Follow
Leonie Simpson
Leonie Simpson
Senior Lecturer, Science and Engineering Faculty, Queensland University of Technology
Verified email at qut.edu.au
Title
Cited by
Cited by
Year
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
International conference on information security and cryptology, 33-50, 2004
812004
LILI keystream generator
LR Simpson, E Dawson, JD Golić, WL Millan
International Workshop on Selected Areas in Cryptography, 248-261, 2000
772000
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE workshop, 2000
762000
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
722013
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
572002
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Australasian Conference on Information Security and Privacy, 147-158, 1998
541998
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
International Workshop on Selected Areas in Cryptography, 296-305, 1998
391998
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
332016
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
312002
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
202016
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
IFIP International Information Security Conference, 125-138, 2013
192013
Continuous authentication for VANET
B Palaniswamy, S Camtepe, E Foo, L Simpson, MAR Baee, J Pieprzyk
Vehicular Communications 25, 100255, 2020
152020
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Australasian Conference on Information Security and Privacy, 108-121, 2009
152009
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
152000
On the security of the LILI family of stream ciphers against algebraic attacks
SZ Al-Hinai, E Dawson, M Henricksen, L Simpson
Australasian Conference on Information Security and Privacy, 11-28, 2007
142007
Fast correlation attacks and multiple linear approximations
M Salmasizadeh, L Simpson, JD Golić, E Dawson
Australasian Conference on Information Security and Privacy, 228-239, 1997
141997
Broadcast authentication in latency-critical applications: On the efficiency of IEEE 1609.2
MAR Baee, L Simpson, E Foo, J Pieprzyk
IEEE Transactions on Vehicular Technology 68 (12), 11577-11587, 2019
122019
Algebraic analysis of Trivium-like ciphers
SG Teo, KKH Wong, H Bartlett, L Simpson, E Dawson
Cryptology ePrint Archive, 2013
122013
Authentication strategies in vehicular communications: a taxonomy and framework
MA Rezazadeh Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
EURASIP Journal on Wireless Communications and Networking 2021 (1), 1-50, 2021
112021
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
111997
The system can't perform the operation now. Try again later.
Articles 1–20