2009 |
124 | EE | Baoyuan Kang,
Colin Boyd,
Ed Dawson:
A novel identity-based strong designated verifier signature scheme.
Journal of Systems and Software 82(2): 270-273 (2009) |
2008 |
123 | EE | Hüseyin Hisil,
Kenneth Koon-Ho Wong,
Gary Carter,
Ed Dawson:
Twisted Edwards Curves Revisited.
ASIACRYPT 2008: 326-343 |
122 | EE | Muhammad Reza Z'aba,
Håvard Raddum,
Matthew Henricksen,
Ed Dawson:
Bit-Pattern Based Integral Attack.
FSE 2008: 363-381 |
121 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
2007 |
120 | | Ed Dawson,
Duncan S. Wong:
Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings
Springer 2007 |
119 | | Josef Pieprzyk,
Hossein Ghodosi,
Ed Dawson:
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Springer 2007 |
118 | EE | Sultan Al-Hinai,
Ed Dawson,
Matthew Henricksen,
Leonie Ruth Simpson:
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.
ACISP 2007: 11-28 |
117 | EE | Kun Peng,
Ed Dawson:
A Range Test Secure in the Active Adversary Model.
ACSW Frontiers 2007: 159-162 |
116 | EE | Mark Burdon,
Juan Manuel González Nieto,
Sharon Christensen,
Ed Dawson,
W. D. Duncan,
Bill Lane:
Access Control in Federated Databases: How Legal Issues Shape Security.
EGOV 2007: 228-239 |
115 | EE | Hüseyin Hisil,
Gary Carter,
Ed Dawson:
New Formulae for Efficient Elliptic Curve Arithmetic.
INDOCRYPT 2007: 138-151 |
114 | EE | Kun Peng,
Ed Dawson:
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction.
ISPEC 2007: 209-224 |
113 | EE | Quan Pham,
Adrian McCullagh,
Ed Dawson:
Consistency of User Attribute in Federated Systems.
TrustBus 2007: 165-177 |
112 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Batch zero-knowledge proof and verification and its applications.
ACM Trans. Inf. Syst. Secur. 10(2): (2007) |
2006 |
111 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Eiji Okamoto:
A Novel Range Test.
ACISP 2006: 247-258 |
110 | EE | Praveen Gauravaram,
William Millan,
Ed Dawson,
Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction.
ACISP 2006: 407-420 |
109 | EE | Matthew Henricksen,
Ed Dawson:
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond.
ACISP 2006: 52-63 |
108 | EE | Robert Dawson,
Colin Boyd,
Ed Dawson,
Juan Manuel González Nieto:
SKMA: a key management architecture for SCADA systems.
ACSW Frontiers 2006: 183-192 |
107 | EE | Kun Peng,
Juan Manuel González Nieto,
Yvo Desmedt,
Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.
ICISC 2006: 296-309 |
106 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Sealed-Bid Micro Auctions.
SEC 2006: 246-257 |
105 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Batch verification of validity of bids in homomorphic e-auction.
Computer Communications 29(15): 2798-2805 (2006) |
104 | EE | Praveen Gauravaram,
Adrian McCullagh,
Ed Dawson:
The legal and practical implications of recent attacks on 128-bit cryptographic hash functions.
First Monday 11(1): (2006) |
2005 |
103 | | Ed Dawson,
Serge Vaudenay:
Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings
Springer 2005 |
102 | EE | Ming Yao,
Kun Peng,
Ed Dawson:
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents.
ACISP 2005: 158-169 |
101 | EE | Kun Peng,
Ed Dawson,
Juanma González Nieto,
Eiji Okamoto,
Javier Lopez:
A Novel Method to Maintain Privacy in Mobile Agent Applications.
CANS 2005: 247-260 |
100 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.
CRYPTO 2005: 188-204 |
99 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem.
ICICS 2005: 84-96 |
98 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.
ISC 2005: 374-388 |
97 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.
Mycrypt 2005: 84-98 |
96 | EE | Matthew Henricksen,
Ed Dawson:
Rekeying Issues in the MUGI Stream Cipher.
