dblp.uni-trier.dewww.uni-trier.de

Ed Dawson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
124EEBaoyuan Kang, Colin Boyd, Ed Dawson: A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software 82(2): 270-273 (2009)
2008
123EEHüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson: Twisted Edwards Curves Revisited. ASIACRYPT 2008: 326-343
122EEMuhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson: Bit-Pattern Based Integral Attack. FSE 2008: 363-381
121 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
2007
120 Ed Dawson, Duncan S. Wong: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings Springer 2007
119 Josef Pieprzyk, Hossein Ghodosi, Ed Dawson: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Springer 2007
118EESultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson: On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. ACISP 2007: 11-28
117EEKun Peng, Ed Dawson: A Range Test Secure in the Active Adversary Model. ACSW Frontiers 2007: 159-162
116EEMark Burdon, Juan Manuel González Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane: Access Control in Federated Databases: How Legal Issues Shape Security. EGOV 2007: 228-239
115EEHüseyin Hisil, Gary Carter, Ed Dawson: New Formulae for Efficient Elliptic Curve Arithmetic. INDOCRYPT 2007: 138-151
114EEKun Peng, Ed Dawson: Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. ISPEC 2007: 209-224
113EEQuan Pham, Adrian McCullagh, Ed Dawson: Consistency of User Attribute in Federated Systems. TrustBus 2007: 165-177
112EEKun Peng, Colin Boyd, Ed Dawson: Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): (2007)
2006
111EEKun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto: A Novel Range Test. ACISP 2006: 247-258
110EEPraveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan: Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ACISP 2006: 407-420
109EEMatthew Henricksen, Ed Dawson: Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. ACISP 2006: 52-63
108EERobert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto: SKMA: a key management architecture for SCADA systems. ACSW Frontiers 2006: 183-192
107EEKun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson: Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309
106EEKun Peng, Colin Boyd, Ed Dawson: Sealed-Bid Micro Auctions. SEC 2006: 246-257
105EEKun Peng, Colin Boyd, Ed Dawson: Batch verification of validity of bids in homomorphic e-auction. Computer Communications 29(15): 2798-2805 (2006)
104EEPraveen Gauravaram, Adrian McCullagh, Ed Dawson: The legal and practical implications of recent attacks on 128-bit cryptographic hash functions. First Monday 11(1): (2006)
2005
103 Ed Dawson, Serge Vaudenay: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings Springer 2005
102EEMing Yao, Kun Peng, Ed Dawson: Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. ACISP 2005: 158-169
101EEKun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260
100EEKun Peng, Colin Boyd, Ed Dawson: Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204
99EEKun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96
98EEKun Peng, Colin Boyd, Ed Dawson: A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388
97EEKun Peng, Colin Boyd, Ed Dawson: Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98
96EEMatthew Henricksen, Ed Dawson: Rekeying Issues in the MUGI Stream Cipher. Selected Areas in Cryptography 2005: 175-188
95 Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson: Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. Comput. Syst. Sci. Eng. 20(6): (2005)
94EEJuan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptography 36(3): 301-316 (2005)
93EEJoanne Fuller, William Millan, Ed Dawson: Multi-objective Optimisation of Bijective S-Boxes. New Generation Comput. 23(3): (2005)
2004
92 Ed Dawson, Wolfgang Klemm: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings Queensland University of Technology 2004
91EEMing Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson: A Mobile Agent System Providing Offer Privacy. ACISP 2004: 301-312
90EERiza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508
89EEByoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Secure Key Issuing in ID-based Cryptography. ACSW Frontiers 2004: 69-74
88 Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock: Improvements to the RAK Factoring Algorithm. Cryptographic Algorithms and their Uses 2004: 152-
