2009 | ||
---|---|---|
124 | EE | Baoyuan Kang, Colin Boyd, Ed Dawson: A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software 82(2): 270-273 (2009) |
2008 | ||
123 | EE | Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson: Twisted Edwards Curves Revisited. ASIACRYPT 2008: 326-343 |
122 | EE | Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson: Bit-Pattern Based Integral Attack. FSE 2008: 363-381 |
121 | Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008) | |
2007 | ||
120 | Ed Dawson, Duncan S. Wong: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings Springer 2007 | |
119 | Josef Pieprzyk, Hossein Ghodosi, Ed Dawson: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Springer 2007 | |
118 | EE | Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson: On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. ACISP 2007: 11-28 |
117 | EE | Kun Peng, Ed Dawson: A Range Test Secure in the Active Adversary Model. ACSW Frontiers 2007: 159-162 |
116 | EE | Mark Burdon, Juan Manuel González Nieto, Sharon Christensen, Ed Dawson, W. D. Duncan, Bill Lane: Access Control in Federated Databases: How Legal Issues Shape Security. EGOV 2007: 228-239 |
115 | EE | Hüseyin Hisil, Gary Carter, Ed Dawson: New Formulae for Efficient Elliptic Curve Arithmetic. INDOCRYPT 2007: 138-151 |
114 | EE | Kun Peng, Ed Dawson: Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. ISPEC 2007: 209-224 |
113 | EE | Quan Pham, Adrian McCullagh, Ed Dawson: Consistency of User Attribute in Federated Systems. TrustBus 2007: 165-177 |
112 | EE | Kun Peng, Colin Boyd, Ed Dawson: Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): (2007) |
2006 | ||
111 | EE | Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto: A Novel Range Test. ACISP 2006: 247-258 |
110 | EE | Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan: Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ACISP 2006: 407-420 |
109 | EE | Matthew Henricksen, Ed Dawson: Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. ACISP 2006: 52-63 |
108 | EE | Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto: SKMA: a key management architecture for SCADA systems. ACSW Frontiers 2006: 183-192 |
107 | EE | Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson: Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309 |
106 | EE | Kun Peng, Colin Boyd, Ed Dawson: Sealed-Bid Micro Auctions. SEC 2006: 246-257 |
105 | EE | Kun Peng, Colin Boyd, Ed Dawson: Batch verification of validity of bids in homomorphic e-auction. Computer Communications 29(15): 2798-2805 (2006) |
104 | EE | Praveen Gauravaram, Adrian McCullagh, Ed Dawson: The legal and practical implications of recent attacks on 128-bit cryptographic hash functions. First Monday 11(1): (2006) |
2005 | ||
103 | Ed Dawson, Serge Vaudenay: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings Springer 2005 | |
102 | EE | Ming Yao, Kun Peng, Ed Dawson: Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. ACISP 2005: 158-169 |
101 | EE | Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260 |
100 | EE | Kun Peng, Colin Boyd, Ed Dawson: Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204 |
99 | EE | Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96 |
98 | EE | Kun Peng, Colin Boyd, Ed Dawson: A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388 |
97 | EE | Kun Peng, Colin Boyd, Ed Dawson: Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98 |
96 | EE | Matthew Henricksen, Ed Dawson: Rekeying Issues in the MUGI Stream Cipher. Selected Areas in Cryptography 2005: 175-188 |
95 | Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson: Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. Comput. Syst. Sci. Eng. 20(6): (2005) | |
94 | EE | Juan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptography 36(3): 301-316 (2005) |
93 | EE | Joanne Fuller, William Millan, Ed Dawson: Multi-objective Optimisation of Bijective S-Boxes. New Generation Comput. 23(3): (2005) |
2004 | ||
92 | Ed Dawson, Wolfgang Klemm: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings Queensland University of Technology 2004 | |
91 | EE | Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson: A Mobile Agent System Providing Offer Privacy. ACISP 2004: 301-312 |
90 | EE | Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508 |
89 | EE | Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Secure Key Issuing in ID-based Cryptography. ACSW Frontiers 2004: 69-74 |
88 | Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock: Improvements to the RAK Factoring Algorithm. Cryptographic Algorithms and their Uses 2004: 152- | |
87 | Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71 | |
86 | Jaimee Brown, Ed Dawson, Juan Manuel González Nieto: Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109 | |
85 | EE | Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson: Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173 |
84 | EE | Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon: Dragon: A Fast Word Based Stream Cipher. ICISC 2004: 33-50 |
83 | EE | Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66 |