Selected Areas in Cryptography 2005: 175-188 |
95 | | Riza Aditya,
Byoungcheon Lee,
Colin Boyd,
Ed Dawson:
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption.
Comput. Syst. Sci. Eng. 20(6): (2005) |
94 | EE | Juan Manuel González Nieto,
Colin Boyd,
Ed Dawson:
A Public Key Cryptosystem Based On A Subgroup Membership Problem.
Des. Codes Cryptography 36(3): 301-316 (2005) |
93 | EE | Joanne Fuller,
William Millan,
Ed Dawson:
Multi-objective Optimisation of Bijective S-Boxes.
New Generation Comput. 23(3): (2005) |
2004 |
92 | | Ed Dawson,
Wolfgang Klemm:
Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings
Queensland University of Technology 2004 |
91 | EE | Ming Yao,
Matthew Henricksen,
Greg Maitland,
Ernest Foo,
Ed Dawson:
A Mobile Agent System Providing Offer Privacy.
ACISP 2004: 301-312 |
90 | EE | Riza Aditya,
Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
ACNS 2004: 494-508 |
89 | EE | Byoungcheon Lee,
Colin Boyd,
Ed Dawson,
Kwangjo Kim,
Jeongmo Yang,
Seungjae Yoo:
Secure Key Issuing in ID-based Cryptography.
ACSW Frontiers 2004: 69-74 |
88 | | Yousef Bani Hammad,
Gary Carter,
Ed Dawson,
Yvonne Hitchcock:
Improvements to the RAK Factoring Algorithm.
Cryptographic Algorithms and their Uses 2004: 152- |
87 | | Kun Peng,
Riza Aditya,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Cryptographic Algorithms and their Uses 2004: 57-71 |
86 | | Jaimee Brown,
Ed Dawson,
Juan Manuel González Nieto:
Implementation of the GBD Cryptosystem.
Cryptographic Algorithms and their Uses 2004: 94-109 |
85 | EE | Ming Yao,
Kun Peng,
Matthew Henricksen,
Ernest Foo,
Ed Dawson:
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
EC-Web 2004: 164-173 |
84 | EE | Kevin Chen,
Matthew Henricksen,
William Millan,
Joanne Fuller,
Leonie Ruth Simpson,
Ed Dawson,
Hoon Jae Lee,
Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher.
ICISC 2004: 33-50 |
83 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
An Efficient and Verifiable Solution to the Millionaire Problem.
ICISC 2004: 51-66 |
82 | EE | Kun Peng,
Riza Aditya,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Multiplicative Homomorphic E-Voting.
INDOCRYPT 2004: 61-72 |
81 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapalee Viswanathan:
A Correct, Private, and Efficient Mix Network.
Public Key Cryptography 2004: 439-454 |
80 | EE | Ming Yao,
Matthew Henricksen,
Ernest Foo,
Ed Dawson:
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures.
TrustBus 2004: 132-141 |
79 | EE | Riza Aditya,
Byoungcheon Lee,
Colin Boyd,
Ed Dawson:
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness.
TrustBus 2004: 152-161 |
78 | EE | Ed Dawson:
Preface to the special issue on PKI.
Int. J. Inf. Sec. 2(2): 65 (2004) |
77 | EE | Yvonne Hitchcock,
Paul Montague,
Gary Carter,
Ed Dawson:
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.
Int. J. Inf. Sec. 3(2): 86-98 (2004) |
76 | EE | Chuan-Kun Wu,
Ed Dawson:
Correlation immunity and resiliency of symmetric Boolean functions.
Theor. Comput. Sci. 312(2-3): 321-335 (2004) |
2003 |
75 | EE | Yvonne Hitchcock,
Paul Montague,
Gary Carter,
Ed Dawson:
The Security of Fixed versus Random Elliptic Curves in Cryptography.
ACISP 2003: 55-66 |
74 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Five Sealed-bid Auction Models.
