Cryptographers' World
 

Ed Dawson


Author's Web Page Link

24 papers in database with 358 citations Star

Editor of 1 conference proceedings book

H-number: 13

Conference Proceedings

 
1. Ed DawsonSerge Vaudenay, editors, Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings. Springer, 2005. ISBN 3-540-28938-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Juan Manuel González Nieto,  Colin Boyd,  Ed Dawson,  A Public Key Cryptosystem Based On A Subgroup Membership Problem, Designs, Codes and Cryptography, Volume 36(3), pp. 301 - 316, Springer, 2005.

[Electronic Edition][Cited 16 times ]

2. Jovan Dj. Golic,  Mahmoud Salmasizadeh,  Ed Dawson,  Fast Correlation Attacks on the Summation Generator, Journal of Cryptology, Volume 13(2), pp. 245 - 262, Springer, 2000.

[Cited 18 times ]

3. He Jingmin,  Ed Dawson,  Shared Secret Reconstruction, Designs, Codes and Cryptography, Volume 14(3), pp. 221 - 237, Springer, 1998.

[Electronic Edition][Cited 2 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Hüseyin Hisil,  Kenneth Koon-Ho Wong,  Gary Carter,  Ed Dawson,  Twisted Edwards Curves Revisited, pp. 326 - 343, ASIACRYPT 2008.

[Electronic Edition][Cited 14 times ]

2. Muhammad Reza Z'aba,  HÃ¥vard Raddum,  Matthew Henricksen,  Ed Dawson,  Bit-Pattern Based Integral Attack, pp. 363 - 381, FSE 2008.

[Electronic Edition][Cited 11 times ]

3. Hüseyin Hisil,  Gary Carter,  Ed Dawson,  New Formulae for Efficient Elliptic Curve Arithmetic, pp. 138 - 151, INDOCRYPT 2007.

[Electronic Edition][Cited 13 times ]

4. Kun Peng,  Colin Boyd,  Ed Dawson,  Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing, pp. 84 - 98, MYCRYPT 2005.

[Electronic Edition][Cited 3 times ]

5. Matt Henricksen,  Ed Dawson,  Rekeying Issues in the MUGI Stream Cipher, pp. 175 - 188, SAC 2005.

[Electronic Edition][Cited 1 times ]

6. Kun Peng,  Colin Boyd,  Ed Dawson,  Simple and Efficient Shuffling with Provable Correctness and ZK Privacy, pp. 188 - 204, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 22 times ]

7. Kun Peng,  Riza Aditya,  Colin Boyd,  Ed Dawson,  Byoungcheon Lee,  Multiplicative Homomorphic E-Voting, pp. 61 - 72, INDOCRYPT 2004.

[Electronic Edition][Cited 15 times ]

8. Riza Aditya,  Kun Peng,  Colin Boyd,  Ed Dawson,  Byoungcheon Lee,  Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions, pp. 494 - 508, ACNS 2004.

[Electronic Edition][Cited 15 times ]

9. Kun Peng,  Colin Boyd,  Ed Dawson,  Kapalee Viswanathan,  A Correct, Private, and Efficient Mix Network, pp. 439 - 454, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

10. Kapalee Viswanathan,  Colin Boyd,  Ed Dawson,  An Analysis of Integrity Services in Protocols, pp. 175 - 187, INDOCRYPT 2001.

[Electronic Edition][Cited 1 times ]

11. Leonie Ruth Simpson,  Ed Dawson,  Jovan Dj. Golic,  William Millan,  LILI Keystream Generator, pp. 248 - 261, SAC 2000.

[Electronic Edition][Cited 45 times ]

12. L. Burnett,  Gary Carter,  Ed Dawson,  William Millan,  Efficient Methods for Generating MARS-Like S-Boxes, pp. 300 - 314, FSE 2000.

[Electronic Edition][Cited 12 times ]

13. Juan Manuel González Nieto,  DongGook Park,  Colin Boyd,  Ed Dawson,  Key Recovery in Third Generation Wireless Communication Systems, pp. 223 - 237, PKC 2000.

[Electronic Edition][Cited 5 times ]

14. David Wagner,  Leone Simpson,  Ed Dawson,  John Kelsey,  William Millan,  Bruce Schneier,  Cryptanalysis of ORYX, pp. 296 - 305, SAC 1998.

[Electronic Edition][Cited 24 times ]

15. William Millan,  Andrew J. Clark,  Ed Dawson,  Heuristic Design of Cryptographically Strong Balanced Boolean Functions, pp. 489 - 499, EUROCRYPT 1998.

[Electronic Edition][Cited 61 times Red Star]

16. Andrew J. Clark,  Jovan Dj. Golic,  Ed Dawson,  A Comparison of Fast Correlation Attacks, pp. 145 - 157, FSE 1996.

[Electronic Edition][Cited 19 times ]

17. Ed Dawson,  Cryptanalysis of Summation Generator, pp. 209 - 215, ASIACRYPT 1992.

[Electronic Edition][Cited 16 times ]

18. Bruce Goldburg,  Ed Dawson,  S. Sridharan,  A Secure Analog Speech Scrambler Using the Discrete Cosine Transform, pp. 299 - 311, ASIACRYPT 1991.

[Electronic Edition][No citation]

19. Bruce Goldburg,  Ed Dawson,  S. Sridharan,  The Automated Cryptanalysis of Analog Speech Scramblers, pp. 422 - 430, EUROCRYPT 1991.

[Electronic Edition][Cited 6 times ]

20. Helen Gustafson,  Ed Dawson,  William J. Caelli,  Comparison of Block Ciphers, pp. 208 - 220, ASIACRYPT 1990.

[Electronic Edition][Cited 15 times ]

21. Ed Dawson,  Bruce Goldburg,  Universal Logic Sequences, pp. 426 - 432, ASIACRYPT 1990.

[Electronic Edition][Cited 7 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...