2006 |
24 | EE | Praveen Gauravaram,
William Millan,
Ed Dawson,
Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction.
ACISP 2006: 407-420 |
2005 |
23 | EE | William Millan:
New Cryptographic Applications of Boolean Function Equivalence Classes.
ACISP 2005: 572-583 |
22 | EE | Joanne Fuller,
William Millan,
Ed Dawson:
Multi-objective Optimisation of Bijective S-Boxes.
New Generation Comput. 23(3): (2005) |
2004 |
21 | | Praveen Gauravaram,
William Millan:
Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE).
Cryptographic Algorithms and their Uses 2004: 1-13 |
20 | | Kevin Chen,
William Millan,
Leonie Ruth Simpson:
Perspectives on Word Based Stream Ciphers.
Cryptographic Algorithms and their Uses 2004: 14-27 |
19 | | Praveen Gauravaram,
William Millan,
Lauren May:
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.
Cryptographic Algorithms and their Uses 2004: 28-39 |
18 | EE | Kevin Chen,
Matthew Henricksen,
William Millan,
Joanne Fuller,
Leonie Ruth Simpson,
Ed Dawson,
Hoon Jae Lee,
Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher.
ICISC 2004: 33-50 |
17 | EE | William Millan,
Praveen Gauravaram:
Cryptanalysis of the cellular authentication and voice encryption algorithm.
IEICE Electronic Express 1(15): 453-459 (2004) |
2003 |
16 | EE | Joanne Fuller,
William Millan:
Linear Redundancy in S-Boxes.
FSE 2003: 74-86 |
15 | EE | Kevin Chen,
Leonie Ruth Simpson,
Matthew Henricksen,
William Millan,
Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher.
ICISC 2003: 418-431 |
2002 |
14 | EE | Lauren May,
Matthew Henricksen,
William Millan,
Gary Carter,
Ed Dawson:
Strengthening the Key Schedule of the AES.
ACISP 2002: 226-240 |
13 | EE | Andrew Clark,
Ed Dawson,
Joanne Fuller,
Jovan Dj. Golic,
Hoon Jae Lee,
William Millan,
Sang-Jae Moon,
Leone Simpson:
The LILI-II Keystream Generator.
ACISP 2002: 25-39 |
12 | EE | John A. Clark,
Jeremy L. Jacob,
Susan Stepney,
Subhamoy Maitra,
William Millan:
Evolving Boolean Functions Satisfying Multiple Criteria.
INDOCRYPT 2002: 246-259 |
2000 |
11 | EE | L. Burnett,
Gary Carter,
Ed Dawson,
William Millan:
Efficient Methods for Generating MARS-Like S-Boxes.
FSE 2000: 300-314 |
10 | EE | Leonie Ruth Simpson,
Ed Dawson,
Jovan Dj. Golic,
William Millan:
LILI Keystream Generator.
Selected Areas in Cryptography 2000: 248-261 |
1999 |
9 | EE | William Millan,
Andrew Clark,
Ed Dawson:
Boolean Function Design Using Hill Climbing Methods.
ACISP 1999: 1-11 |
8 | | William Millan,
L. Burnett,
Gary Carter,
Andrew Clark,
Ed Dawson:
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.
ICICS 1999: 263-274 |
1998 |
7 | EE | William Millan:
How to Improve the Nonlinearity of Bijective S-Boxes.
ACISP 1998: 181-192 |
6 | EE | William Millan,
Andrew Clark,
Ed Dawson:
Heuristic Design of Cryptographically Strong Balanced Boolean Functions.
EUROCRYPT 1998: 489-499 |
5 | | William Millan:
Cryptanalysis of the alleged CAVE algorithm.
ICISC 1998: 107-119 |
4 | EE | David Wagner,
Leone Simpson,
Ed Dawson,
John Kelsey,
William Millan,
Bruce Schneier:
Cryptanalysis of ORYX.
Selected Areas in Cryptography 1998: 296-305 |
1997 |
3 | | William Millan,
Ed Dawson:
On the Security of Self-Synchronous Ciphers.
ACISP 1997: 159-170 |
2 | | William Millan,
Andrew Clark,
Ed Dawson:
An effective genetic algorithm for finding highly nonlinear Boolean Functions.
ICICS 1997: 149-158 |
1995 |
1 | | William Millan:
Low Order Approximation of Cipher Functions.
Cryptography: Policy and Algorithms 1995: 144-155 |