ACSW Frontiers 2003: 77-86 |
73 | EE | Juan Manuel González Nieto,
Ed Dawson,
Eiji Okamoto:
Privacy and Trusted Computing.
DEXA Workshops 2003: 383-388 |
72 | EE | Riza Aditya,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Secure e-Voting for Preferential Elections.
EGOV 2003: 246-249 |
71 | EE | Byoungcheon Lee,
Colin Boyd,
Ed Dawson,
Kwangjo Kim,
Jeongmo Yang,
Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
ICISC 2003: 245-258 |
70 | EE | Kevin Chen,
Leonie Ruth Simpson,
Matthew Henricksen,
William Millan,
Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher.
ICISC 2003: 418-431 |
69 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapalee Viswanathan:
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.
WISA 2003: 244-256 |
68 | EE | Ming Yao,
Ernest Foo,
Kun Peng,
Ed Dawson:
An Improved Forward Integrity Protocol for Mobile Agents.
WISA 2003: 272-285 |
67 | EE | Selwyn Russell,
Ed Dawson,
Eiji Okamoto,
Javier Lopez:
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Computer Communications 26(16): 1826-1838 (2003) |
2002 |
66 | EE | Lauren May,
Matthew Henricksen,
William Millan,
Gary Carter,
Ed Dawson:
Strengthening the Key Schedule of the AES.
ACISP 2002: 226-240 |
65 | EE | Andrew Clark,
Ed Dawson,
Joanne Fuller,
Jovan Dj. Golic,
Hoon Jae Lee,
William Millan,
Sang-Jae Moon,
Leone Simpson:
The LILI-II Keystream Generator.
ACISP 2002: 25-39 |
64 | EE | Marie Henderson,
Robert S. Coulter,
Ed Dawson,
Eiji Okamoto:
Modelling Trust Structures for Public Key Infrastructures.
ACISP 2002: 56-70 |
63 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
ICICS 2002: 147-159 |
62 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Non-interactive Auction Schemewith Strong Privacy.
ICISC 2002: 407-420 |
61 | EE | Ed Dawson,
Javier Lopez,
José A. Montenegro,
Eiji Okamoto:
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
ISC 2002: 136-149 |
60 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Hybrid Key Escrow: A New Paradigm.
Computers & Security 21(1): 77-92 (2002) |
59 | EE | Juan Manuel González Nieto,
Kapali Viswanathan,
Colin Boyd,
Andrew Clark,
Ed Dawson:
Key recovery for the commercial environment.
Int. J. Inf. Sec. 1(3): 161-174 (2002) |
58 | EE | Ed Dawson,
Kapali Viswanathan,
Colin Boyd:
Compliant cryptologic protocols.
Int. J. Inf. Sec. 1(3): 189-202 (2002) |
2001 |
57 | EE | DongGook Park,
JungJoon Kim,
Colin Boyd,
Ed Dawson:
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.
ACISP 2001: 334-343 |
56 | EE | Juan Manuel González Nieto,
Colin Boyd,
Ed Dawson:
A Public Key Cryptosystem Based on the Subgroup Membership Problem.
ICICS 2001: 352-363 |
55 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
An Analysis of Integrity Services in Protocols.
INDOCRYPT 2001: 175-187 |
2000 |
54 | | Ed Dawson,
Andrew Clark,
Colin Boyd:
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings
Springer 2000 |
53 | | Juanma González Nieto,
Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Key Recovery System for the Commercial Environment.
ACISP 2000: 149-162 |
52 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
A Three Phased Schema for Sealed Bid Auction System Design.
ACISP 2000: 412-426 |
51 | EE | L. Burnett,
Gary Carter,
Ed Dawson,
William Millan:
Efficient Methods for Generating MARS-Like S-Boxes.
FSE 2000: 300-314 |
50 | EE | DongGook Park,
Colin Boyd,
Ed Dawson:
Micropayments for Wireless Communications.
ICISC 2000: 192-205 |
49 | EE | Greg Maitland,
Jason Reid,
Ernest Foo,
Colin Boyd,
Ed Dawson:
Linkability in Practical Electronic Cash Design.
