dblp.uni-trier.dewww.dagstuhl.dewww.uni-trier.de

Ed Dawson (Selection)

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo


118Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPraveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan: Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ACISP 2006: 407-420
100Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam Millan, Ed Dawson: LILI-II is not Broken. IACR Cryptology ePrint Archive 2005: 234 (2005)
98Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPraveen Gauravaram, William Millan, Juanma González Nieto, Ed Dawson: 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function. IACR Cryptology ePrint Archive 2005: 390 (2005)
97Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoanne Fuller, William Millan, Ed Dawson: Multi-objective Optimisation of Bijective S-Boxes. New Generation Comput. 23(3): 201-218 (2005)
88Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon: Dragon: A Fast Word Based Stream Cipher. ICISC 2004: 33-50
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam Millan, Joanne Fuller, Ed Dawson: New Concepts in Evolutionary Search for Boolean Functions in Cryptology. Computational Intelligence 20(3): 463-474 (2004)
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson: A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. ICISC 2003: 418-431
69Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson: Strengthening the Key Schedule of the AES. ACISP 2002: 226-240
68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson: The LILI-II Keystream Generator. ACISP 2002: 25-39
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLL. Burnett, Gary Carter, Ed Dawson, William Millan: Efficient Methods for Generating MARS-Like S-Boxes. FSE 2000: 300-314
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLeonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan: LILI Keystream Generator. Selected Areas in Cryptography 2000: 248-261
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam Millan, Andrew Clark, Ed Dawson: Boolean Function Design Using Hill Climbing Methods. ACISP 1999: 1-11
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson: Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. ICICS 1999: 263-274
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam Millan, Andrew Clark, Ed Dawson: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. EUROCRYPT 1998: 489-499
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier: Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam Millan, Ed Dawson: On the Security of Self-Synchronous Ciphers. ACISP 1997: 159-170
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam Millan, Andrew Clark, Ed Dawson: An effective genetic algorithm for finding highly nonlinear Boolean Functions. ICICS 1997: 149-158

Selection of 17 from 154 records - Ed Dawson has 99 coauthors

Last update 2012-09-10 CET by the DBLP TeamThis material is Open Data Content released under the ODC-BY 1.0 license — See also our legal information page