2008 |
16 | EE | Muhammad Reza Z'aba,
Håvard Raddum,
Matthew Henricksen,
Ed Dawson:
Bit-Pattern Based Integral Attack.
FSE 2008: 363-381 |
15 | EE | Matthew Henricksen:
Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks.
HPCC 2008: 795-800 |
2007 |
14 | EE | Sultan Al-Hinai,
Ed Dawson,
Matthew Henricksen,
Leonie Ruth Simpson:
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.
ACISP 2007: 11-28 |
13 | EE | Matthew Henricksen,
William Caelli,
Peter R. Croll:
Securing Grid Data Using Mandatory Access Controls.
ACSW Frontiers 2007: 25-32 |
12 | EE | Matthew Henricksen,
Lars R. Knudsen:
Cryptanalysis of the CRUSH Hash Function.
Selected Areas in Cryptography 2007: 74-83 |
2006 |
11 | EE | Matthew Henricksen,
Ed Dawson:
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond.
ACISP 2006: 52-63 |
10 | EE | Leonie Ruth Simpson,
Matthew Henricksen:
Improved Cryptanalysis of MAG.
ACISP 2006: 64-75 |
2005 |
9 | EE | Matthew Henricksen,
Ed Dawson:
Rekeying Issues in the MUGI Stream Cipher.
Selected Areas in Cryptography 2005: 175-188 |
2004 |
8 | EE | Ming Yao,
Matthew Henricksen,
Greg Maitland,
Ernest Foo,
Ed Dawson:
A Mobile Agent System Providing Offer Privacy.
ACISP 2004: 301-312 |
7 | | Matthew Henricksen,
Ming Yao,
Ernest Foo:
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents.
Cryptographic Algorithms and their Uses 2004: 110-124 |
6 | EE | Ming Yao,
Kun Peng,
Matthew Henricksen,
Ernest Foo,
Ed Dawson:
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
EC-Web 2004: 164-173 |
5 | EE | Kevin Chen,
Matthew Henricksen,
William Millan,
Joanne Fuller,
Leonie Ruth Simpson,
Ed Dawson,
Hoon Jae Lee,
Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher.
ICISC 2004: 33-50 |
4 | EE | Ming Yao,
Matthew Henricksen,
Ernest Foo,
Ed Dawson:
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures.
TrustBus 2004: 132-141 |
2003 |
3 | EE | Jason Reid,
Ian Cheong,
Matthew Henricksen,
Jason Smith:
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.
ACISP 2003: 403-415 |
2 | EE | Kevin Chen,
Leonie Ruth Simpson,
Matthew Henricksen,
William Millan,
Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher.
ICISC 2003: 418-431 |
2002 |
1 | EE | Lauren May,
Matthew Henricksen,
William Millan,
Gary Carter,
Ed Dawson:
Strengthening the Key Schedule of the AES.
ACISP 2002: 226-240 |