2007 |
14 | EE | Gregory G. Rose,
Philip Hawkes,
Michael Paddon,
Cameron McDonald,
Miriam Wiggers de Vries:
Design and Primitive Specification for Shannon.
Symmetric Cryptography 2007 |
2005 |
13 | | Gregory G. Rose:
Security/Cryptography.
LISA 2005 |
2004 |
12 | EE | Philip Hawkes,
Gregory G. Rose:
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers.
CRYPTO 2004: 390-406 |
2003 |
11 | EE | Gregory G. Rose,
Philip Hawkes:
Turing: A Fast Stream Cipher.
FSE 2003: 290-306 |
10 | | Gregory G. Rose:
PKI/Cryptography.
LISA 2003 |
2002 |
9 | EE | Philip Hawkes,
Gregory G. Rose:
Guess-and-Determine Attacks on SNOW.
Selected Areas in Cryptography 2002: 37-46 |
2001 |
8 | | Gregory G. Rose:
PKI/Cryptography.
LISA 2001 |
7 | EE | Gregory G. Rose:
Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk.
LISA 2001 |
6 | EE | Philip Hawkes,
Frank Quick,
Gregory G. Rose:
A Practical Cryptanalysis of SSC2.
Selected Areas in Cryptography 2001: 25-37 |
2000 |
5 | EE | Philip Hawkes,
Gregory G. Rose:
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers.
ASIACRYPT 2000: 303-316 |
1999 |
4 | EE | Damian Bentley,
Gregory G. Rose,
Tara Whalen:
ssmail: Opportunistic Encryption in sendmail.
LISA 1999: 1-8 |
1998 |
3 | EE | Gregory G. Rose:
A Stream Cipher Based on Linear Feedback over GF(28).
ACISP 1998: 135-146 |
1996 |
2 | EE | Gregory G. Rose:
The PGP Moose - Implementation and Experience.
LISA 1996: 155-160 |
1978 |
1 | | Gregory G. Rose:
Performance Evaluation under Unix and a Study of PDP-11 Instruction Usage.
Operating Systems Review 12(3): 28-45 (1978) |