Leonie Simpson | Queensland University of Technology (original) (raw)

Uploads

Papers by Leonie Simpson

Research paper thumbnail of Analysis of a measure of correlation between two binary strings of different lengths

Research paper thumbnail of Designing boolean functions for cryptographic applications

Research paper thumbnail of Divide and conquer attacks on shift register based stream ciphers

These databases contain citations from different subsets of available publications and different ... more These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles ...

Research paper thumbnail of Dragon: A Fast Word Based Stream Cipher

Lecture Notes in Computer Science, 2005

This paper presents Dragon, a new stream cipher constructed using a single word based non-linear ... more This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a nonlinear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers. The components of Dragon are designed to resist all known attacks.

Research paper thumbnail of Bias in the nonlinear filter generator output sequence

Nonlinear filter generators are common components used in the keystream generators for stream cip... more Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for au- thentication mechanisms. They consist of a Linear Feedback Shift Reg- ister (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the

Research paper thumbnail of ANALYSIS AND DESIGN ISSUES FOR SYNCHRONOUS STREAM CIPHERS

Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2002

ABSTRACT

Research paper thumbnail of Key Derivation Function: The SCKDF Scheme

IFIP Advances in Information and Communication Technology, 2013

A key derivation function is used to generate one or more cryptographic keys from a private strin... more A key derivation function is used to generate one or more cryptographic keys from a private string. These cryptographic keys are critical in protecting the integrity or con dentiality of data stored in insecure environments or transmitted over insecure channels. There is a need to ensure these cryptographic keys are pseudorandom. This paper proposes a new method for key derivation function based on stream ciphers. We shows that our proposed key derivation function based on stream ciphers is a secure key derivation function with better performance metrics compare to the existing key derivation function proposals.

Research paper thumbnail of Fast correlation attacks and multiple linear approximations

Lecture Notes in Computer Science, 1997

The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear fil... more The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear filter generators in order to investigate the effect of multiple linear transforms of the same linear recurring sequence being correlated to the keystream sequence. Systematic computer simulations on random balanced filter functions reveal that the attack is successful if the number of parity-checks used is sufficiently large

Research paper thumbnail of A Survey of Divide and Conquer Attacks on Certain Irregularly Clocked Stream Ciphers

Cryptography and Computational Number Theory, 2001

Research paper thumbnail of LILI to Dragon: from Bit-Based to Word-Based Stream Ciphers

Research paper thumbnail of Investigating the security properties of MACs based on stream ciphers

Research paper thumbnail of Paper: A FAST CORRELATION ATTACK ON MULTIPLEXER GENERATORS

Research paper thumbnail of Evaluation of TOYOCRYPT-HR1 January 17, 2001

Page 1. Evaluation of TOYOCRYPT-HR1 January 17, 2001 Information Security Research Centre Queensl... more Page 1. Evaluation of TOYOCRYPT-HR1 January 17, 2001 Information Security Research Centre Queensland University of Technology Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan, Leonie Simpson Page 2. TABLE OF CONTENTS ...

Research paper thumbnail of Perspectives on Word Based Stream Ciphers

Research paper thumbnail of A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers

Research paper thumbnail of State convergence in bit-based stream ciphers

Research paper thumbnail of Information Security Discipline, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Australia

Research paper thumbnail of Weak key-IV pairs in the A5/1 stream cipher

Research paper thumbnail of 1st International Workshop on Secure and Privacy-Aware Information Management in eHealth

Research paper thumbnail of Correcting flaws in Mitchell’s analysis of EPBC

Research paper thumbnail of Analysis of a measure of correlation between two binary strings of different lengths

Research paper thumbnail of Designing boolean functions for cryptographic applications

Research paper thumbnail of Divide and conquer attacks on shift register based stream ciphers

These databases contain citations from different subsets of available publications and different ... more These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles ...

Research paper thumbnail of Dragon: A Fast Word Based Stream Cipher

Lecture Notes in Computer Science, 2005

This paper presents Dragon, a new stream cipher constructed using a single word based non-linear ... more This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a nonlinear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers. The components of Dragon are designed to resist all known attacks.

Research paper thumbnail of Bias in the nonlinear filter generator output sequence

Nonlinear filter generators are common components used in the keystream generators for stream cip... more Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for au- thentication mechanisms. They consist of a Linear Feedback Shift Reg- ister (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the

Research paper thumbnail of ANALYSIS AND DESIGN ISSUES FOR SYNCHRONOUS STREAM CIPHERS

Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2002

ABSTRACT

Research paper thumbnail of Key Derivation Function: The SCKDF Scheme

IFIP Advances in Information and Communication Technology, 2013

A key derivation function is used to generate one or more cryptographic keys from a private strin... more A key derivation function is used to generate one or more cryptographic keys from a private string. These cryptographic keys are critical in protecting the integrity or con dentiality of data stored in insecure environments or transmitted over insecure channels. There is a need to ensure these cryptographic keys are pseudorandom. This paper proposes a new method for key derivation function based on stream ciphers. We shows that our proposed key derivation function based on stream ciphers is a secure key derivation function with better performance metrics compare to the existing key derivation function proposals.

Research paper thumbnail of Fast correlation attacks and multiple linear approximations

Lecture Notes in Computer Science, 1997

The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear fil... more The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear filter generators in order to investigate the effect of multiple linear transforms of the same linear recurring sequence being correlated to the keystream sequence. Systematic computer simulations on random balanced filter functions reveal that the attack is successful if the number of parity-checks used is sufficiently large

Research paper thumbnail of A Survey of Divide and Conquer Attacks on Certain Irregularly Clocked Stream Ciphers

Cryptography and Computational Number Theory, 2001

Research paper thumbnail of LILI to Dragon: from Bit-Based to Word-Based Stream Ciphers

Research paper thumbnail of Investigating the security properties of MACs based on stream ciphers

Research paper thumbnail of Paper: A FAST CORRELATION ATTACK ON MULTIPLEXER GENERATORS

Research paper thumbnail of Evaluation of TOYOCRYPT-HR1 January 17, 2001

Page 1. Evaluation of TOYOCRYPT-HR1 January 17, 2001 Information Security Research Centre Queensl... more Page 1. Evaluation of TOYOCRYPT-HR1 January 17, 2001 Information Security Research Centre Queensland University of Technology Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan, Leonie Simpson Page 2. TABLE OF CONTENTS ...

Research paper thumbnail of Perspectives on Word Based Stream Ciphers

Research paper thumbnail of A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers

Research paper thumbnail of State convergence in bit-based stream ciphers

Research paper thumbnail of Information Security Discipline, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Australia

Research paper thumbnail of Weak key-IV pairs in the A5/1 stream cipher

Research paper thumbnail of 1st International Workshop on Secure and Privacy-Aware Information Management in eHealth

Research paper thumbnail of Correcting flaws in Mitchell’s analysis of EPBC

Log In