What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ed Dawson
Google Scholar
ORCID:
0000-0002-1932-1061
81
publications in security and cryptology related venues
Year
Venue
Title
2019
conf/icisc
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers.
Kenneth Koon-Ho Wong
Harry Bartlett
Leonie Simpson
Ed Dawson
2017
conf/acisp
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes.
Hassan Qahur Al Mahri
Leonie Simpson
Harry Bartlett
Ed Dawson
Kenneth Koon-Ho Wong
2015
conf/acisp
BP-XACML an Authorisation Policy Language for Business Processes.
Khalid Alissa
Jason Reid
Ed Dawson
Farzad Salim
2013
journals/compsec
Budget-aware Role Based Access Control.
Farzad Salim
Jason Reid
Uwe Dulleck
Ed Dawson
2013
conf/sec
Key Derivation Function: The SCKDF Scheme.
Chuah Chai Wen
Ed Dawson
Leonie Simpson
2012
conf/acisp
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers.
Mufeed Juma AlMashrafi
Harry Bartlett
Leonie Simpson
Ed Dawson
Kenneth Koon-Ho Wong
2011
conf/acisp
State Convergence in the Initialisation of Stream Ciphers.
Sui-Guan Teo
Ali Al-Hamdan
Harry Bartlett
Leonie Simpson
Kenneth Koon-Ho Wong
Ed Dawson
2010
journals/compsec
On a taxonomy of delegation.
Quan Pham
Jason Reid
Adrian McCullagh
Ed Dawson
2009
conf/sec
On a Taxonomy of Delegation.
Quan Pham
Jason Reid
Adrian McCullagh
Ed Dawson
2009
conf/acisp
Jacobi Quartic Curves Revisited.
Hüseyin Hisil
Kenneth Koon-Ho Wong
Gary Carter
Ed Dawson
2008
conf/fse
Bit-Pattern Based Integral Attack.
Muhammad Reza Z'aba
Håvard Raddum
Matthew Henricksen
Ed Dawson
2008
conf/asiacrypt
Twisted Edwards Curves Revisited.
Hüseyin Hisil
Kenneth Koon-Ho Wong
Gary Carter
Ed Dawson
2007
conf/acisp
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.
Sultan Al-Hinai
Ed Dawson
Matthew Henricksen
Leonie Ruth Simpson
2006
conf/sec
Sealed-Bid Micro Auctions.
Kun Peng
Colin Boyd
Ed Dawson
2006
conf/acisp
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond.
Matthew Henricksen
Ed Dawson
2006
conf/acisp
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction.
Praveen Gauravaram
William Millan
Ed Dawson
Kapali Viswanathan
2006
conf/acisp
A Novel Range Test.
Kun Peng
Colin Boyd
Ed Dawson
Eiji Okamoto
2006
conf/icisc
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.
Kun Peng
Juan Manuel González Nieto
Yvo Desmedt
Ed Dawson
2005
conf/acisp
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents.
Ming Yao
Kun Peng
Ed Dawson
2005
conf/crypto
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.
Kun Peng
Colin Boyd
Ed Dawson
2005
conf/icics
Ciphertext Comparison, a New Solution to the Millionaire Problem.
Kun Peng
Colin Boyd
Ed Dawson
Byoungcheon Lee
2005
conf/sacrypt
Rekeying Issues in the MUGI Stream Cipher.
Matthew Henricksen
Ed Dawson
2005
conf/cans
A Novel Method to Maintain Privacy in Mobile Agent Applications.
Kun Peng
Ed Dawson
Juanma González Nieto
Eiji Okamoto
Javier López
2004
conf/acisp
A Mobile Agent System Providing Offer Privacy.
Ming Yao
Matthew Henricksen
Greg Maitland
Ernest Foo
Ed Dawson
2004
conf/acns
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Riza Aditya
Kun Peng
Colin Boyd
Ed Dawson
Byoungcheon Lee
2004
conf/icisc
An Efficient and Verifiable Solution to the Millionaire Problem.
Kun Peng
Colin Boyd
Ed Dawson
Byoungcheon Lee
2004
conf/icisc
Dragon: A Fast Word Based Stream Cipher.
Kevin Chen
Matthew Henricksen
William Millan
Joanne Fuller
Leonie Ruth Simpson
Ed Dawson
Hoon-Jae Lee
Sang-Jae Moon
2004
conf/pkc
A Correct, Private, and Efficient Mix Network.
Kun Peng
Colin Boyd
Ed Dawson
Kapalee Viswanathan
2003
conf/acisp
The Security of Fixed versus Random Elliptic Curves in Cryptography.
Yvonne Hitchcock
Paul Montague
Gary Carter
Ed Dawson
2003
conf/icisc
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher.
Kevin Chen
Leonie Ruth Simpson
Matthew Henricksen
William Millan
Ed Dawson
2003
conf/icisc
Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
Byoungcheon Lee
Colin Boyd
Ed Dawson
Kwangjo Kim
Jeongmo Yang
Seungjae Yoo
2003
conf/wisa
An Improved Forward Integrity Protocol for Mobile Agents.
Ming Yao
Ernest Foo
Kun Peng
Ed Dawson
2003
conf/wisa
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.
Kun Peng
Colin Boyd
Ed Dawson
Kapalee Viswanathan
2002
journals/compsec
Hybrid Key Escrow: A New Paradigm.
Kapali Viswanathan
Colin Boyd
Ed Dawson
2002
conf/acisp
Strengthening the Key Schedule of the AES.
Lauren May
Matthew Henricksen
William Millan
Gary Carter
Ed Dawson
2002
conf/acisp
Modelling Trust Structures for Public Key Infrastructures.
Marie Henderson
Robert S. Coulter
Ed Dawson
Eiji Okamoto
2002
conf/acisp
The LILI-II Keystream Generator.
Andrew J. Clark
Ed Dawson
Joanne Fuller
Jovan Dj. Golic
Hoon-Jae Lee
William Millan
Sang-Jae Moon
Leonie Simpson
2002
conf/icisc
Non-interactive Auction Schemewith Strong Privacy.
Kun Peng
Colin Boyd
Ed Dawson
Kapali Viswanathan
2002
conf/icics
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
Kun Peng
Colin Boyd
Ed Dawson
Kapali Viswanathan
2001
conf/acisp
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.
DongGook Park
JungJoon Kim
Colin Boyd
Ed Dawson
2001
conf/icics
A Public Key Cryptosystem Based on the Subgroup Membership Problem.
Juan Manuel González Nieto
Colin Boyd
Ed Dawson
2000
journals/joc
Fast Correlation Attacks on the Summation Generator.
Jovan Dj. Golic
Mahmoud Salmasizadeh
Ed Dawson
2000
conf/fse
Efficient Methods for Generating MARS-Like S-Boxes.
L. Burnett
Gary Carter
Ed Dawson
William Millan
2000
conf/acisp
A Three Phased Schema for Sealed Bid Auction System Design.
Kapali Viswanathan
Colin Boyd
Ed Dawson
2000
conf/acisp
Key Recovery System for the Commercial Environment.
Juanma González Nieto
Kapali Viswanathan
Colin Boyd
Ed Dawson
2000
conf/icisc
Micropayments for Wireless Communications.
DongGook Park
Colin Boyd
Ed Dawson
2000
conf/pkc
Key Recovery in Third Generation Wireless Communication Systems.
Juanma González Nieto
DongGook Park
Colin Boyd
Ed Dawson
2000
conf/sacrypt
LILI Keystream Generator.
Leonie Ruth Simpson
Ed Dawson
Jovan Dj. Golic
William Millan
1999
journals/compsec
PKI, elliptic curve cryptography, and digital signatures.
William J. Caelli
Ed Dawson
Scott A. Rea
1999
conf/acisp
Boolean Function Design Using Hill Climbing Methods.
William Millan
Andrew J. Clark
Ed Dawson
1999
conf/acisp
Publicly Verifiable Key Escrow with Limited Time Span.
Kapali Viswanathan
Colin Boyd
Ed Dawson
1999
conf/acisp
Inversion Attack and Branching.
Jovan Dj. Golic
Andrew J. Clark
Ed Dawson
1999
conf/icisc
Secure Selection Protocols.
Kapali Viswanathan
Colin Boyd
Ed Dawson
1999
conf/icics
Signature Scheme for Controlled Environments.
Kapali Viswanathan
Colin Boyd
Ed Dawson
1999
conf/icics
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.
William Millan
L. Burnett
Gary Carter
Andrew J. Clark
Ed Dawson
1998
journals/compsec
A Method for Measuring Entropy of Symmetric Cipher Key Generators.
Ed Dawson
Helen Gustafson
1998
conf/acisp
Key Schedules of Iterative Block Ciphers.
Gary Carter
Ed Dawson
Lauren Nielsen
1998
conf/acisp
A Probabilistic Correlation Attack on the Shrinking Generator.
Leonie Simpson
Jovan Dj. Golic
Ed Dawson
1998
conf/icisc
A security architecture for third generation wireless systems.
Gary Gaskell
Mark Looi
Ed Dawson
Colin Boyd
Selwyn Russell
1998
conf/eurocrypt
Heuristic Design of Cryptographically Strong Balanced Boolean Functions.
William Millan
Andrew J. Clark
Ed Dawson
1998
conf/sacrypt
Cryptanalysis of ORYX.
David A. Wagner
Leonie Simpson
Ed Dawson
John Kelsey
William Millan
Bruce Schneier
1997
conf/sec
A taxonomy of electronic cash schemes.
Ernest Foo
Colin Boyd
William J. Caelli
Ed Dawson
1997
conf/acisp
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes.
Jen Lim
Colin Boyd
Ed Dawson
1997
conf/acisp
On the Security of Self-Synchronous Ciphers.
