Leonie Simpson
Leonie Simpson
Senior Lecturer, Science and Engineering Faculty, Queensland University of Technology
Verified email at
Cited by
Cited by
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
LILI keystream generator
LR Simpson, E Dawson, JD Golic, W Millan
Selected Areas in Cryptography 2012, 248-261, 2000
Security and Privacy in eHealth: Is it possible?
T Sahama, L Simpson, B Lane
2013 IEEE 15th International Conference on e-Health Networking, Applications …, 2013
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
A probabilistic correlation attack on the shrinking generator
L Simpsonš, JD Golić, E Dawsonš
Information Security and Privacy: Third Australasian Conference, ACISP'98 …, 1998
Cryptanalysis of ORYX
D Wagner, L Simpson, E Dawson, J Kelsey, W Millan, B Schneier
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
Analysis and design issues for synchronous stream ciphers
E Dawson, L Simpson
Coding Theory and Cryptology, 49-90, 2002
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
Applications and Techniques in Information Security: 6th International …, 2016
Continuous authentication for VANET
B Palaniswamy, S Camtepe, E Foo, L Simpson, MAR Baee, J Pieprzyk
Vehicular Communications 25, 100255, 2020
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
Broadcast authentication in latency-critical applications: On the efficiency of IEEE 1609.2
MAR Baee, L Simpson, E Foo, J Pieprzyk
IEEE Transactions on Vehicular Technology 68 (12), 11577-11587, 2019
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
Authentication strategies in vehicular communications: a taxonomy and framework
MA Rezazadeh Baee, L Simpson, X Boyen, E Foo, J Pieprzyk
EURASIP Journal on Wireless Communications and Networking 2021 (1), 1-50, 2021
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
Designing boolean functions for cryptographic applications
E Dowson, W Millan, L Simpson
Contributions to General Algebra 12 (1), 2000
Fast correlation attacks on nonlinear filter generators
JD Golić, M Salmasizadeh, L Simpson, E Dawson
Information processing letters 64 (1), 37-42, 1997
On the security of the LILI family of stream ciphers against algebraic attacks
SZ Al-Hinai, E Dawson, M Henricksen, L Simpson
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
Fast correlation attacks and multiple linear approximations
M Salmasizadeh, L Simpson, JD Golić, E Dawson
Information Security and Privacy: Second Australasian Conference, ACISP'97 …, 1997
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
The system can't perform the operation now. Try again later.
Articles 1–20