Leonie Simpson
Leonie Simpson
Associate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIA
Verified email at
Cited by
Cited by
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
LILI keystream generator
L Ruth Simpson, E Dawson, JD Golić, WL Millan
Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 …, 2001
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
Continuous authentication for VANET
B Palaniswamy, S Camtepe, E Foo, L Simpson, MAR Baee, J Pieprzyk
Vehicular Communications 25, 100255, 2020
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
Broadcast authentication in latency-critical applications: On the efficiency of IEEE 1609.2
MAR Baee, L Simpson, E Foo, J Pieprzyk
IEEE Transactions on Vehicular Technology 68 (12), 11577-11587, 2019
Authentication strategies in vehicular communications: a taxonomy and framework
MA Rezazadeh Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
EURASIP Journal on Wireless Communications and Networking 2021 (1), 129, 2021
ALI: Anonymous lightweight inter-vehicle broadcast authentication with encryption
MAR Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
IEEE Transactions on Dependable and Secure Computing, 2022
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia
W Alkalabi, L Simpson, H Morarji
Proceedings of the 2021 Australasian Computer Science Week Multiconference, 1-8, 2021
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
The system can't perform the operation now. Try again later.
Articles 1–20