Simpson, Leonie (ed.); Rezazadeh Baee, Mir Ali (ed.) Information security and privacy. 28th Australasian conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023. Proceedings. (English) Zbl 1528.68035 Lecture Notes in Computer Science 13915. Cham: Springer (ISBN 978-3-031-35485-4/pbk; 978-3-031-35486-1/ebook). xiii, 652 p. (2023). MSC: 68-06 68M25 68P27 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{L. Simpson} (ed.) and \textit{M. A. Rezazadeh Baee} (ed.), Information security and privacy. 28th Australasian conference, ACISP 2023, Brisbane, QLD, Australia, July 5--7, 2023. Proceedings. Cham: Springer (2023; Zbl 1528.68035) Full Text: DOI
Beighton, Matthew; Bartlett, Harry; Simpson, Leonie; Wong, Kenneth Koon-Ho Algebraic attacks on grain-like keystream generators. (English) Zbl 07628052 Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 241-270 (2022). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{M. Beighton} et al., Lect. Notes Comput. Sci. 13218, 241--270 (2022; Zbl 07628052) Full Text: DOI
Wong, Kenneth Koon-Ho; Bartlett, Harry; Simpson, Leonie; Dawson, Ed Differential random fault attacks on certain CAESAR stream ciphers. (English) Zbl 1457.94194 Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 297-315 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{K. K. H. Wong} et al., Lect. Notes Comput. Sci. 11975, 297--315 (2020; Zbl 1457.94194) Full Text: DOI Link
Qahur Al Mahri, Hassan; Simpson, Leonie; Bartlett, Harry; Dawson, Ed; Wong, Kenneth Koon-Ho A fundamental flaw in the ++AE authenticated encryption mode. (English) Zbl 1391.94790 J. Math. Cryptol. 12, No. 1, 37-42 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{H. Qahur Al Mahri} et al., J. Math. Cryptol. 12, No. 1, 37--42 (2018; Zbl 1391.94790) Full Text: DOI Link
Qahur Al Mahri, Hassan; Simpson, Leonie; Bartlett, Harry; Dawson, Ed; Wong, Kenneth Koon-Ho Fault attacks on XEX mode with application to certain authenticated encryption modes. (English) Zbl 1386.94083 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 285-305 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Qahur Al Mahri} et al., Lect. Notes Comput. Sci. 10342, 285--305 (2017; Zbl 1386.94083) Full Text: DOI Link
Alhamdan, Ali; Bartlett, Harry; Dawson, Ed; Simpson, Leonie; Wong, Kenneth Koon-Ho Flaws in the initialisation process of stream ciphers. (English) Zbl 1382.94043 Daras, Nicholas J. (ed.) et al., Computation, cryptography, and network security. Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). 19-49 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Alhamdan} et al., in: Computation, cryptography, and network security. Cham: Springer. 19--49 (2015; Zbl 1382.94043) Full Text: DOI
Bartlett, Harry; Alhamdan, Ali; Simpson, Leonie; Dawson, Ed; Wong, Kenneth Weaknesses in the initialisation process of the common scrambling algorithm stream cipher. (English) Zbl 1355.94031 Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 220-233 (2014). MSC: 94A55 94A60 PDFBibTeX XMLCite \textit{H. Bartlett} et al., Lect. Notes Comput. Sci. 8865, 220--233 (2014; Zbl 1355.94031) Full Text: DOI
Al Mashrafi, Mufeed; Bartlett, Harry; Dawson, Ed; Simpson, Leonie; Wong, Kenneth Koon-Ho Indirect message injection for MAC generation. (English) Zbl 1283.94090 J. Math. Cryptol. 7, No. 3, 253-277 (2013). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{M. Al Mashrafi} et al., J. Math. Cryptol. 7, No. 3, 253--277 (2013; Zbl 1283.94090) Full Text: DOI Link
Boyd, Colin (ed.); Simpson, Leonie (ed.) Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. (English) Zbl 1264.94003 Lecture Notes in Computer Science 7959. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). xi, 437 p. (2013). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{C. Boyd} (ed.) and \textit{L. Simpson} (ed.), Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1--3, 2013. Proceedings. Berlin: Springer (2013; Zbl 1264.94003) Full Text: DOI
Bartlett, Harry; AlMashrafi, Mufeed; Simpson, Leonie; Dawson, Ed; Wong, Kenneth Koon-Ho A general model for MAC generation using direct injection. (English) Zbl 1311.94069 Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 198-215 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Bartlett} et al., Lect. Notes Comput. Sci. 7763, 198--215 (2013; Zbl 1311.94069) Full Text: DOI Link
Simpson, Leonie; Boztas, Serdar State cycles, initialization and the Trivium stream cipher. (English) Zbl 1285.94097 Cryptogr. Commun. 4, No. 3-4, 245-258 (2012). MSC: 94A60 94A55 PDFBibTeX XMLCite \textit{L. Simpson} and \textit{S. Boztas}, Cryptogr. Commun. 4, No. 3--4, 245--258 (2012; Zbl 1285.94097) Full Text: DOI
ALMashrafi, Mufeed; Bartlett, Harry; Simpson, Leonie; Dawson, Ed; Wong, Kenneth Koon-Ho Analysis of indirect message injection for MAC generation using stream ciphers. (English) Zbl 1305.94031 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 138-151 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. ALMashrafi} et al., Lect. Notes Comput. Sci. 7372, 138--151 (2012; Zbl 1305.94031) Full Text: DOI Link
Wen, Chuah Chai; Dawson, Edward; González Nieto, Juan Manuel; Simpson, Leonie A framework for security analysis of key derivation functions. (English) Zbl 1291.94166 Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 199-216 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{C. C. Wen} et al., Lect. Notes Comput. Sci. 7232, 199--216 (2012; Zbl 1291.94166) Full Text: DOI
Teo, Sui-Guan; Al-Hamdan, Ali; Bartlett, Harry; Simpson, Leonie; Wong, Kenneth Koon-Ho; Dawson, Ed State convergence in the initialisation of stream ciphers. (English) Zbl 1279.94118 Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 75-88 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{S.-G. Teo} et al., Lect. Notes Comput. Sci. 6812, 75--88 (2011; Zbl 1279.94118) Full Text: DOI
Z’aba, Muhammad Reza; Simpson, Leonie; Dawson, Ed; Wong, Kenneth Linearity within the SMS4 block cipher. (English) Zbl 1281.94064 Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 248-265 (2010). MSC: 94A60 94B25 PDFBibTeX XMLCite \textit{M. R. Z'aba} et al., Lect. Notes Comput. Sci. 6151, 248--265 (2010; Zbl 1281.94064) Full Text: DOI Link
Simpson, Leonie; Henricksen, Matt; Yap, Wun-She Improved cryptanalysis of the common scrambling algorithm stream cipher. (English) Zbl 1307.94098 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 108-121 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Simpson} et al., Lect. Notes Comput. Sci. 5594, 108--121 (2009; Zbl 1307.94098) Full Text: DOI Link
Donovan, Diane M.; Lefevre, James; Simpson, Leonie A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers. (English) Zbl 1158.94382 Balakrishnan, R. (ed.) et al., Proceedings of the international conference on discrete mathematics (ICDM 2006), Bangalore, India, December 15–18, 2006. Mysore: Ramanujan Mathematical Society (ISBN 978-81-902545-7-1/hbk). Ramanujan Mathematical Society Lecture Notes Series 7, 73-85 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{D. M. Donovan} et al., Ramanujan Math. Soc. Lect. Notes Ser. 7, 73--85 (2008; Zbl 1158.94382)
Al-Hinai, Sultan Zayid; Dawson, Ed; Henricksen, Matt; Simpson, Leonie On the security of the LILI family of stream ciphers against algebraic attacks. (English) Zbl 1213.94076 Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 11-28 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Z. Al-Hinai} et al., Lect. Notes Comput. Sci. 4586, 11--28 (2007; Zbl 1213.94076) Full Text: DOI Link
Simpson, Leonie; Henricksen, Matt Improved cryptanalysis of mag. (English) Zbl 1176.94060 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 64-75 (2006). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{L. Simpson} and \textit{M. Henricksen}, Lect. Notes Comput. Sci. 4058, 64--75 (2006; Zbl 1176.94060) Full Text: DOI
Chen, Kevin; Henricksen, Matt; Millan, William; Fuller, Joanne; Simpson, Leonie; Dawson, Ed; Lee, HoonJae; Moon, SangJae Dragon: A fast word based stream cipher. (English) Zbl 1133.68336 Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 33-50 (2005). MSC: 68P25 94A60 94A55 PDFBibTeX XMLCite \textit{K. Chen} et al., Lect. Notes Comput. Sci. 3506, 33--50 (2005; Zbl 1133.68336) Full Text: DOI
Chen, K.; Simpson, L.; Henricksen, M.; Millan, W.; Dawson, E. A complete divide and conquer attack on the Alpha1 stream cipher. (English) Zbl 1092.94502 Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 418-431 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Chen} et al., Lect. Notes Comput. Sci. 2971, 418--431 (2004; Zbl 1092.94502) Full Text: DOI
