michael (Eds.) Computation, Cryptography, and Network Security.
Springer International Publishing, Cham, Switzerland, pp. 19-49.
1
1
Journal Article
Bartlett, Harry, Dawson, Ed, Quhar al Mahri, Hassan, Salam, Md Iftekhar, Simpson, Leonie, & Wong, Kenneth Koon-Ho
(2019)
Random fault attacks on a class of stream ciphers.
Security and Communication Networks, 2019, Article ID-1680263.
9
9
Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward P., & Wong, Kenneth Koon-Ho
(2018)
Fault analysis of AEZ.
Concurrency and Computation: Practice and Experience.
(In Press)
3
1
1
3
1
1
Salam, Iftekhar, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho
(2018)
Fault attacks on the authenticated encryption stream cipher MORUS.
Cryptography, 2(1).
15
15
Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho
(2018)
A fundamental flaw in the ++AE authenticated encryption mode.
Journal of Mathematical Cryptology, 12(1), pp. 1-6.
14
14
Chu Van, Thuy, Ristovski, Zoran, Pourkhesalian, Ali Mohammad, Rainey, Thomas, Garaniya, Vikram, Abbassi, Rouzbeh, et al.
(2017)
On-board measurements of particle and gaseous emissions from a large cargo vessel at different operating conditions.
Environmental Pollution, 237, pp. 832-841.
15
10
15
10
Bellet, R. Nicole, Lamb, Rhonda L., Gould, Tonya D., & Bartlett, Harry J.
(2017)
Prevalence of neuro-musculoskeletal pain and dysfunction in open-heart surgical patients preoperatively and at 6 and 12 weeks postoperatively: A prospective longitudinal observation study.
Pragmatic and Observational Research, 8, pp. 211-222.
7
7
Beck, Leyla, Mohamed, Abdi-Aziz, Strugnell, Wendy E., Bartlett, Harry, Rodriguez, Viviana, Hamilton-Craig, Christian, et al.
(2017)
MRI measurements of the thoracic aorta and pulmonary artery.
Journal of Medical Imaging and Radiation Oncology, 62(1), pp. 64-71.
1
1
1
1
Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Bartlett, Harry
(2015)
CHURNs : freshness assurance for humans.
The Computer Journal, 58(10), pp. 2404-2425.
52
1
1
52
1
1
Bartlett, Harry, Al Mashrafi, Mufeed, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho
(2013)
A general model for MAC generation using direct injection.
Lecture Notes in Computer Science [Information Security and Cryptology: 8th International Conference, Inscrypt 2012], 7763, pp. 198-215.
148
1
148
1
Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho
(2013)
Indirect message injection for MAC generation.
Journal of Mathematical Cryptology, 7(3), pp. 253-277.
54
54
Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Steinfeld, Ron, & Bartlett, Harry
(2013)
Security analysis of linearly filtered NLFSRs.
Journal of Mathematical Cryptology, 7(4), pp. 313-332.
21
1
21
1
Bellet, R. Nicole, Francis, Rebecca L, Jacob, Justin S, Healy, Karen M, Bartlett, Harold John Gregory, Adams, Lewis, et al.
(2013)
Timed Up and Go Tests in cardiac rehabilitation : reliability and comparison with the 6-minute walk test.
Journal of Cardiopulmonary Rehabilitation & Prevention, 33(2), pp. 99-105.
10
10
10
10
Kelly, Mark D., Gibson, Abby, Bartlett, Harry, Rowling, Diane, & Patten, John
(2013)
Tenofovir-associated proteinuria.
AIDS, 27(3), pp. 479-481.
44
12
9
44
12
9
Hansen, Kim, Thom, Ogilvie, Rodda, Hamish, Price, Melanie, Jackson, Chris, Bennetts, Scott, et al.
(2012)
Impact of pain location, organ system and treating speciality on timely delivery of analgesia in emergency departments.
EMA - Emergency Medicine Australasia, 24(1), pp. 64-71.
3
4
3
4
Lewis, Peter A., Bartlett, Harry, Townsend, Shane, Courtney, Mary D., Mullany, Daniel V., & Coyer, Fiona M.
(2011)
A prospective pilot study evaluating the ‘cardiac decompensation score’ in the setting of intraaortic balloon counterpulsation.
Intensive and Critical Care Nursing, 27(1), pp. 31-36.
104
1
104
1
Haerer, Wendy, Delbaere, Kim, Bartlett, Harry, Lord, Stephen, & Rowland, Jeffrey
(2011)
Relationships between HMG-CoA reductase inhibitors (statin) use and strength, balance and falls in older people.
Internal Medicine Journal, Online(Online), pp. 1-17.
21
19
21
19
Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al.
(2011)
Repeated six-minute walk tests for outcome measurement and exercise prescription in outpatient cardiac rehabilitation: A longitudinal study.
Archives of Physical Medicine and Rehabilitation, 92(9), pp. 1388-1394.
17
16
17
16
Strugnell, Wendy, Hamilton-Craig, Christian, Parry, Temeeka, Bartlett, Harry, & Slaughter, Richard
(2010)
Cardiac MRI is Superior to Gated Blood Pool Imaging in the Assessment of Left Function in Patients Post-cardiac Transplantation.
Heart, Lung and Circulation, 19(7), pp. 400-405.
1
1
1
1
Fukushima, Satsuki, Tesar, Peter, Jalali, Homayoun, Clarke, Andrew, Sharma, Hemant, Choudhary, Jivesh, et al.
