The following pages link to E. Dawson (Q287224):
Displaying 50 items.
- Fast correlation attacks on nonlinear filter generators (Q287225) (← links)
- (Q776381) (redirect page) (← links)
- Differential random fault attacks on certain CAESAR stream ciphers (Q776382) (← links)
- A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification (Q1013325) (← links)
- Identity-based strong designated verifier signature schemes: attacks and new construction (Q1013330) (← links)
- Shared secret reconstruction (Q1265229) (← links)
- Existence of generalized inverse of linear transformations over finite fields (Q1273208) (← links)
- Statistical weakness of multiplexed sequences (Q1867455) (← links)
- Correlation immunity and resiliency of symmetric Boolean functions (Q1884952) (← links)
- Fast correlation attacks on the summation generator. (Q1976264) (← links)
- Fault attacks on XEX mode with application to certain authenticated encryption modes (Q2399967) (← links)
- A fundamental flaw in the ++AE authenticated encryption mode (Q2413289) (← links)
- Multi-objective optimisation of bijective S-boxes (Q2493290) (← links)
- A public key cryptosystem based on a subgroup membership problem (Q2572970) (← links)
- (Q2708622) (← links)
- (Q2721133) (← links)
- (Q2721171) (← links)
- (Q2762758) (← links)
- (Q2762904) (← links)
- Flaws in the Initialisation Process of Stream Ciphers (Q2790423) (← links)
- Indirect message injection for MAC generation (Q2861352) (← links)
- A Framework for Security Analysis of Key Derivation Functions (Q2894360) (← links)
- Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers (Q2907368) (← links)
- Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher (Q2945086) (← links)
- A Model for Constraint and Delegation Management (Q3001901) (← links)
- State Convergence in the Initialisation of Stream Ciphers (Q3012978) (← links)
- An exploration of affine group laws for elliptic curves (Q3015224) (← links)
- Towards a Game Theoretic Authorisation Model (Q3056869) (← links)
- Linearity within the SMS4 Block Cipher (Q3056900) (← links)
- (Q3149750) (← links)
- BP-XACML an Authorisation Policy Language for Business Processes (Q3194609) (← links)
- (Q3478359) (← links)
- Bit-Pattern Based Integral Attack (Q3525686) (← links)
- Twisted Edwards Curves Revisited (Q3600383) (← links)
- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks (Q3608900) (← links)
- Jacobi Quartic Curves Revisited (Q3634512) (← links)
- (Q3718728) (← links)
- (Q3770434) (← links)
- (Q3839173) (← links)
- (Q4033698) (← links)
- (Q4250627) (← links)
- (Q4250825) (← links)
- (Q4325285) (← links)
- (Q4341685) (← links)
- (Q4359590) (← links)
- (Q4373628) (← links)
- (Q4408429) (← links)
- (Q4412960) (← links)
- (Q4412981) (← links)
- (Q4413340) (← links)