Browse By Person: Bartlett, Harry
![]() | Up a level |
Group by: Date | Item Type
Number of items: 44.
2019
Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2019)
Fault analysis of AEZ.
Concurrency and Computation: Practice and Experience, 31(23), Article number: e4785 1-11.
24
1
24
1
Wong, Kenneth, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed
(2019)
Differential random fault attacks on certain CAESAR stream ciphers. In
International Conference on Information Security and Cryptology, 2019-01-01. (In Press)
13
13
Bartlett, Harry, Dawson, Ed, Qahur Al Mahri, Hassan Musallam Ahmed, Salam, Md. Iftekhar, Simpson, Leonie, & Wong, Kenneth
(2019)
Random fault attacks on a class of stream ciphers.
Security and Communication Networks, 2019, Article number: 1680263 1-12.
40
1
40
1
2018
Salam, Md Iftekhar, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2018)
Fault attacks on the authenticated encryption stream cipher MORUS.
Cryptography, 2(1), Article number: 4 1-19.
38
38
Salam, Md Iftekhar, Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2018)
Fault attacks on Tiaoxin-346.
In
Abramson, D & Ngoc Dinh, M (Eds.) Proceedings of the Australasian Computer Science Week Multiconference (ACSW '18).
Association for Computing Machinery, United States of America, pp. 1-9.
2
2
Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2018)
A fundamental flaw in the ++AE authenticated encryption mode.
Journal of Mathematical Cryptology, 12(1), pp. 37-42.
32
32
Beck, Leyla, Mohamed, Abdi-Aziz, Strugnell, Wendy, Bartlett, Harry, Rodriguez, Viviana, Hamilton-Craig, Christian, et al.
(2018)
MRI measurements of the thoracic aorta and pulmonary artery.
Journal of Medical Imaging and Radiation Oncology, 62(1), pp. 64-71.
3
2
3
2
Chu Van, Thuy, Ristovski, Zoran, Pourkhesalian, Ali Mohammad, Rainey, Thomas, Garaniya, Vikram, Abbassi, Rouzbeh, et al.
(2018)
On-board measurements of particle and gaseous emissions from a large cargo vessel at different operating conditions.
Environmental Pollution, 237, pp. 832-841.
23
15
23
15
2017
Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2017)
Fault attacks on XEX mode with application to certain authenticated encryption modes.
In
Suriadi, S & Pieprzyk, J (Eds.) Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Proceedings, Part I (Lecture Notes in Computer Science, Volume 10342).
Springer, Switzerland, pp. 285-305.
52
52
Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2017)
A fault-based attack on AEZ v4.2.
In
Mu, Y, Nanda, P, & Xiang, Y (Eds.) Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS.
IEEE, United States of America, pp. 634-641.
50
1
50
1
Salam, Md Iftekhar, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, & Wong, Kenneth
(2017)
Investigating cube attacks on the authenticated encryption stream cipher MORUS.
In
Mu, Y, Nanda, P, & Xiang, Y (Eds.) Proceedings of the Joint IEEE TrustCom / BigDataSE / ICESS Conference 2017.
IEEE, United States of America, pp. 961-966.
91
5
2
91
5
2
Bellet, R. Nicole, Lamb, Rhonda, Gould, Tonya, & Bartlett, Harry
(2017)
Prevalence of neuro-musculoskeletal pain and dysfunction in open-heart surgical patients preoperatively and at 6 and 12 weeks postoperatively: a prospective longitudinal observation study.
Journal of Pragmatic and Observational Research, 2017, Article number: 8 211-222.
45
45
2016
Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al.
(2016)
Fast-track equivalent to traditional cardiac rehabilitation? Pilot study outcome.
European Journal of Physiotherapy, 18(2), pp. 126-136.
76
1
1
76
1
1
Salam, Md Iftekhar, Wong, Kenneth, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Pieprzyk, Josef
(2016)
Finding state collisions in the authenticated encryption stream cipher ACORN.
In
Yi, X & Russello, G (Eds.) Proceedings of the Australasian Computer Science Week Multiconference.
Association for Computing Machinery, United States of America, pp. 1-10.
Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2016)
Forgery attacks on ++AE authenticated encryption mode.
In
Yi, X & Russello, G (Eds.) Proceedings of the Australasian Computer Science Week Multiconference.
Association for Computing Machinery, United States of America, pp. 1-9.