(2010)
Determinants of in-hospital and long-term surgical outcomes after repair of postinfarction ventricular septal rupture.
The Journal of Thoracic and Cardiovascular Surgery, 140(1), pp. 59-65.
22
23
22
23
Bartlett, Harold, Riley, Robyn, Slaughter, Richard, Strugnell, Wendy, & Trotter, Andrew
(2005)
Modified RV Short Axis Series - A New Method for Cardiac MRI Measurement of Right Ventricular Volumes.
Journal of Cardiovascular Magnetic Resonance, 7(5), pp. 769-774.
42
35
42
35
Conference Paper
Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed
(2019)
Differential random fault attacks on certain CAESAR stream ciphers. In
22nd Annual International Conference on Information Security and Cryptology (ICISC 2019), 4-6 December 2019, Seoul, Republic of Korea. (In Press)
3
3
Salam, Iftekhar, Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho
(2018)
Fault attacks on Tiaoxin-346. In
2018 Australasian Computer Science Week (ASCW), 30 January - 2 February 2018, Brisbane, Qld.
2
2
Salam, Md Iftekhar, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, & Wong, Kenneth Koon-Ho
(2017)
Investigating cube attacks on the authenticated encryption stream cipher MORUS. In
2017 IEEE Trustcom/BigDataSE/ICESS, 1-4 August 2017, Sydney, N.S.W.
55
3
1
55
3
1
Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward, & Wong, Kenneth Koon-Ho
(2017)
A fault-based attack on AEZ v4.2. In
IEEE Trustcom/BigDataSE/ICESS 2017, 1-4 August 2017, Sydney, N.S.W.
28
1
28
1
Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho
(2017)
Fault attacks on XEX mode with application to certain authenticated encryption modes. In
Pieprzyk, Josef & Suriadi, Suriadi (Eds.)
Information Security and Privacy, Springer International Publishing AG, Auckland, New Zealand, pp. 285-305.
20
20
Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward P., & Wong, Kenneth Koon-Ho
(2016)
Tweaking generic OTR to avoid forgery attacks. In
Batten, L. & Li, G. (Eds.)
Applications and Techniques in Information Security. ATIS 2016. Communications in Computer and Information Science, Springer, Cairns, Qld, pp. 41-53.
29
1
29
1
Salam, Md Iftekhar, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, Simpson, Leonie, & Wong, Kenneth Koon-Ho
(2016)
Investigating cube attacks on the authenticated encryption stream cipher ACORN. In
International Conference on Applications and Techniques in Information Security (ATIS 2016), 26-28 October 2016, Cairns, Qld.
43
14
12
43
14
12
Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward, & Kenneth Koon-Ho, Wong
(2016)
Forgery attacks on ++AE authenticated encryption mode. In
ACSW '16 Proceedings of the Australasian Computer Science Week Multiconference, ACM, Canberra, A.C.T.
66
1
66
1
Salam, Md Iftekhar, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Pieprzyk, Josef
(2016)
Finding state collisions in the authenticated encryption stream cipher ACORN. In
ACSW '16 Australasian Computer Science Week, 2 - 5 February 2016, Canberra, A.C.T.
2
2
Di, Binbin, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho
(2015)
Correcting flaws in Mitchell’s analysis of EPBC. In
Welch, Ian & Yi, Xun (Eds.)
Proceedings of the 13th Australasian Information Security Conference, Conferences in Research and Practice in Information Technology (CRPIT), Sydney, NSW, pp. 57-60.
44
44
Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho
(2014)
Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher. In
Winterhof, Arne & Schmidt, Kai-Uwe (Eds.)
Lecture Notes in Computer Science, Springer-Verlag, Melbourne, VIC, pp. 220-233.
1
1
Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed
(2014)
Algebraic analysis of Trivium-like ciphers. In
Parampali, Udaya & Welch, Ian (Eds.)
Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Auckland, New Zealand, pp. 77-81.
57
4
57
4
Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho
(2014)
Weak key-IV pairs in the A5/1 stream cipher. In
Parampalli, Udaya & Welch, Ian (Eds.)
Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.
159
159
Alhamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho
(2013)
Slid pairs in the initialisation of the A5/1 stream cipher. In
Thomborson, Clark & Parampalli, Udaya (Eds.)
Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
221
2
221
2
Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho
(2012)
Slide attacks on the Sfinks stream cipher. In
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
241
1
241
1
ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho
(2012)
Analysis of indirect message injection for MAC generation using stream ciphers. In
Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.)
Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
105
4
105
4
Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho
(2012)
State convergence in the initialisation of the Sfinks stream cipher. In
Pieprzyk, Josef & Thomborson, Clark (Eds.)
Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.
2
2
Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward
(2011)
State convergence in the initialisation of stream ciphers. In
Parampalli, Udaya & Hawkes, Philip (Eds.)
Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
139
3
139
3
Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth, Simpson, Leonie, Bartlett, Harry, & Dawson, Edward
(2011)
Algebraic analysis of the SSS stream cipher. In
Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.
114
114
QUT Thesis
Bartlett, Harold John Gregory
(1998)
Reliability analysis with suspended items.
PhD
thesis,
Queensland University of Technology.
401
401
Working Paper
Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward
(2013)
Algebraic analysis of Trivium-like ciphers.
[Working Paper]
(Unpublished)
218
218
Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward
(2013)
State convergence in bit-based stream ciphers.
[Working Paper]
(Submitted (not yet accepted for publication))
73
73