87 Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71
86 Jaimee Brown, Ed Dawson, Juan Manuel González Nieto: Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109
85EEMing Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson: Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173
84EEKevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon: Dragon: A Fast Word Based Stream Cipher. ICISC 2004: 33-50
83EEKun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66
82EEKun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72
81EEKun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454
80EEMing Yao, Matthew Henricksen, Ernest Foo, Ed Dawson: Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. TrustBus 2004: 132-141
79EERiza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson: An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. TrustBus 2004: 152-161
78EEEd Dawson: Preface to the special issue on PKI. Int. J. Inf. Sec. 2(2): 65 (2004)
77EEYvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson: The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Int. J. Inf. Sec. 3(2): 86-98 (2004)
76EEChuan-Kun Wu, Ed Dawson: Correlation immunity and resiliency of symmetric Boolean functions. Theor. Comput. Sci. 312(2-3): 321-335 (2004)
2003
75EEYvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson: The Security of Fixed versus Random Elliptic Curves in Cryptography. ACISP 2003: 55-66
74EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Five Sealed-bid Auction Models. ACSW Frontiers 2003: 77-86
73EEJuan Manuel González Nieto, Ed Dawson, Eiji Okamoto: Privacy and Trusted Computing. DEXA Workshops 2003: 383-388
72EERiza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan: Secure e-Voting for Preferential Elections. EGOV 2003: 246-249
71EEByoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258
70EEKevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson: A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. ICISC 2003: 418-431
69EEKun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. WISA 2003: 244-256
68EEMing Yao, Ernest Foo, Kun Peng, Ed Dawson: An Improved Forward Integrity Protocol for Mobile Agents. WISA 2003: 272-285
67EESelwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez: Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Computer Communications 26(16): 1826-1838 (2003)
2002
66EELauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson: Strengthening the Key Schedule of the AES. ACISP 2002: 226-240
65EEAndrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson: The LILI-II Keystream Generator. ACISP 2002: 25-39
64EEMarie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto: Modelling Trust Structures for Public Key Infrastructures. ACISP 2002: 56-70
63EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159
62EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420
61EEEd Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto: A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149
60 Kapali Viswanathan, Colin Boyd, Ed Dawson: Hybrid Key Escrow: A New Paradigm. Computers & Security 21(1): 77-92 (2002)
59EEJuan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002)
58EEEd Dawson, Kapali Viswanathan, Colin Boyd: Compliant cryptologic protocols. Int. J. Inf. Sec. 1(3): 189-202 (2002)
2001
57EEDongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson: Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. ACISP 2001: 334-343
56EEJuan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363
55EEKapali Viswanathan, Colin Boyd, Ed Dawson: An Analysis of Integrity Services in Protocols. INDOCRYPT 2001: 175-187
2000
54 Ed Dawson, Andrew Clark, Colin Boyd: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings Springer 2000
53 Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson: Key Recovery System for the Commercial Environment. ACISP 2000: 149-162
52 Kapali Viswanathan, Colin Boyd, Ed Dawson: A Three Phased Schema for Sealed Bid Auction System Design. ACISP 2000: 412-426
51EEL. Burnett, Gary Carter, Ed Dawson, William Millan: Efficient Methods for Generating MARS-Like S-Boxes. FSE 2000: 300-314
50EEDongGook Park, Colin Boyd, Ed Dawson: Micropayments for Wireless Communications. ICISC 2000: 192-205
49EEGreg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson: Linkability in Practical Electronic Cash Design. ISW 2000: 149-163