ISW 2000: 149-163 |
48 | EE | DongGook Park,
Colin Boyd,
Ed Dawson:
Classification of Authentication Protocols: A Practical Approach.
ISW 2000: 194-208 |
47 | | Juanma González Nieto,
DongGook Park,
Colin Boyd,
Ed Dawson:
Key Recovery in Third Generation Wireless Communication Systems.
Public Key Cryptography 2000: 223-237 |
46 | EE | Leonie Ruth Simpson,
Ed Dawson,
Jovan Dj. Golic,
William Millan:
LILI Keystream Generator.
Selected Areas in Cryptography 2000: 248-261 |
45 | EE | Ed Dawson,
Andrew Clark,
Mark Looi:
Key management in a non-trusted distributed environment.
Future Generation Comp. Syst. 16(4): 319-329 (2000) |
44 | EE | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Generalized Inversion Attack on Nonlinear Filter Generators.
IEEE Trans. Computers 49(10): 1100-1109 (2000) |
43 | EE | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Ed Dawson:
Fast Correlation Attacks on the Summation Generator.
J. Cryptology 13(2): 245-262 (2000) |
1999 |
42 | EE | William Millan,
Andrew Clark,
Ed Dawson:
Boolean Function Design Using Hill Climbing Methods.
ACISP 1999: 1-11 |
41 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Publicly Verifiable Key Escrow with Limited Time Span.
ACISP 1999: 36-50 |
40 | EE | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Inversion Attack and Branching.
ACISP 1999: 88-102 |
39 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Signature Scheme for Controlled Environments.
ICICS 1999: 119-134 |
38 | | William Millan,
L. Burnett,
Gary Carter,
Andrew Clark,
Ed Dawson:
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.
ICICS 1999: 263-274 |
37 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Secure Selection Protocols.
ICISC 1999: 132-146 |
36 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Strong Binding for Software Key Escrow.
ICPP Workshops 1999: 134-139 |
35 | | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Inversion Attack and Branching.
Australian Computer Journal 31(2): 44-53 (1999) |
34 | EE | William J. Caelli,
Ed Dawson,
Scott A. Rea:
PKI, elliptic curve cryptography, and digital signatures.
Computers & Security 18(1): 47-66 (1999) |
33 | EE | Leone Simpson,
Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Ed Dawson:
A Fast Correlation Attack on Multiplexer Generators.
Inf. Process. Lett. 70(2): 89-93 (1999) |
1998 |
32 | | Colin Boyd,
Ed Dawson:
Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings
Springer 1998 |
31 | EE | Leone Simpson,
Jovan Dj. Golic,
Ed Dawson:
A Probabilistic Correlation Attack on the Shrinking Generator.
ACISP 1998: 147-158 |
30 | EE | Gary Carter,
Ed Dawson,
Lauren Nielsen:
Key Schedules of Iterative Block Ciphers.
ACISP 1998: 80-89 |
29 | EE | William Millan,
Andrew Clark,
Ed Dawson:
Heuristic Design of Cryptographically Strong Balanced Boolean Functions.
EUROCRYPT 1998: 489-499 |
28 | | Gary Gaskell,
Mark Looi,
Ed Dawson,
Colin Boyd,
Selwyn Russell:
A security architecture for third generation wireless systems.
ICISC 1998: 15-32 |
27 | EE | David Wagner,
Leone Simpson,
Ed Dawson,
John Kelsey,
William Millan,
Bruce Schneier:
Cryptanalysis of ORYX.
Selected Areas in Cryptography 1998: 296-305 |
26 | EE | Ed Dawson,
Helen Gustafson:
A Method for Measuring Entropy of Symmetric Cipher Key Generators.
Computers & Security 17(2): 177-184 (1998) |
25 | | He Jingmin,
Ed Dawson:
Shared Secret Reconstruction.
Des. Codes Cryptography 14(3): 221-237 (1998) |
1997 |
24 | | William Millan,
Ed Dawson:
On the Security of Self-Synchronous Ciphers.
