Ed Dawson
Orcid: 0000-0002-1932-1061Affiliations:
- Queensland University of Technology, School of Mathematics, Brisbane, Australia
According to our database1,
Ed Dawson
authored at least 202 papers
between 1990 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2020
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material).
IACR Cryptol. ePrint Arch., 2020
2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
J. Math. Cryptol., 2018
Int. J. Crit. Infrastructure Prot., 2018
Int. J. Bus. Process. Integr. Manag., 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function.
Proceedings of the Information Science and Applications 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Australasian Computer Science Week Multiconference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 13th Australasian Information Security Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Eleventh Australasian Information Security Conference, 2013
2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
Int. J. Inf. Sec., 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
ISC Int. J. Inf. Secur., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
2009
J. Syst. Softw., 2009
Identity-based strong designated verifier signature schemes: Attacks and new construction.
Comput. Electr. Eng., 2009
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Comput. Electr. Eng., 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Seventh Australasian Information Security Conference, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Electronic Government, 6th International Conference, 2007
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
The legal and practical implications of recent attacks on 128-bit cryptographic hash functions.
First Monday, 2006
Comput. Commun., 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function.
IACR Cryptol. ePrint Arch., 2005
Des. Codes Cryptogr., 2005
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption.
Comput. Syst. Sci. Eng., 2005
Comput. Stand. Interfaces, 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.
Proceedings of the Progress in Cryptology, 2005
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Theor. Comput. Sci., 2004
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.
Int. J. Inf. Sec., 2004
Comput. Intell., 2004
Simpler methods for generating better Boolean functions with good cryptographic properties.
Australas. J Comb., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Improvements to the RAK Factoring Algorithm.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Implementation of the GBD Cryptosystem.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Comput. Commun., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Electronic Government, Second International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
IEEE Trans. Computers, 2000
Future Gener. Comput. Syst., 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Inversion Attack and Branching.
Aust. Comput. J., 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Comput. Secur., 1998
A security architecture for third generation wireless systems.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Stat. Comput., 1997
A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher.
Cryptologia, 1997
A taxonomy of electronic cash schemes.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
On the reconstruction of shared secrets.
Proceedings of the Information Systems Security, 1996
Proceedings of the Fast Software Encryption, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
Comput. Secur., 1994
1993
IEEE J. Sel. Areas Commun., 1993
Shamir's Scheme Says It all.
Proceedings of the Computer Security, 1993
1992
Measuring the Strength of Ciphers.
Proceedings of the IT Security: The Need for International Cooperation, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the 1990 International Conference on Acoustics, 1990