97
1
97
1
Salam, Md Iftekhar, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, Simpson, Leonie, & Wong, Kenneth
(2016)
Investigating cube attacks on the authenticated encryption stream cipher ACORN.
In
Li, G & Batten, L (Eds.) Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Proceedings [Communications in Computer and Information Science, Volume 651].
Springer Nature Singapore, Singapore, pp. 15-26.
77
17
13
77
17
13
Qahur Al Mahri, Hassan Musallam Ahmed, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2016)
Tweaking generic OTR to avoid forgery attacks.
In
Li, G & Batten, L (Eds.) Applications and Techniques in Information Security: 6th International Conference, ATIS 2016 Proceedings [Communications in Computer and Information Science, Volume 651].
Springer Nature Singapore Pte Ltd., Singapore, pp. 41-53.
58
1
58
1
2015
Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, & Bartlett, Harry
(2015)
CHURNs: Freshness assurance for humans.
Computer Journal, 58(10), pp. 2404-2425.
80
1
1
80
1
1
Di, Allen, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth
(2015)
Correcting flaws in Mitchell's analysis of EPBC.
In
Yi, X & Welch, I (Eds.) Proceedings of the 13th Australasian Information Security Conference (AISC 2015) [Conferences in Research and Practice in Information Technology (CRPIT), Volume161].
Australian Computer Society Inc., Australia, pp. 57-60.
44
44
Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth
(2015)
Flaws in the initialisation process of stream ciphers.
In
Daras, N J & Rassias, M T (Eds.) Computation, cryptography, and network security.
Springer, Switzerland, pp. 19-49.
1
1
2014
Teo, Sui Guan, Wong, Kenneth, Bartlett, Harry, Simpson, Leonie, & Dawson, Ed
(2014)
Algebraic analysis of Trivium-like ciphers.
In
Welch, I & Parampalli, U (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149].
Australian Computer Society Inc., Australia, pp. 77-81.
59
59
Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth
(2014)
Weak key-IV pairs in the A5/1 stream cipher.
In
Welch, I & Parampalli, U (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149].
Australian Computer Society Inc., Australia, pp. 23-36.
159
159
Bartlett, Harry, Al Hamdan, Ali, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth
(2014)
Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher.
In
Schmidt, K U & Winterhof, A (Eds.) Sequences and Their Applications - SETA 2014: th International Conference, Proceedings [Lecture Notes in Computer Science, Volume 8865].
Springer, Switzerland, pp. 220-233.
1
1
2013
Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward
(2013)
Algebraic analysis of Trivium-like ciphers.
[Working Paper]
(Unpublished)
219
219
Teo, Sui-Guan, Bartlett, Harry, Alhamdan, Ali, Simpson, Leonie, Wong, Kenneth Koon-Ho, & Dawson, Edward
(2013)
State convergence in bit-based stream ciphers.
[Working Paper]
(Submitted (not yet accepted for publication))
73
73
Bartlett, Harry, Al Mashrafi, Mufeed, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth
(2013)
A general model for MAC generation using direct injection.
In
Yung, M & Kutylowski, M (Eds.) Information Security and Cryptology: 8th International Conference, Inscrypt 2012 [Lecture Notes in Computer Science, Vol 7763].
Springer, Germany, pp. 198-215.
175
1
175
1
Al Mashrafi, Mufeed, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth
(2013)
Indirect message injection for MAC generation.
Journal of Mathematical Cryptology, 7(3), pp. 253-277.
84
84
Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Steinfeld, Ron, & Bartlett, Harry
(2013)
Security analysis of linearly filtered NLFSRs.
Journal of Mathematical Cryptology, 7(4), pp. 313-332.
48
48
Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth
(2013)
Slid pairs in the initialisation of the A5/1 stream cipher.
In
Thomborson, C & Parampalli, U (Eds.) Proceedings of the Eleventh Australasian Information Security Conference, AISC 2013 [Conferences in Research and Practice in Information Technology, Volume 138].
Australian Computer Society, Australia, pp. 3-12.
228
2
228
2
Kelly, Mark, Gibson, Abby, Bartlett, Harry, Rowling, Dianne, & Patten, John
(2013)
Tenofovir-associated proteinuria [Letter].
AIDS, 27(3), pp. 479-481.
56
12
9
56
12
9
Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al.
(2013)
Timed Up and Go Tests in cardiac rehabilitation: reliability and comparison with the 6-Minute Walk Test.
Journal of Cardiopulmonary Rehabilitation and Prevention, 33(2), pp. 99-105.
