dblp.uni-trier.dewww.uni-trier.de

Matthew Henricksen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
16EEMuhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson: Bit-Pattern Based Integral Attack. FSE 2008: 363-381
15EEMatthew Henricksen: Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks. HPCC 2008: 795-800
2007
14EESultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson: On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. ACISP 2007: 11-28
13EEMatthew Henricksen, William Caelli, Peter R. Croll: Securing Grid Data Using Mandatory Access Controls. ACSW Frontiers 2007: 25-32
12EEMatthew Henricksen, Lars R. Knudsen: Cryptanalysis of the CRUSH Hash Function. Selected Areas in Cryptography 2007: 74-83
2006
11EEMatthew Henricksen, Ed Dawson: Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. ACISP 2006: 52-63
10EELeonie Ruth Simpson, Matthew Henricksen: Improved Cryptanalysis of MAG. ACISP 2006: 64-75
2005
9EEMatthew Henricksen, Ed Dawson: Rekeying Issues in the MUGI Stream Cipher. Selected Areas in Cryptography 2005: 175-188
2004
8EEMing Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson: A Mobile Agent System Providing Offer Privacy. ACISP 2004: 301-312
7 Matthew Henricksen, Ming Yao, Ernest Foo: An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. Cryptographic Algorithms and their Uses 2004: 110-124
6EEMing Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson: Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173
5EEKevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon: Dragon: A Fast Word Based Stream Cipher. ICISC 2004: 33-50
4EEMing Yao, Matthew Henricksen, Ernest Foo, Ed Dawson: Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. TrustBus 2004: 132-141
2003
3EEJason Reid, Ian Cheong, Matthew Henricksen, Jason Smith: A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. ACISP 2003: 403-415
2EEKevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson: A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. ICISC 2003: 418-431
2002
1EELauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson: Strengthening the Key Schedule of the AES. ACISP 2002: 226-240

Coauthor Index

1Sultan Al-Hinai [14]
2William Caelli [13]
3Gary Carter [1]
4Kevin Chen [2] [5]
5Ian Cheong [3]
6Peter R. Croll [13]
7Ed Dawson [1] [2] [4] [5] [6] [8] [9] [11] [14] [16]
8Ernest Foo [4] [6] [7] [8]
9Joanne Fuller [5]
10Lars R. Knudsen [12]
11Hoon Jae Lee [5]
12Greg Maitland [8]
13Lauren May [1]
14William Millan [1] [2] [5]
15Sang-Jae Moon [5]
16Kun Peng [6]
17Håvard Raddum [16]
18Jason Reid [3]
19Leonie Ruth Simpson [2] [5] [10] [14]
20Jason Smith [3]
21Ming Yao [4] [6] [7] [8]
22Muhammad Reza Z'aba [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)