Ed Dawson

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On construction of resilient functions
 
2024-07-11Paper
Differential random fault attacks on certain CAESAR stream ciphers
 
2020-07-08Paper
How to fairly reconstruct a shared secret
Cryptography: Policy and Algorithms
2019-10-10Paper
A new key escrow cryptosystem
Cryptography: Policy and Algorithms
2019-10-10Paper
Randomness measures related to subset occurrence
Cryptography: Policy and Algorithms
2019-10-10Paper
A fundamental flaw in the ++AE authenticated encryption mode
Journal of Mathematical Cryptology
2018-04-10Paper
Fault attacks on XEX mode with application to certain authenticated encryption modes
 
2017-08-25Paper
Fast correlation attacks on nonlinear filter generators
Information Processing Letters
2016-05-26Paper
Flaws in the initialisation process of stream ciphers
Computation, Cryptography, and Network Security
2016-03-04Paper
BP-XACML an authorisation policy language for business processes
Information Security and Privacy
2015-10-20Paper
Weaknesses in the initialisation process of the common scrambling algorithm stream cipher
Sequences and Their Applications - SETA 2014
2015-09-09Paper
Indirect message injection for MAC generation
Journal of Mathematical Cryptology
2013-11-12Paper
A general model for MAC generation using direct injection
Information Security and Cryptology
2013-05-28Paper
Analysis of indirect message injection for MAC generation using stream ciphers
Information Security and Privacy
2012-09-07Paper
A framework for security analysis of key derivation functions
Information Security Practice and Experience
2012-06-29Paper
An exploration of affine group laws for elliptic curves
Journal of Mathematical Cryptology
2011-07-11Paper
State convergence in the initialisation of stream ciphers
Information Security and Privacy
2011-07-07Paper
A model for constraint and delegation management
Information Security Practice and Experience
2011-05-19Paper
Towards a game theoretic authorisation model
Lecture Notes in Computer Science
2010-11-23Paper
Linearity within the SMS4 block cipher
Information Security and Cryptology
2010-11-23Paper
Jacobi Quartic Curves Revisited
Information Security and Privacy
2009-06-25Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Identity-based strong designated verifier signature schemes: attacks and new construction
Computers and Electrical Engineering
2009-04-17Paper
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Computers and Electrical Engineering
2009-04-17Paper
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks
Information Security and Privacy
2009-03-06Paper
Twisted Edwards Curves Revisited
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Bit-Pattern Based Integral Attack
Fast Software Encryption
2008-09-18Paper
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
New Formulae for Efficient Elliptic Curve Arithmetic
Lecture Notes in Computer Science
2008-04-11Paper
An Efficient and Verifiable Solution to the Millionaire Problem
Lecture Notes in Computer Science
2008-03-17Paper
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Rekeying Issues in the MUGI Stream Cipher
Selected Areas in Cryptography
2007-11-15Paper
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction
Information Security and Privacy
2007-09-07Paper
A Novel Range Test
Information Security and Privacy
2007-09-07Paper
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
Information Security and Privacy
2007-09-07Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
scientific article; zbMATH DE number 5066607 (Why is no real title available?)
 
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Multi-objective optimisation of bijective S-boxes
New Generation Computing
2006-06-12Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
scientific article; zbMATH DE number 2230939 (Why is no real title available?)
 
2005-11-21Paper
A public key cryptosystem based on a subgroup membership problem
Designs, Codes and Cryptography
2005-11-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Correlation immunity and resiliency of symmetric Boolean functions
Theoretical Computer Science
2004-10-27Paper
scientific article; zbMATH DE number 2080707 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2080176 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2080179 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2048535 (Why is no real title available?)
 
2004-03-01Paper
scientific article; zbMATH DE number 2043310 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 1996484 (Why is no real title available?)
 
2003-10-22Paper
scientific article; zbMATH DE number 1980956 (Why is no real title available?)
 
2003-09-15Paper
scientific article; zbMATH DE number 1950627 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950346 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950332 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1941234 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1857525 (Why is no real title available?)
 
2003-05-19Paper
Statistical weakness of multiplexed sequences
Finite Fields and their Applications
2003-04-02Paper
scientific article; zbMATH DE number 1759278 (Why is no real title available?)
 
2002-10-13Paper
scientific article; zbMATH DE number 1808271 (Why is no real title available?)
 
2002-09-26Paper
scientific article; zbMATH DE number 1500493 (Why is no real title available?)
 
2002-08-14Paper
scientific article; zbMATH DE number 1500492 (Why is no real title available?)
 
2002-08-14Paper
scientific article; zbMATH DE number 1500487 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1522640 (Why is no real title available?)
 
2002-06-10Paper
scientific article; zbMATH DE number 1424188 (Why is no real title available?)
 
2002-04-08Paper
scientific article; zbMATH DE number 1689605 (Why is no real title available?)
 
2002-01-13Paper
scientific article; zbMATH DE number 1689010 (Why is no real title available?)
 
2002-01-09Paper
scientific article; zbMATH DE number 1925560 (Why is no real title available?)
International Journal of Information Security
2002-01-01Paper
scientific article; zbMATH DE number 1440060 (Why is no real title available?)
 
2001-10-03Paper
scientific article; zbMATH DE number 1588475 (Why is no real title available?)
 
2001-07-17Paper
scientific article; zbMATH DE number 1612529 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1612508 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1471071 (Why is no real title available?)
 
2000-07-09Paper
scientific article; zbMATH DE number 1304126 (Why is no real title available?)
 
2000-02-02Paper
Fast correlation attacks on the summation generator.
Journal of Cryptology
2000-01-01Paper
Shared secret reconstruction
Designs, Codes and Cryptography
1999-07-28Paper
scientific article; zbMATH DE number 1303959 (Why is no real title available?)
 
1999-06-17Paper
Existence of generalized inverse of linear transformations over finite fields
Finite Fields and their Applications
1998-12-06Paper
scientific article; zbMATH DE number 1189377 (Why is no real title available?)
 
1998-10-08Paper
scientific article; zbMATH DE number 1107685 (Why is no real title available?)
 
1998-05-29Paper
scientific article; zbMATH DE number 1076147 (Why is no real title available?)
 
1997-10-20Paper
scientific article; zbMATH DE number 1024010 (Why is no real title available?)
 
1997-06-18Paper
scientific article; zbMATH DE number 874210 (Why is no real title available?)
 
1997-03-25Paper
scientific article; zbMATH DE number 731849 (Why is no real title available?)
 
1995-08-28Paper
scientific article; zbMATH DE number 166085 (Why is no real title available?)
 
1993-05-16Paper
scientific article; zbMATH DE number 4148025 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4029438 (Why is no real title available?)
 
1987-01-01Paper
scientific article; zbMATH DE number 3948285 (Why is no real title available?)
 
1986-01-01Paper


Research outcomes over time


This page was built for person: Ed Dawson