Dawson, Ed; Simpson, Leonie Analysis and design issues for synchronous stream ciphers. (English) Zbl 1029.94024 Niederreiter, Harald (ed.), Coding theory and cryptology. River Edge, NJ: World Scientific. Lect. Notes Ser., Inst. Math. Sci., Natl. Univ. Singap. 1, 49-90 (2002). MSC: 94A60 68P25 94-02 PDFBibTeX XMLCite \textit{E. Dawson} and \textit{L. Simpson}, Lect. Notes Ser., Inst. Math. Sci., Natl. Univ. Singap. 1, 49--90 (2002; Zbl 1029.94024)
Clark, A.; Dawson, Ed; Fuller, J.; Golić, J.; Lee, H.-J.; Millan, William; Moon, S.-J.; Simpson, L. The LILI-II keystream generator. (English) Zbl 1020.94514 Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 25-39 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Clark} et al., Lect. Notes Comput. Sci. 2384, 25--39 (2002; Zbl 1020.94514) Full Text: Link
Gustafson, H. M.; Simpson, L. R.; Golić, J. Dj. Analysis of a measure of correlation between two binary strings of different lengths. (English) Zbl 1019.94013 Australas. J. Comb. 25, 185-199 (2002). MSC: 94A60 62H20 94A55 PDFBibTeX XMLCite \textit{H. M. Gustafson} et al., Australas. J. Comb. 25, 185--199 (2002; Zbl 1019.94013)
Simpson, Leonie Ruth; Dawson, E.; Golic, Jovan Dj.; Millan, William L. LILI keystream generator. (English) Zbl 0981.94505 Stinson, Douglas R. (ed.) et al., Selected areas in cryptography. 7th annual international workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2012, 248-261 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{L. R. Simpson} et al., Lect. Notes Comput. Sci. 2012, 248--261 (2001; Zbl 0981.94505) Full Text: Link
Dawson, Ed; Simpson, Leonie; Golić, Jovan A survey of divide and conquer attacks on certain irregularly clocked stream ciphers. (English) Zbl 1003.94520 Lam, Kwok-Yan (ed.) et al., Cryptography and computational number theory. Proceedings of the workshop, CCNT’99, Singapore, November 22-26, 1999. Basel: Birkhäuser. Prog. Comput. Sci. Appl. Log. 20, 165-185 (2001). MSC: 94A55 94A60 PDFBibTeX XMLCite \textit{E. Dawson} et al., Prog. Comput. Sci. Appl. Log. 20, 165--185 (2001; Zbl 1003.94520)
Dawson, Edward; Millan, William; Simpson, Leonie Designing Boolean functions for cryptographic applications. (English) Zbl 0987.94034 Dorninger, D. (ed.) et al., Contributions to general algebra 12. Proceedings of the 58th workshop on general algebra “58. Arbeitstagung Allgemeine Algebra”, Vienna, Austria, June 3-6, 1999. Klagenfurt: Verlag Johannes Heyn. 1-21 (2000). Reviewer: Kim Hang Kim (Montgomery) MSC: 94A60 06E30 94C10 PDFBibTeX XMLCite \textit{E. Dawson} et al., Contrib. Gen. Algebra 12, 1--21 (2000; Zbl 0987.94034)
Wagner, D.; Simpson, L.; Dawson, E.; Kelsey, J.; Millan, W.; Schneier, B. Cryptanalysis of ORYX. (English) Zbl 0929.94021 Tavares, Stafford (ed.) et al., Selected areas in cryptography. 5th annual international workshop, SAC ’98. Kingston, Ontario, Canada, August 17–18, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1556, 296-305 (1999). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Wagner} et al., Lect. Notes Comput. Sci. 1556, 296--305 (1999; Zbl 0929.94021)
Simpson, L.; Golić, J. Dj; Dawson, E. A probabilistic correlation attack on the shrinking generator. (English) Zbl 0931.94039 Boyd, Colin (ed.) et al., Information security and privacy. 3rd Australasian conference, ACISP ’98, Brisbane, Australia, July 13–15, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1438, 147-158 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{L. Simpson} et al., Lect. Notes Comput. Sci. 1438, 147--158 (1998; Zbl 0931.94039)
Golić, J. Dj.; Salmasizadeh, M.; Simpson, L.; Dawson, E. Fast correlation attacks on nonlinear filter generators. (English) Zbl 1336.94049 Inf. Process. Lett. 64, No. 1, 37-42 (1997). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Dj. Golić} et al., Inf. Process. Lett. 64, No. 1, 37--42 (1997; Zbl 1336.94049) Full Text: DOI
Salmasizadeh, M.; Simpson, L.; Golić, J. Dj.; Dawson, E. Fast correlation attacks and multiple linear approximations. (English) Zbl 0990.94513 Varadharajan, Vijay (ed.) et al., Information security and privacy. 2nd Australasian conference, ACISP ’97. Sidney, NSW, Australia. July 7-9, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1270, 228-239 (1997). MSC: 94A60 62H20 PDFBibTeX XMLCite \textit{M. Salmasizadeh} et al., Lect. Notes Comput. Sci. 1270, 228--239 (1997; Zbl 0990.94513)