82 | EE | Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72 |
81 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454 |
80 | EE | Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson: Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. TrustBus 2004: 132-141 |
79 | EE | Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson: An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. TrustBus 2004: 152-161 |
78 | EE | Ed Dawson: Preface to the special issue on PKI. Int. J. Inf. Sec. 2(2): 65 (2004) |
77 | EE | Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson: The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Int. J. Inf. Sec. 3(2): 86-98 (2004) |
76 | EE | Chuan-Kun Wu, Ed Dawson: Correlation immunity and resiliency of symmetric Boolean functions. Theor. Comput. Sci. 312(2-3): 321-335 (2004) |
2003 | ||
75 | EE | Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson: The Security of Fixed versus Random Elliptic Curves in Cryptography. ACISP 2003: 55-66 |
74 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Five Sealed-bid Auction Models. ACSW Frontiers 2003: 77-86 |
73 | EE | Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto: Privacy and Trusted Computing. DEXA Workshops 2003: 383-388 |
72 | EE | Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan: Secure e-Voting for Preferential Elections. EGOV 2003: 246-249 |
71 | EE | Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258 |
70 | EE | Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson: A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. ICISC 2003: 418-431 |
69 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. WISA 2003: 244-256 |
68 | EE | Ming Yao, Ernest Foo, Kun Peng, Ed Dawson: An Improved Forward Integrity Protocol for Mobile Agents. WISA 2003: 272-285 |
67 | EE | Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez: Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Computer Communications 26(16): 1826-1838 (2003) |
2002 | ||
66 | EE | Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson: Strengthening the Key Schedule of the AES. ACISP 2002: 226-240 |
65 | EE | Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson: The LILI-II Keystream Generator. ACISP 2002: 25-39 |
64 | EE | Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto: Modelling Trust Structures for Public Key Infrastructures. ACISP 2002: 56-70 |
63 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159 |
62 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420 |
61 | EE | Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto: A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149 |
60 | Kapali Viswanathan, Colin Boyd, Ed Dawson: Hybrid Key Escrow: A New Paradigm. Computers & Security 21(1): 77-92 (2002) | |
59 | EE | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002) |
58 | EE | Ed Dawson, Kapali Viswanathan, Colin Boyd: Compliant cryptologic protocols. Int. J. Inf. Sec. 1(3): 189-202 (2002) |
2001 | ||
57 | EE | DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson: Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. ACISP 2001: 334-343 |
56 | EE | Juan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363 |
55 | EE | Kapali Viswanathan, Colin Boyd, Ed Dawson: An Analysis of Integrity Services in Protocols. INDOCRYPT 2001: 175-187 |
2000 | ||
54 | Ed Dawson, Andrew Clark, Colin Boyd: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings Springer 2000 | |
53 | Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson: Key Recovery System for the Commercial Environment. ACISP 2000: 149-162 | |
52 | Kapali Viswanathan, Colin Boyd, Ed Dawson: A Three Phased Schema for Sealed Bid Auction System Design. ACISP 2000: 412-426 | |
51 | EE | L. Burnett, Gary Carter, Ed Dawson, William Millan: Efficient Methods for Generating MARS-Like S-Boxes. FSE 2000: 300-314 |
50 | EE | DongGook Park, Colin Boyd, Ed Dawson: Micropayments for Wireless Communications. ICISC 2000: 192-205 |
49 | EE | Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson: Linkability in Practical Electronic Cash Design. ISW 2000: 149-163 |
48 | EE | DongGook Park, Colin Boyd, Ed Dawson: Classification of Authentication Protocols: A Practical Approach. ISW 2000: 194-208 |
47 | Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson: Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237 | |
46 | EE | Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan: LILI Keystream Generator. Selected Areas in Cryptography 2000: 248-261 |
45 | EE | Ed Dawson, Andrew Clark, Mark Looi: Key management in a non-trusted distributed environment. Future Generation Comp. Syst. 16(4): 319-329 (2000) |
44 | EE | Jovan Dj. Golic, Andrew Clark, Ed Dawson: Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 49(10): 1100-1109 (2000) |
43 | EE | Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson: Fast Correlation Attacks on the Summation Generator. J. Cryptology 13(2): 245-262 (2000) |
1999 | ||
42 | EE | William Millan, Andrew Clark, Ed Dawson: Boolean Function Design Using Hill Climbing Methods. ACISP 1999: 1-11 |
