Urmăriți
Edward Dawson
Edward Dawson
Adresă de e-mail confirmată pe qut.edu.au
Titlu
Citat de
Citat de
Anul
Twisted Edwards curves revisited
H Hisil, KKH Wong, G Carter, E Dawson
International Conference on the Theory and Application of Cryptology and …, 2008
3182008
Multistage secret sharing based on one-way function
J He, E Dawson
Electronics Letters 30 (19), 1591-1592, 1994
2781994
Heuristic design of cryptographically strong balanced Boolean functions
W Millan, A Clark, E Dawson
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
2011998
Providing receipt-freeness in mixnet-based voting protocols
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004
2002004
Secure key issuing in ID-based cryptography
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
Proceedings of the second workshop on Australasian information security …, 2004
1932004
Multisecret-sharing scheme based on one-way function
J He, E Dawson
Electronics Letters 31 (2), 93-95, 1995
1701995
A novel identity-based strong designated verifier signature scheme
B Kang, C Boyd, ED Dawson
Journal of Systems and Software 82 (2), 270-273, 2009
1432009
PKI, elliptic curve cryptography, and digital signatures
WJ Caelli, EP Dawson, SA Rea
Computers & Security 18 (1), 47-66, 1999
1391999
SKMA-A key management architecture for SCADA systems
R Dawson, C Boyd, E Dawson, J Gonzalez Nieto
ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006
1292006
A computer package for measuring the strength of encryption algorithms
H Gustafson, E Dawson, L Nielsen, W Caelli
Computers & Security 13 (8), 687-697, 1994
1281994
An effective genetic algorithm for finding highly nonlinear Boolean functions
W Millan, A Clark, E Dawson
Information and Communications Security: First International Conference …, 1997
1201997
Evolutionary heuristics for finding cryptographically strong S-boxes
W Millan, L Burnett, G Carter, A Clark, E Dawson
Information and Communication Security: Second International Conference …, 1999
1191999
Smart hill climbing finds better boolean functions
W Millan, A Clark, E Dawson
Workshop on Selected Areas in Cryptology 63, 1997
1111997
The breadth of Shamir's secret-sharing scheme
E Dawson, D Donovan
Computers & Security 13 (1), 69-78, 1994
1111994
Bit-pattern based integral attack
M Z’aba, H Raddum, M Henricksen, E Dawson
Fast Software Encryption, 363-381, 2008
1022008
Fast Fourier transform based speech encryption system
S Sridharan, E Dawson, B Goldburg
IEE Proceedings I-Communications, Speech and Vision 3 (138), 215-223, 1991
981991
Design and cryptanalysis of transform-based analog speech scramblers
B Goldburg, S Sridharan, E Dawson
IEEE Journal on Selected areas in Communications 11 (5), 735-744, 1993
961993
Towards secure and legal e-tendering
M Betts, P Black, S Christensen, E Dawson, R Du, B Duncan, E Foo, ...
Journal of Information Technology in Construction 11 (e-Commerce in …, 2006
952006
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
862000
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
852005
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20