Ed Dawson
Queensland University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ed Dawson.
international conference on the theory and application of cryptology and information security | 2008
Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a wide range of applications. Notably, the new addition algorithm uses
international conference on information security and cryptology | 2003
Byoungcheon Lee; Colin Boyd; Ed Dawson; Kwangjo Kim; Jeongmo Yang; Seung-Jae Yoo
8\mathrm{\textbf{M}}
theory and application of cryptographic techniques | 1998
William Millan; Andrew J. Clark; Ed Dawson
for suitably selected curve constants. In comparison, the fastest point addition algorithms for (twisted) Edwards curves stated in the literature use
Computers & Security | 1994
Helen Gustafson; Ed Dawson; Lauren Nielsen; William J. Caelli
9\mathrm{\textbf{M}} + 1\mathrm{\textbf{S}}
australasian conference on information security and privacy | 2002
Andrew J. Clark; Ed Dawson; Joanne Fuller; Jovan Dj. Golic; Hoon Jae Lee; William Millan; SangJae Moon; Leonie Simpson
. It is also shown that the new addition algorithm can be implemented with four processors dropping the effective cost to
fast software encryption | 2008
Muhammad Reza Z'aba; Håvard Raddum; Matthew Henricksen; Ed Dawson
2\mathrm{\textbf{M}}
IEEE Journal on Selected Areas in Communications | 1993
B. Goldburg; Sridha Sridharan; Ed Dawson
. This implies an effective speed increase by the full factor of 4 over the sequential case. Our results allow faster implementation of elliptic curve scalar multiplication. In addition, the new point addition algorithm can be used to provide a natural protection from side channel attacks based on simple power analysis (SPA).
international conference on information and communication security | 1999
William Millan; Linda Burnett; Gary Carter; Andrew J. Clark; Ed Dawson
It had been thought that it is difficult to provide receipt-freeness in mixnet-based electronic voting schemes. Any kind of user chosen randomness can be used to construct a receipt, since a user can prove to a buyer how he had encrypted the ballot. In this paper we propose a simple and efficient method to incorporate receipt-freeness in mixnet-based electronic voting schemes by using the well known re-encryption technique and designated verifier re-encryption proof (DVRP). In our scheme a voter has to prepare his encrypted ballot through a randomization service provided by a tamper resistant randomizer (TRR), in such a way that he finally loses his knowledge on randomness. This method can be used in most mixnet-based electronic voting scheme to provide receipt-freeness.
international conference on information security and cryptology | 2004
Kevin Chen; Matthew Henricksen; William Millan; Joanne Fuller; Leonie Simpson; Ed Dawson; Hoon Jae Lee; SangJae Moon
Advances in the design of Boolean functions using heuristic techniques are reported. A genetic algorithm capable of generating highly nonlinear balanced Boolean functions is presented. Hill climbing techniques are adapted to locate balanced, highly nonlinear Boolean functions that also almost satisfy correlation immunity. The definitions for some cryptographic properties are generalised, providing a measure suitable for use as a fitness function in a genetic algorithm seeking balanced Boolean functions that satisfy both correlation immunity and the strict avalanche criterion. Results are presented demonstrating the effectiveness of the methods.
selected areas in cryptography | 2000
Leonie Simpson; Ed Dawson; Jovan Dj. Golic; William Millan
Designers and users of encryption algorithms used in cipher systems need a systematic approach in examining their ciphers prior to use, to ensure that they are safe from cryptanalytic attack. This paper describes a computer package used for assessing the security of newly-developed encryption algorithms.