Leonie Simpson
Leonie Simpson
Senior Lecturer, Science and Engineering Faculty, Queensland University of Technology
Verified email at qut.edu.au
Title
Cited by
Cited by
Year
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
International Conference on Information Security and Cryptology, 33-50, 2004
782004
LILI keystream generator
LR Simpson, E Dawson, JD Golić, WL Millan
International Workshop on Selected Areas in Cryptography, 248-261, 2000
742000
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
642000
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
612002
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
592013
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Australasian Conference on Information Security and Privacy, 147-158, 1998
551998
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
International Workshop on Selected Areas in Cryptography, 296-305, 1998
391998
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
322016
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
302002
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
222016
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
162000
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
IFIP International Information Security Conference, 125-138, 2013
152013
On the security of the LILI family of stream ciphers against algebraic attacks
SZ Al-Hinai, E Dawson, M Henricksen, L Simpson
Australasian Conference on Information Security and Privacy, 11-28, 2007
142007
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Australasian Conference on Information Security and Privacy, 108-121, 2009
122009
Fast correlation attacks and multiple linear approximations
M Salmasizadeh, L Simpson, JD Golić, E Dawson
Australasian Conference on Information Security and Privacy, 228-239, 1997
121997
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
111997
Algebraic analysis of Trivium-like ciphers
SG Teo, KKH Wong, H Bartlett, L Simpson, E Dawson
102013
Analysis of indirect message injection for mac generation using stream ciphers
M AlMashrafi, H Bartlett, L Simpson, E Dawson, KKH Wong
Australasian Conference on Information Security and Privacy, 138-151, 2012
102012
The LILI-128 keystream generator
A Clark
NESSIE project submission, 2000
102000
A framework for security analysis of key derivation functions
CC Wen, E Dawson, JMG Nieto, L Simpson
International Conference on Information Security Practice and Experience …, 2012
92012
The system can't perform the operation now. Try again later.
Articles 1–20