48EEDongGook Park, Colin Boyd, Ed Dawson: Classification of Authentication Protocols: A Practical Approach. ISW 2000: 194-208
47 Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson: Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237
46EELeonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan: LILI Keystream Generator. Selected Areas in Cryptography 2000: 248-261
45EEEd Dawson, Andrew Clark, Mark Looi: Key management in a non-trusted distributed environment. Future Generation Comp. Syst. 16(4): 319-329 (2000)
44EEJovan Dj. Golic, Andrew Clark, Ed Dawson: Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 49(10): 1100-1109 (2000)
43EEJovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson: Fast Correlation Attacks on the Summation Generator. J. Cryptology 13(2): 245-262 (2000)
1999
42EEWilliam Millan, Andrew Clark, Ed Dawson: Boolean Function Design Using Hill Climbing Methods. ACISP 1999: 1-11
41EEKapali Viswanathan, Colin Boyd, Ed Dawson: Publicly Verifiable Key Escrow with Limited Time Span. ACISP 1999: 36-50
40EEJovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. ACISP 1999: 88-102
39 Kapali Viswanathan, Colin Boyd, Ed Dawson: Signature Scheme for Controlled Environments. ICICS 1999: 119-134
38 William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson: Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. ICICS 1999: 263-274
37 Kapali Viswanathan, Colin Boyd, Ed Dawson: Secure Selection Protocols. ICISC 1999: 132-146
36EEKapali Viswanathan, Colin Boyd, Ed Dawson: Strong Binding for Software Key Escrow. ICPP Workshops 1999: 134-139
35 Jovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. Australian Computer Journal 31(2): 44-53 (1999)
34EEWilliam J. Caelli, Ed Dawson, Scott A. Rea: PKI, elliptic curve cryptography, and digital signatures. Computers & Security 18(1): 47-66 (1999)
33EELeone Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson: A Fast Correlation Attack on Multiplexer Generators. Inf. Process. Lett. 70(2): 89-93 (1999)
1998
32 Colin Boyd, Ed Dawson: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings Springer 1998
31EELeone Simpson, Jovan Dj. Golic, Ed Dawson: A Probabilistic Correlation Attack on the Shrinking Generator. ACISP 1998: 147-158
30EEGary Carter, Ed Dawson, Lauren Nielsen: Key Schedules of Iterative Block Ciphers. ACISP 1998: 80-89
29EEWilliam Millan, Andrew Clark, Ed Dawson: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. EUROCRYPT 1998: 489-499
28 Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell: A security architecture for third generation wireless systems. ICISC 1998: 15-32
27EEDavid Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier: Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305
26EEEd Dawson, Helen Gustafson: A Method for Measuring Entropy of Symmetric Cipher Key Generators. Computers & Security 17(2): 177-184 (1998)
25 He Jingmin, Ed Dawson: Shared Secret Reconstruction. Des. Codes Cryptography 14(3): 221-237 (1998)
1997
24 William Millan, Ed Dawson: On the Security of Self-Synchronous Ciphers. ACISP 1997: 159-170
23 Jen Lim, Colin Boyd, Ed Dawson: Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. ACISP 1997: 216-227
22 M. Salmasidazeh, Leone Simpson, Jovan Dj. Golic, Ed Dawson: Fast Correlation Attacks and Multiple Linear Approximations. ACISP 1997: 228-239
21 William Millan, Andrew Clark, Ed Dawson: An effective genetic algorithm for finding highly nonlinear Boolean Functions. ICICS 1997: 149-158
20 Ed Dawson, Chuan-Kun Wu: Construction of correlation immune Boolean functions. ICICS 1997: 170-180
19 Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson: A taxonomy of electronic cash schemes. SEC 1997: 337-348
18EEJovan Dj. Golic, Mahmoud Salmasizadeh, Leone Simpson, Ed Dawson: Fast Correlation Attacks on Nonlinear Filter Generators. Inf. Process. Lett. 64(1): 37-42 (1997)
1996
17 Chuan-Kun Wu, Ed Dawson: On construction of resilient functions. ACISP 1996: 79-86
16 Ed Dawson, He Jingmin: Another approach to software key escrow encryption. ACISP 1996: 87-95
15 Andrew Clark, Jovan Dj. Golic, Ed Dawson: A Comparison of Fast Correlation Attacks. FSE 1996: 145-157
14 He Jingmin, Ed Dawson: On the reconstruction of shared secrets. SEC 1996: 209-218
1995
13 Ed Dawson, Jovan Dj. Golic: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings Springer 1995
12 He Jingmin, Ed Dawson: A New Key Escrow Cryptosystem. Cryptography: Policy and Algorithms 1995: 105-114
11 He Jingmin, Ed Dawson: How to Fairly Reconstruct a Shared Secret. Cryptography: Policy and Algorithms 1995: 115-124
10 Helen Gustafson, Ed Dawson, Jovan Dj. Golic: Randomness Measures Related to Subset Occurrence. Cryptography: Policy and Algorithms 1995: 132-143
9 Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson: Discrete Optimisation and Fast Correlation Attacks. Cryptography: Policy and Algorithms 1995: 186-200
1993
8 Ed Dawson, Diane Donovan: Shamir's Scheme Says It all. SEC 1993: 91-102
7 Bruce Goldburg, S. Sridharan, Ed Dawson: Design and Cryptanalysis of Transform-Based Analog Speech Scamblers. IEEE Journal on Selected Areas in Communications 11(5): 735-744 (1993)
1992
6 Ed Dawson: Cryptanalysis of Summation Generator. AUSCRYPT 1992: 209-215
5 Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli: Measuring the Strength of Ciphers. SEC 1992: 235-247
1991
4 Bruce Goldburg, Ed Dawson, S. Sridharan: A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. ASIACRYPT 1991: 299-311
3EEBruce Goldburg, Ed Dawson, S. Sridharan: The Automated Cryptoanalysis of Analog Speech Scramblers. EUROCRYPT 1991: 422-430
1990
2 Helen Gustafson, Ed Dawson, William J. Caelli: Comparison of Block Ciphers. AUSCRYPT 1990: 208-220
1 Ed Dawson, Bruce Goldburg: Universal Logic Sequences. AUSCRYPT 1990: 426-432

Coauthor Index

1Riza Aditya [72] [79] [82] [87] [90] [95]
2Sultan Al-Hinai [118]
3Colin Boyd [19] [23] [28] [32] [36] [37] [39] [41] [47] [48] [49] [50] [52] [53] [54] [55] [56] [57] [58] [59] [60] [62] [63] [69] [71] [72] [74] [79] [81] [82] [83] [87] [89] [90] [94] [95] [97] [98] [99] [100] [105] [106] [108] [111] [112] [124]
4Jaimee Brown [86]
5Mark Burdon [116]
6L. Burnett [38] [51]
7William J. Caelli [2] [5] [19] [34]
8Gary Carter [30] [38] [51] [66] [75] [77] [88] [115] [123]
9Kevin Chen [70] [84]
10Liqun Chen [121]
11Sharon Christensen [116]
12Andrew Clark [9] [15] [21] [29] [35] [38] [40] [42] [44] [45] [54] [59] [65]
13Robert S. Coulter [64]
14Robert Dawson [108]
15Yvo Desmedt [107]
16Diane Donovan [8]
17W. D. Duncan [116]
18Ernest Foo [19] [49] [68] [80] [85] [91]
19Joanne Fuller [65] [84] [93]
20Gary Gaskell [28]
21Praveen Gauravaram [104] [110]
22Hossein Ghodosi [119]
23Bruce Goldburg [1] [3] [4] [7]
24Jovan Dj. Golic [9] [10] [13] [15] [18] [22] [31] [33] [35] [40] [43] [44] [46] [65]
25Helen Gustafson [2] [5] [10] [26]
26Yousef Bani Hammad [88]
27Marie Henderson [64]
28Matthew Henricksen [66] [70] [80] [84] [85] [91] [96] [109] [118] [122]
29Hüseyin Hisil [115] [123]
30Yvonne Hitchcock [75] [77] [88]
31He Jingmin [11] [12] [14] [16] [25]
32Baoyuan Kang [124]
33John Kelsey [27]
34Abdollah Khodkar [9]
35JungJoon Kim [57]
36Kwangjo Kim [71] [89]
37Wolfgang Klemm [92]
38Xuejia Lai [121]
39Bill Lane [116]
40Byoungcheon Lee [71] [79] [82] [83] [87] [89] [90] [95] [99]
41Hoon Jae Lee [65] [84]
42Jen Lim [23]
43Mark Looi [28] [45]
44Javier Lopez [61] [67] [101]
45Greg Maitland [49] [91]
46Masahiro Mambo [121]
47Lauren May [66]
48Adrian McCullagh [104] [113]
49William Millan [21] [24] [27] [29] [38] [42] [46] [51] [65] [66] [70] [84] [93] [110]
50Atsuko Miyaji [121]
51Paul Montague [75] [77]
52José A. Montenegro [61]
53Sang-Jae Moon [65] [84]
54Yi Mu [121]
55Lauren Nielsen [5] [30]
56Juan Manuel González Nieto (Juanma González Nieto) [47] [53] [56] [59] [73] [86] [94] [101] [107] [108] [116]
57Eiji Okamoto [61] [64] [67] [73] [101] [111]
58DongGook Park [47] [48] [50] [57]
59Kun Peng [62] [63] [68] [69] [74] [81] [82] [83] [85] [87] [90] [97] [98] [99] [100] [101] [102] [105] [106] [107] [111] [112] [114] [117]
60Quan Pham [113]
61Josef Pieprzyk [119]
62David Pointcheval [121]
63Bart Preneel [121]
64Håvard Raddum [122]
65Scott A. Rea [34]
66Jason Reid [49]
67Selwyn Russell [28] [67]
68M. Salmasidazeh [22]
69Mahmoud Salmasizadeh [9] [18] [33] [43]
70Bruce Schneier [27]
71Leone Simpson [18] [22] [27] [31] [33] [65]
72Leonie Ruth Simpson [46] [70] [84] [118]
73Nigel P. Smart [121]
74S. Sridharan [3] [4] [7]
75Willy Susilo [121]
76Serge Vaudenay [103]
77Kapalee Viswanathan [69] [81]
78Kapali Viswanathan [36] [37] [39] [41] [52] [53] [55] [58] [59] [60] [62] [63] [72] [74] [110]
79David Wagner [27]
80Huaxiong Wang [121]
81Duncan S. Wong [120] [121]
82Kenneth Koon-Ho Wong [123]
83Chuan-Kun Wu [17] [20] [76]
84Jeongmo Yang [71] [89]
85Ming Yao [68] [80] [85] [91] [102]
86Seungjae Yoo [71] [89]
87Muhammad Reza Z'aba [122]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)