Leonie Simpson
Leonie Simpson
Senior Lecturer, Science and Engineering Faculty, Queensland University of Technology
Bestätigte E-Mail-Adresse bei qut.edu.au
Titel
Zitiert von
Zitiert von
Jahr
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
International Conference on Information Security and Cryptology, 33-50, 2004
782004
LILI keystream generator
LR Simpson, E Dawson, JD Golić, WL Millan
International Workshop on Selected Areas in Cryptography, 248-261, 2000
702000
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
622000
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
552002
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Australasian Conference on Information Security and Privacy, 147-158, 1998
551998
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
462013
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
International Workshop on Selected Areas in Cryptography, 296-305, 1998
441998
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
312002
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
252016
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
182016
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
152000
On the security of the LILI family of stream ciphers against algebraic attacks
SZ Al-Hinai, E Dawson, M Henricksen, L Simpson
Australasian Conference on Information Security and Privacy, 11-28, 2007
142007
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
IFIP International Information Security Conference, 125-138, 2013
132013
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Australasian Conference on Information Security and Privacy, 108-121, 2009
132009
Fast correlation attacks and multiple linear approximations
M Salmasizadeh, L Simpson, JD Golić, E Dawson
Australasian Conference on Information Security and Privacy, 228-239, 1997
111997
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
101997
Algebraic analysis of Trivium-like ciphers
SG Teo, KKH Wong, H Bartlett, L Simpson, E Dawson
92013
Analysis of indirect message injection for mac generation using stream ciphers
M ALMashrafi, H Bartlett, L Simpson, E Dawson, KKH Wong
Australasian Conference on Information Security and Privacy, 138-151, 2012
92012
The LILI-128 keystream generator
A Clark
NESSIE project submission, 2000
92000
Divide and conquer attacks on shift register based stream ciphers
LR Simpson
Queensland University of Technology, 2000
92000
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20