#### Filter Results:

#### Publication Year

1997

2014

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI-128 is simple to implement in hardware or software.

- E. Dawson, Alan Rahilly
- 2003

Perfect threshold schemes whose blocks are ordered are introduced. For a given number of shadows v, participants wand threshold t, let ~(t, w, v) be the maximum number of keys possible for an ordered perfect threshold scheme. We show that ~(t, w, v) = v if and only if there exists an orthogonal array (v t , w + 1, v, t). The implementability of perfect… (More)

- M Salmasizadeh, J Goli, E Dawson, L Simpson
- 1997

A systematic procedure for applying fast correlation attacks to combiners with memory is introduced. This procedure consists of the following four stages: identifying correlated linear input and output transforms with maximum possible or relatively large correlation coeecient, calculating low-weight polynomial multiples based on the identiied input linear… (More)

Elliptic curve cryptosystems (eccs) are becoming more popular because of the reduced number of key bits required in comparison to other cryptosystems (for example, a 160 bit ecc has roughly the same security as 1024 bit rsa). Eccs are especially suited to smart cards because of the limited memory and computational power available on these devices. Contents… (More)

- L. Burnett, W. Millan, E. Dawson, A. Clark
- 2004

We present two heuristic optimisation methods for generating N-variable boolean functions which exhibit particular cryptographic properties. Each method targets one or more properties and consistently produces a large number of N-variable boolean functions with those properties. The first method presented is shown to outperform any other heuristic technique… (More)

- Andrew Tirkel, Qichun Wang, Elena Dubrova, Vladimir Tonchev, Hong Wen, Sihem MESNAGER +25 others
- 2014

- E Dawson, J Asenstorfer, P Gray
- 2003

In stream cipher the terms of an infinite binary seOluel1ce are added modulo two to binary plaintext to form One method Groth for this is to sum second products of the stages of maximal length sequence the products are defined by a Langford It was claimed that could be produced in this fashion with maximum provided are used. In this paper these sequences… (More)

The equation, (activity of enzyme) (pPO(4))(n) = K, has been investigated and has been shown to have only a limited application to the effect of the phosphate ion on the hydrolytic activity of pancreatic lipase. The deviations observed are ascribed to the effect of certain factors on the stability of the enzyme.

- ‹
- 1
- ›