William Millan
Ed Dawson
1997
conf/acisp
Fast Correlation Attacks and Multiple Linear Approximations.
M. Salmasidazeh
Leonie Simpson
Jovan Dj. Golic
Ed Dawson
1997
conf/icics
An effective genetic algorithm for finding highly nonlinear Boolean Functions.
William Millan
Andrew J. Clark
Ed Dawson
1997
conf/icics
Construction of correlation immune Boolean functions.
Ed Dawson
Chuan-Kun Wu
1996
conf/fse
A Comparison of Fast Correlation Attacks.
Andrew J. Clark
Jovan Dj. Golic
Ed Dawson
1996
conf/sec
On the reconstruction of shared secrets.
He Jingmin
Ed Dawson
1996
conf/acisp
On construction of resilient functions.
Chuan-Kun Wu
Ed Dawson
1996
conf/acisp
Another approach to software key escrow encryption.
Ed Dawson
He Jingmin
1994
journals/compsec
The breadth of Shamir's secret-sharing scheme.
Ed Dawson
Diane M. Donovan
1994
journals/compsec
A computer package for measuring the strength of encryption algorithms.
Helen Gustafson
Ed Dawson
Lauren Nielsen
William J. Caelli
1993
journals/compsec
Message collision in block ciphers with message authentication.
Caroline Allinson
Helen Bergen
Ed Dawson
1993
conf/sec
Shamir's Scheme Says It all.
Ed Dawson
Diane M. Donovan
1992
conf/sec
Measuring the Strength of Ciphers.
Helen Gustafson
Ed Dawson
Lauren Nielsen
William J. Caelli
1992
conf/asiacrypt
Cryptanalysis of Summation Generator.
Ed Dawson
1991
conf/eurocrypt
The Automated Cryptanalysis of Analog Speech Scramblers.
Bruce Goldburg
Ed Dawson
S. Sridharan
1991
conf/asiacrypt
A Secure Analog Speech Scrambler Using the Discrete Cosine Transform.
Bruce Goldburg
Ed Dawson
S. Sridharan
1990
conf/asiacrypt
Universal Logic Sequences.
Ed Dawson
Bruce Goldburg
1990
conf/asiacrypt
Comparison of Block Ciphers.
Helen Gustafson
Ed Dawson
William J. Caelli
Coauthors
Adrian McCullagh
(2)
Ali Al-Hamdan
(1)
Andrew J. Clark
(7)
Bruce Goldburg
(3)
Bruce Schneier
(1)
Byoungcheon Lee
(4)
Caroline Allinson
(1)
Chuah Chai Wen
(1)
Chuan-Kun Wu
(2)
Colin Boyd
(24)
David A. Wagner
(1)
Diane M. Donovan
(2)
DongGook Park
(3)
Ed Dawson
(81)
Eiji Okamoto
(3)
Ernest Foo
(3)
Farzad Salim
(2)
Gary Carter
(7)
Gary Gaskell
(1)
Greg Maitland
(1)
Harry Bartlett
(4)
Hassan Qahur Al Mahri
(1)
Håvard Raddum
(1)
He Jingmin
(2)
Helen Bergen
(1)
Helen Gustafson
(4)
Hoon-Jae Lee
(2)
Hüseyin Hisil
(2)
Jason Reid
(4)
Javier López
(1)
Jen Lim
(1)
Jeongmo Yang
(1)
Joanne Fuller
(2)
John Kelsey
(1)
Jovan Dj. Golic
(7)
Juan Manuel González Nieto
(2)
Juanma González Nieto
(3)
JungJoon Kim
(1)
Kapalee Viswanathan
(2)
Kapali Viswanathan
(9)
Kenneth Koon-Ho Wong
(6)
Kevin Chen
(2)
Khalid Alissa
(1)
Kun Peng
(14)
Kwangjo Kim
(1)
L. Burnett
(2)
Lauren May
(1)
Lauren Nielsen
(3)
Leonie Ruth Simpson
(4)
Leonie Simpson
(9)
M. Salmasidazeh
(1)
Mahmoud Salmasizadeh
(1)
Marie Henderson
(1)
Mark Looi
(1)
Matthew Henricksen
(8)
Ming Yao
(3)
Mufeed Juma AlMashrafi
(1)
Muhammad Reza Z'aba
(1)
Paul Montague
(1)
Praveen Gauravaram
(1)
Quan Pham
(2)
Riza Aditya
(1)
Robert S. Coulter
(1)
S. Sridharan
(2)
Sang-Jae Moon
(2)
Scott A. Rea
(1)
Selwyn Russell
(1)
Seungjae Yoo
(1)
Sui-Guan Teo
(1)
Sultan Al-Hinai
(1)
Uwe Dulleck
(1)
William J. Caelli
(5)
William Millan
(13)
Yvo Desmedt
(1)
Yvonne Hitchcock
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to