Leonie Simpson
Leonie Simpson
Senior Lecturer, Science and Engineering Faculty, Queensland University of Technology
Verified email at qut.edu.au
TitleCited byYear
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
International Conference on Information Security and Cryptology, 33-50, 2004
732004
LILI keystream generator
LR Simpson, E Dawson, JD Golić, WL Millan
International Workshop on Selected Areas in Cryptography, 248-261, 2000
662000
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
592000
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
542002
A probabilistic correlation attack on the shrinking generator
L Simpson, JD Golić, E Dawson
Australasian Conference on Information Security and Privacy, 147-158, 1998
521998
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
462013
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
International Workshop on Selected Areas in Cryptography, 296-305, 1998
401998
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
302002
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
192016
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 36, 2016
152016
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
142000
On the security of the LILI family of stream ciphers against algebraic attacks
SZ Al-Hinai, E Dawson, M Henricksen, L Simpson
Australasian Conference on Information Security and Privacy, 11-28, 2007
132007
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Australasian Conference on Information Security and Privacy, 108-121, 2009
112009
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
111997
Fast correlation attacks and multiple linear approximations
M Salmasizadeh, L Simpson, JD Golić, E Dawson
Australasian Conference on Information Security and Privacy, 228-239, 1997
111997
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
IFIP International Information Security Conference, 125-138, 2013
102013
The LILI-128 keystream generator
A Clark
NESSIE project submission, 2000
102000
Divide and conquer attacks on shift register based stream ciphers
LR Simpson
Queensland University of Technology, 2000
92000
Algebraic analysis of Trivium-like ciphers (poster)
SG Teo, KKH Wong, H Bartlett, L Simpson, E Dawson
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
82014
Analysis of indirect message injection for MAC generation using stream ciphers
M ALMashrafi, H Bartlett, L Simpson, E Dawson, KKH Wong
Australasian Conference on Information Security and Privacy, 138-151, 2012
82012
The system can't perform the operation now. Try again later.
Articles 1–20