Twisted Edwards curves revisited H Hisil, KKH Wong, G Carter, E Dawson International Conference on the Theory and Application of Cryptology and …, 2008 | 312 | 2008 |
Multistage secret sharing based on one-way function J He, E Dawson Electronics Letters 30 (19), 1591-1592, 1994 | 277 | 1994 |
Providing receipt-freeness in mixnet-based voting protocols B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004 | 200 | 2004 |
Heuristic design of cryptographically strong balanced Boolean functions W Millan, A Clark, E Dawson Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998 | 200 | 1998 |
Secure key issuing in ID-based cryptography B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo Proceedings of the second workshop on Australasian information security …, 2004 | 191 | 2004 |
Multisecret-sharing scheme based on one-way function J He, E Dawson Electronics Letters 31 (2), 93-95, 1995 | 170 | 1995 |
A novel identity-based strong designated verifier signature scheme B Kang, C Boyd, ED Dawson Journal of Systems and Software 82 (2), 270-273, 2009 | 140 | 2009 |
PKI, elliptic curve cryptography, and digital signatures WJ Caelli, EP Dawson, SA Rea Computers & Security 18 (1), 47-66, 1999 | 139 | 1999 |
SKMA-A key management architecture for SCADA systems R Dawson, C Boyd, E Dawson, J Gonzalez Nieto ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006 | 129 | 2006 |
A computer package for measuring the strength of encryption algorithms H Gustafson, E Dawson, L Nielsen, W Caelli Computers & Security 13 (8), 687-697, 1994 | 126 | 1994 |
Evolutionary heuristics for finding cryptographically strong S-boxes W Millan, L Burnett, G Carter, A Clark, E Dawson Information and Communication Security: Second International Conference …, 1999 | 119 | 1999 |
An effective genetic algorithm for finding highly nonlinear Boolean functions W Millan, A Clark, E Dawson Information and Communications Security: First International Conference …, 1997 | 119 | 1997 |
Smart hill climbing finds better boolean functions W Millan, A Clark, E Dawson Workshop on Selected Areas in Cryptology 63, 1997 | 111 | 1997 |
The breadth of Shamir's secret-sharing scheme E Dawson, D Donovan Computers & Security 13 (1), 69-78, 1994 | 105 | 1994 |
Bit-pattern based integral attack M Z’aba, H Raddum, M Henricksen, E Dawson Fast Software Encryption, 363-381, 2008 | 100 | 2008 |
Fast Fourier transform based speech encryption system S Sridharan, E Dawson, B Goldburg IEE Proceedings I-Communications, Speech and Vision 3 (138), 215-223, 1991 | 98 | 1991 |
Design and cryptanalysis of transform-based analog speech scramblers B Goldburg, S Sridharan, E Dawson IEEE Journal on Selected areas in Communications 11 (5), 735-744, 1993 | 96 | 1993 |
Towards secure and legal e-tendering M Betts, P Black, S Christensen, E Dawson, R Du, B Duncan, E Foo, ... Journal of Information Technology in Construction 11 (e-Commerce in …, 2006 | 90 | 2006 |
The LILI-128 keystream generator E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson Proceedings of first NESSIE Workshop, 2000 | 86 | 2000 |
Dragon: A fast word based stream cipher K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ... Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 85 | 2005 |