Leonie Simpson | Queensland University of Technology (original) (raw)
Uploads
Papers by Leonie Simpson
These databases contain citations from different subsets of available publications and different ... more These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles ...
Lecture Notes in Computer Science, 2005
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear ... more This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a nonlinear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers. The components of Dragon are designed to resist all known attacks.
Nonlinear filter generators are common components used in the keystream generators for stream cip... more Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for au- thentication mechanisms. They consist of a Linear Feedback Shift Reg- ister (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the
Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2002
ABSTRACT
IFIP Advances in Information and Communication Technology, 2013
A key derivation function is used to generate one or more cryptographic keys from a private strin... more A key derivation function is used to generate one or more cryptographic keys from a private string. These cryptographic keys are critical in protecting the integrity or con dentiality of data stored in insecure environments or transmitted over insecure channels. There is a need to ensure these cryptographic keys are pseudorandom. This paper proposes a new method for key derivation function based on stream ciphers. We shows that our proposed key derivation function based on stream ciphers is a secure key derivation function with better performance metrics compare to the existing key derivation function proposals.
Lecture Notes in Computer Science, 1997
The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear fil... more The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear filter generators in order to investigate the effect of multiple linear transforms of the same linear recurring sequence being correlated to the keystream sequence. Systematic computer simulations on random balanced filter functions reveal that the attack is successful if the number of parity-checks used is sufficiently large
Cryptography and Computational Number Theory, 2001
Page 1. Evaluation of TOYOCRYPT-HR1 January 17, 2001 Information Security Research Centre Queensl... more Page 1. Evaluation of TOYOCRYPT-HR1 January 17, 2001 Information Security Research Centre Queensland University of Technology Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan, Leonie Simpson Page 2. TABLE OF CONTENTS ...
These databases contain citations from different subsets of available publications and different ... more These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles ...
Lecture Notes in Computer Science, 2005
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear ... more This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a nonlinear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers. The components of Dragon are designed to resist all known attacks.
Nonlinear filter generators are common components used in the keystream generators for stream cip... more Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for au- thentication mechanisms. They consist of a Linear Feedback Shift Reg- ister (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the
Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2002
ABSTRACT
IFIP Advances in Information and Communication Technology, 2013
A key derivation function is used to generate one or more cryptographic keys from a private strin... more A key derivation function is used to generate one or more cryptographic keys from a private string. These cryptographic keys are critical in protecting the integrity or con dentiality of data stored in insecure environments or transmitted over insecure channels. There is a need to ensure these cryptographic keys are pseudorandom. This paper proposes a new method for key derivation function based on stream ciphers. We shows that our proposed key derivation function based on stream ciphers is a secure key derivation function with better performance metrics compare to the existing key derivation function proposals.
Lecture Notes in Computer Science, 1997
The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear fil... more The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear filter generators in order to investigate the effect of multiple linear transforms of the same linear recurring sequence being correlated to the keystream sequence. Systematic computer simulations on random balanced filter functions reveal that the attack is successful if the number of parity-checks used is sufficiently large
Cryptography and Computational Number Theory, 2001
Page 1. Evaluation of TOYOCRYPT-HR1 January 17, 2001 Information Security Research Centre Queensl... more Page 1. Evaluation of TOYOCRYPT-HR1 January 17, 2001 Information Security Research Centre Queensland University of Technology Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan, Leonie Simpson Page 2. TABLE OF CONTENTS ...