41 | EE | Kapali Viswanathan, Colin Boyd, Ed Dawson: Publicly Verifiable Key Escrow with Limited Time Span. ACISP 1999: 36-50 |
40 | EE | Jovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. ACISP 1999: 88-102 |
39 | Kapali Viswanathan, Colin Boyd, Ed Dawson: Signature Scheme for Controlled Environments. ICICS 1999: 119-134 | |
38 | William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson: Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. ICICS 1999: 263-274 | |
37 | Kapali Viswanathan, Colin Boyd, Ed Dawson: Secure Selection Protocols. ICISC 1999: 132-146 | |
36 | EE | Kapali Viswanathan, Colin Boyd, Ed Dawson: Strong Binding for Software Key Escrow. ICPP Workshops 1999: 134-139 |
35 | Jovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. Australian Computer Journal 31(2): 44-53 (1999) | |
34 | EE | William J. Caelli, Ed Dawson, Scott A. Rea: PKI, elliptic curve cryptography, and digital signatures. Computers & Security 18(1): 47-66 (1999) |
33 | EE | Leone Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson: A Fast Correlation Attack on Multiplexer Generators. Inf. Process. Lett. 70(2): 89-93 (1999) |
1998 | ||
32 | Colin Boyd, Ed Dawson: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings Springer 1998 | |
31 | EE | Leone Simpson, Jovan Dj. Golic, Ed Dawson: A Probabilistic Correlation Attack on the Shrinking Generator. ACISP 1998: 147-158 |
30 | EE | Gary Carter, Ed Dawson, Lauren Nielsen: Key Schedules of Iterative Block Ciphers. ACISP 1998: 80-89 |
29 | EE | William Millan, Andrew Clark, Ed Dawson: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. EUROCRYPT 1998: 489-499 |
28 | Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell: A security architecture for third generation wireless systems. ICISC 1998: 15-32 | |
27 | EE | David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier: Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305 |
26 | EE | Ed Dawson, Helen Gustafson: A Method for Measuring Entropy of Symmetric Cipher Key Generators. Computers & Security 17(2): 177-184 (1998) |
25 | He Jingmin, Ed Dawson: Shared Secret Reconstruction. Des. Codes Cryptography 14(3): 221-237 (1998) | |
1997 | ||
24 | William Millan, Ed Dawson: On the Security of Self-Synchronous Ciphers. ACISP 1997: 159-170 | |
23 | Jen Lim, Colin Boyd, Ed Dawson: Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. ACISP 1997: 216-227 | |
22 | M. Salmasidazeh, Leone Simpson, Jovan Dj. Golic, Ed Dawson: Fast Correlation Attacks and Multiple Linear Approximations. ACISP 1997: 228-239 | |
21 | William Millan, Andrew Clark, Ed Dawson: An effective genetic algorithm for finding highly nonlinear Boolean Functions. ICICS 1997: 149-158 | |
20 | Ed Dawson, Chuan-Kun Wu: Construction of correlation immune Boolean functions. ICICS 1997: 170-180 | |
19 | Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson: A taxonomy of electronic cash schemes. SEC 1997: 337-348 | |
18 | EE | Jovan Dj. Golic, Mahmoud Salmasizadeh, Leone Simpson, Ed Dawson: Fast Correlation Attacks on Nonlinear Filter Generators. Inf. Process. Lett. 64(1): 37-42 (1997) |
1996 | ||
17 | Chuan-Kun Wu, Ed Dawson: On construction of resilient functions. ACISP 1996: 79-86 | |
16 | Ed Dawson, He Jingmin: Another approach to software key escrow encryption. ACISP 1996: 87-95 | |
15 | Andrew Clark, Jovan Dj. Golic, Ed Dawson: A Comparison of Fast Correlation Attacks. FSE 1996: 145-157 | |
14 | He Jingmin, Ed Dawson: On the reconstruction of shared secrets. SEC 1996: 209-218 | |
1995 | ||
13 | Ed Dawson, Jovan Dj. Golic: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings Springer 1995 | |
12 | He Jingmin, Ed Dawson: A New Key Escrow Cryptosystem. Cryptography: Policy and Algorithms 1995: 105-114 | |
11 | He Jingmin, Ed Dawson: How to Fairly Reconstruct a Shared Secret. Cryptography: Policy and Algorithms 1995: 115-124 | |
10 | Helen Gustafson, Ed Dawson, Jovan Dj. Golic: Randomness Measures Related to Subset Occurrence. Cryptography: Policy and Algorithms 1995: 132-143 | |
9 | Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson: Discrete Optimisation and Fast Correlation Attacks. Cryptography: Policy and Algorithms 1995: 186-200 | |
1993 | ||
8 | Ed Dawson, Diane Donovan: Shamir's Scheme Says It all. SEC 1993: 91-102 | |
7 | Bruce Goldburg, S. Sridharan, Ed Dawson: Design and Cryptanalysis of Transform-Based Analog Speech Scamblers. IEEE Journal on Selected Areas in Communications 11(5): 735-744 (1993) | |
1992 | ||
6 | Ed Dawson: Cryptanalysis of Summation Generator. AUSCRYPT 1992: 209-215 | |
5 | Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli: Measuring the Strength of Ciphers. SEC 1992: 235-247 | |
1991 | ||
4 | Bruce Goldburg, Ed Dawson, S. Sridharan: A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. ASIACRYPT 1991: 299-311 | |
3 | EE | Bruce Goldburg, Ed Dawson, S. Sridharan: The Automated Cryptoanalysis of Analog Speech Scramblers. EUROCRYPT 1991: 422-430 |
1990 | ||
2 | Helen Gustafson, Ed Dawson, William J. Caelli: Comparison of Block Ciphers. AUSCRYPT 1990: 208-220 | |
1 | Ed Dawson, Bruce Goldburg: Universal Logic Sequences. AUSCRYPT 1990: 426-432 |