12
11
12
11
2012
Al Mashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth
(2012)
Analysis of indirect message injection for MAC generation using stream ciphers.
In
Mu, Y, Susilo, W, & Seberry, J (Eds.) Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372].
Springer, Germany, pp. 138-151.
129
4
129
4
Hansen, Kim, Thom, Ogilvie, Rodda, Hamish, Price, Melanie, Jackson, Chris, Bennetts, Scott, et al.
(2012)
Impact of pain location, organ system and treating speciality on timely delivery of analgesia in emergency departments.
EMA - Emergency Medicine Australasia, 24(1), pp. 64-71.
3
4
3
4
Haerer, Wendy, Delbaere, Kim, Bartlett, Harry, Lord, Stephen, & Rowland, Jeffrey
(2012)
Relationships between HMG-CoA reductase inhibitors (statin) use and strength, balance and falls in older people.
Internal Medicine Journal, 42(12), pp. 1329-1334.
22
19
22
19
Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth
(2012)
Slide attacks on the Sfinks stream cipher.
In
Wysocki, B J & Wysocki, T A (Eds.) Proceedings of the 6th International Conference on Signal Processing and Communication Systems.
IEEE, United States, pp. 1-10.
278
1
278
1
Al Hamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth
(2012)
State convergence in the initialisation of the Sfinks stream cipher.
In
Pieprzyk, J & Thomborson, C (Eds.) Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference (AISC 2012): Conferences in Research and Practice in Information Technology, Volume 125.
Australian Computer Society, Australia, pp. 27-32.
2011
Al Mashrafi, Mufeed, Wong, Kenneth, Simpson, Leonie, Bartlett, Harry, & Dawson, Ed
(2011)
Algebraic analysis of the SSS stream cipher.
In
Babenko, L, Pieprzyk, J, Chefranov, A, & Shankaran, R (Eds.) Proceedings of the 4th International Conference on Security of Information and Networks.
Association for Computing Machinery, United States, pp. 199-204.
143
143
Lewis, Peter, Bartlett, Harry, Townsend, Shane, Courtney, Mary, Mullany, Daniel, & Coyer, Fiona
(2011)
A prospective pilot study evaluating the 'cardiac decompensation score' in the setting of intraaortic balloon counterpulsation.
Intensive and Critical Care Nursing, 27(1), pp. 31-36.
127
1
127
1
Bellet, R. Nicole, Francis, Rebecca, Jacob, Justin, Healy, Karen, Bartlett, Harry, Adams, Lewis, et al.
(2011)
Repeated six-minute walk tests for outcome measurement and exercise prescription in outpatient cardiac rehabilitation: A longitudinal study.
Archives of Physical Medicine and Rehabilitation, 92(9), pp. 1388-1394.
19
16
19
16
Teo, Sui Guan, Al Hamdan, Ali, Bartlett, Harry, Simpson, Leonie, Wong, Kenneth, & Dawson, Ed
(2011)
State convergence in the initialisation of stream ciphers.
In
Hawkes, P & Parampalli, U (Eds.) Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Proceedings [Lecture Notes in Computer Science, Vol 6812].
Springer, Germany, pp. 75-88.
170
3
170
3
2010
Strugnell, Wendy, Hamilton-Craig, Christian, Parry, Temeeka, Bartlett, Harry, & Slaughter, Richard
(2010)
Cardiac MRI is Superior to Gated Blood Pool Imaging in the Assessment of Left Function in Patients Post-cardiac Transplantation.
Heart, Lung and Circulation, 19(7), pp. 400-405.
1
1
1
1
Fukushima, Satsuki, Tesar, Peter, Jalali, Homayoun, Clarke, Andrew, Sharma, Hemant, Choudhary, Jivesh, et al.
(2010)
Determinants of in-hospital and long-term surgical outcomes after repair of postinfarction ventricular septal rupture.
Journal of Thoracic and Cardiovascular Surgery, 140(1), pp. 59-65.
23
23
23
23
2005
Strugnell, Wendy, Slaughter, Richard, Riley, Robyn, Trotter, Andrew, & Bartlett, Harold
(2005)
Modified RV Short Axis Series - A New Method for Cardiac MRI Measurement of Right Ventricular Volumes.
Journal of Cardiovascular Magnetic Resonance, 7(5), pp. 769-774.
35
35
1998
Bartlett, Harold John Gregory
(1998)
Reliability analysis with suspended items.
PhD
thesis,
Queensland University of Technology.
442
442