ACISP 1997: 159-170 |
23 | | Jen Lim,
Colin Boyd,
Ed Dawson:
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes.
ACISP 1997: 216-227 |
22 | | M. Salmasidazeh,
Leone Simpson,
Jovan Dj. Golic,
Ed Dawson:
Fast Correlation Attacks and Multiple Linear Approximations.
ACISP 1997: 228-239 |
21 | | William Millan,
Andrew Clark,
Ed Dawson:
An effective genetic algorithm for finding highly nonlinear Boolean Functions.
ICICS 1997: 149-158 |
20 | | Ed Dawson,
Chuan-Kun Wu:
Construction of correlation immune Boolean functions.
ICICS 1997: 170-180 |
19 | | Ernest Foo,
Colin Boyd,
William J. Caelli,
Ed Dawson:
A taxonomy of electronic cash schemes.
SEC 1997: 337-348 |
18 | EE | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Leone Simpson,
Ed Dawson:
Fast Correlation Attacks on Nonlinear Filter Generators.
Inf. Process. Lett. 64(1): 37-42 (1997) |
1996 |
17 | | Chuan-Kun Wu,
Ed Dawson:
On construction of resilient functions.
ACISP 1996: 79-86 |
16 | | Ed Dawson,
He Jingmin:
Another approach to software key escrow encryption.
ACISP 1996: 87-95 |
15 | | Andrew Clark,
Jovan Dj. Golic,
Ed Dawson:
A Comparison of Fast Correlation Attacks.
FSE 1996: 145-157 |
14 | | He Jingmin,
Ed Dawson:
On the reconstruction of shared secrets.
SEC 1996: 209-218 |
1995 |
13 | | Ed Dawson,
Jovan Dj. Golic:
Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings
Springer 1995 |
12 | | He Jingmin,
Ed Dawson:
A New Key Escrow Cryptosystem.
Cryptography: Policy and Algorithms 1995: 105-114 |
11 | | He Jingmin,
Ed Dawson:
How to Fairly Reconstruct a Shared Secret.
Cryptography: Policy and Algorithms 1995: 115-124 |
10 | | Helen Gustafson,
Ed Dawson,
Jovan Dj. Golic:
Randomness Measures Related to Subset Occurrence.
Cryptography: Policy and Algorithms 1995: 132-143 |
9 | | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Andrew Clark,
Abdollah Khodkar,
Ed Dawson:
Discrete Optimisation and Fast Correlation Attacks.
Cryptography: Policy and Algorithms 1995: 186-200 |
1993 |
8 | | Ed Dawson,
Diane Donovan:
Shamir's Scheme Says It all.
SEC 1993: 91-102 |
7 | | Bruce Goldburg,
S. Sridharan,
Ed Dawson:
Design and Cryptanalysis of Transform-Based Analog Speech Scamblers.
IEEE Journal on Selected Areas in Communications 11(5): 735-744 (1993) |
1992 |
6 | | Ed Dawson:
Cryptanalysis of Summation Generator.
AUSCRYPT 1992: 209-215 |
5 | | Helen Gustafson,
Ed Dawson,
Lauren Nielsen,
William J. Caelli:
Measuring the Strength of Ciphers.
SEC 1992: 235-247 |
1991 |
4 | | Bruce Goldburg,
Ed Dawson,
S. Sridharan:
A Secure Analog Speech Scrambler Using the Discrete Cosine Transform.
ASIACRYPT 1991: 299-311 |
3 | EE | Bruce Goldburg,
Ed Dawson,
S. Sridharan:
The Automated Cryptoanalysis of Analog Speech Scramblers.
EUROCRYPT 1991: 422-430 |
1990 |
2 | | Helen Gustafson,
Ed Dawson,
William J. Caelli:
Comparison of Block Ciphers.
AUSCRYPT 1990: 208-220 |
1 | | Ed Dawson,
Bruce Goldburg:
Universal Logic Sequences.
AUSCRYPT 1990: 426-432 |