William Millan
According to our database1,
William Millan
authored at least 31 papers
between 1995 and 2006.
Collaborative distances:
Collaborative distances:
Timeline
1996
1998
2000
2002
2004
2006
0
1
2
3
4
5
6
7
8
4
3
1
1
1
4
3
3
2
2
4
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
IEICE Electron. Express, 2004
Comput. Intell., 2004
Simpler methods for generating better Boolean functions with good cryptographic properties.
Australas. J Comb., 2004
Proceedings of the Information Security and Cryptology, 2004
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE).
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Perspectives on Word Based Stream Ciphers.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Cryptanalysis of the alleged CAVE algorithm.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1995
Proceedings of the Cryptography: Policy and Algorithms, 1995