Harry Bartlett

Orcid: 0000-0003-4347-0144

According to our database1, Harry Bartlett authored at least 34 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2021
Algebraic Attacks on Grain-Like Keystream Generators.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material).
IACR Cryptol. ePrint Arch., 2020

Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output.
Proceedings of the Applications and Techniques in Information Security, 2020

Security Analysis of Fountain V1.
Proceedings of the Australasian Computer Science Week, 2020

2019
Random Fault Attacks on a Class of Stream Ciphers.
Secur. Commun. Networks, 2019

Fault analysis of AEZ.
Concurr. Comput. Pract. Exp., 2019

Differential Random Fault Attacks on Certain CAESAR Stream Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
A fundamental flaw in the ++AE authenticated encryption mode.
J. Math. Cryptol., 2018

Tweaking Generic OTR to Avoid Forgery Attacks.
IACR Cryptol. ePrint Arch., 2018

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS.
Cryptogr., 2018

Fault attacks on Tiaoxin-346.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes.
IACR Cryptol. ePrint Arch., 2017

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Fault-based Attack on AEZ v4.2.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2016

Forgery attacks on ++AE authenticated encryption mode.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2015

CHURNs: Freshness Assurance for Humans.
Comput. J., 2015

Correcting flaws in Mitchell's analysis of EPBC.
Proceedings of the 13th Australasian Information Security Conference, 2015

2014
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

Algebraic analysis of Trivium-like ciphers (Poster).
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Weak key-IV Pairs in the A5/1 Stream Cipher.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Indirect message injection for MAC generation.
J. Math. Cryptol., 2013

Algebraic analysis of Trivium-like ciphers.
IACR Cryptol. ePrint Arch., 2013

State convergence in bit-based stream ciphers.
IACR Cryptol. ePrint Arch., 2013

Security Analysis of Linearly Filtered NLFSRs.
IACR Cryptol. ePrint Arch., 2013

Slid Pairs in the Initialisation of the A5/1 Stream Cipher.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
Slide attacks on the Sfinks stream cipher.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

A General Model for MAC Generation Using Direct Injection.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

State convergence in the initialisation of the Sfinks stream cipher.
Proceedings of the Tenth Australasian Information Security Conference, 2012

Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Algebraic analysis of the SSS stream cipher.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

State Convergence in the Initialisation of Stream Ciphers.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011


  Loading...