Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ed Dawson is active.

Publication


Featured researches published by Ed Dawson.


international conference on the theory and application of cryptology and information security | 2008

Twisted Edwards Curves Revisited

Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson

This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a wide range of applications. Notably, the new addition algorithm uses


international conference on information security and cryptology | 2003

Providing Receipt-Freeness In Mixnet-Based Voting Protocols

Byoungcheon Lee; Colin Boyd; Ed Dawson; Kwangjo Kim; Jeongmo Yang; Seung-Jae Yoo

8\mathrm{\textbf{M}}


theory and application of cryptographic techniques | 1998

Heuristic design of cryptographically strong balanced Boolean functions

William Millan; Andrew J. Clark; Ed Dawson

for suitably selected curve constants. In comparison, the fastest point addition algorithms for (twisted) Edwards curves stated in the literature use


Computers & Security | 1994

A computer package for measuring the strength of encryption algorithms

Helen Gustafson; Ed Dawson; Lauren Nielsen; William J. Caelli

9\mathrm{\textbf{M}} + 1\mathrm{\textbf{S}}


australasian conference on information security and privacy | 2002

The LILI-II Keystream Generator

Andrew J. Clark; Ed Dawson; Joanne Fuller; Jovan Dj. Golic; Hoon Jae Lee; William Millan; SangJae Moon; Leonie Simpson

. It is also shown that the new addition algorithm can be implemented with four processors dropping the effective cost to


fast software encryption | 2008

Bit-Pattern Based Integral Attack

Muhammad Reza Z'aba; Håvard Raddum; Matthew Henricksen; Ed Dawson

2\mathrm{\textbf{M}}


IEEE Journal on Selected Areas in Communications | 1993

Design and cryptanalysis of transform-based analog speech scramblers

B. Goldburg; Sridha Sridharan; Ed Dawson

. This implies an effective speed increase by the full factor of 4 over the sequential case. Our results allow faster implementation of elliptic curve scalar multiplication. In addition, the new point addition algorithm can be used to provide a natural protection from side channel attacks based on simple power analysis (SPA).


international conference on information and communication security | 1999

Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes

William Millan; Linda Burnett; Gary Carter; Andrew J. Clark; Ed Dawson

It had been thought that it is difficult to provide receipt-freeness in mixnet-based electronic voting schemes. Any kind of user chosen randomness can be used to construct a receipt, since a user can prove to a buyer how he had encrypted the ballot. In this paper we propose a simple and efficient method to incorporate receipt-freeness in mixnet-based electronic voting schemes by using the well known re-encryption technique and designated verifier re-encryption proof (DVRP). In our scheme a voter has to prepare his encrypted ballot through a randomization service provided by a tamper resistant randomizer (TRR), in such a way that he finally loses his knowledge on randomness. This method can be used in most mixnet-based electronic voting scheme to provide receipt-freeness.


international conference on information security and cryptology | 2004

Dragon: a fast word based stream cipher

Kevin Chen; Matthew Henricksen; William Millan; Joanne Fuller; Leonie Simpson; Ed Dawson; Hoon Jae Lee; SangJae Moon

Advances in the design of Boolean functions using heuristic techniques are reported. A genetic algorithm capable of generating highly nonlinear balanced Boolean functions is presented. Hill climbing techniques are adapted to locate balanced, highly nonlinear Boolean functions that also almost satisfy correlation immunity. The definitions for some cryptographic properties are generalised, providing a measure suitable for use as a fitness function in a genetic algorithm seeking balanced Boolean functions that satisfy both correlation immunity and the strict avalanche criterion. Results are presented demonstrating the effectiveness of the methods.


selected areas in cryptography | 2000

LILI Keystream Generator

Leonie Simpson; Ed Dawson; Jovan Dj. Golic; William Millan

Designers and users of encryption algorithms used in cipher systems need a systematic approach in examining their ciphers prior to use, to ensure that they are safe from cryptanalytic attack. This paper describes a computer package used for assessing the security of newly-developed encryption algorithms.

Collaboration


Dive into the Ed Dawson's collaboration.

Top Co-Authors

Avatar

Leonie Simpson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Colin Boyd

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kenneth Koon-Ho Wong

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Harry Bartlett

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kun Peng

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jason F. Reid

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

William Millan

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Gary Carter

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew J. Clark

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge