Leonie Ruth Simpson

Orcid: 0000-0001-8434-9741

According to our database1, Leonie Ruth Simpson authored at least 75 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.
Cryptogr., March, 2024

Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata.
IEEE Open J. Comput. Soc., 2024

A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies.
IEEE Access, 2024

2023
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis.
CoRR, 2023

Software Vulnerability Detection Using Informed Code Graph Pruning.
IEEE Access, 2023

Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery.
Proceedings of the IEEE International Conference on Trust, 2022

2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications.
IEEE Trans. Veh. Technol., 2021

On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
IEEE Trans. Inf. Forensics Secur., 2021

Authentication strategies in vehicular communications: a taxonomy and framework.
EURASIP J. Wirel. Commun. Netw., 2021

Algebraic Attacks on Grain-Like Keystream Generators.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

Towards a Secured and Safe Online Social Media Design Framework for People with Intellectual Disability.
Proceedings of the ASSETS '21: The 23rd International ACM SIGACCESS Conference on Computers and Accessibility, 2021

Barriers and Incentives to Cybersecurity Threat Information Sharing in Developing Countries: A Case Study of Saudi Arabia.
Proceedings of the ACSW '21: 2021 Australasian Computer Science Week Multiconference, 2021

2020
Continuous authentication for VANET.
Veh. Commun., 2020

Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material).
IACR Cryptol. ePrint Arch., 2020

Near and Dear: Designing Relatable VR Agents for Training Games.
Proceedings of the OzCHI '20: 32nd Australian Conference on Human-Computer-Interaction, 2020

Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output.
Proceedings of the Applications and Techniques in Information Security, 2020

Finding Slid Pairs for the Plantlet Stream Cipher.
Proceedings of the Australasian Computer Science Week, 2020

Security Analysis of Fountain V1.
Proceedings of the Australasian Computer Science Week, 2020

2019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2.
IEEE Trans. Veh. Technol., 2019

Random Fault Attacks on a Class of Stream Ciphers.
Secur. Commun. Networks, 2019

Fault analysis of AEZ.
Concurr. Comput. Pract. Exp., 2019

Differential Random Fault Attacks on Certain CAESAR Stream Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
A fundamental flaw in the ++AE authenticated encryption mode.
J. Math. Cryptol., 2018

Tweaking Generic OTR to Avoid Forgery Attacks.
IACR Cryptol. ePrint Arch., 2018

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS.
Cryptogr., 2018

A Viable LoRa Framework for Smart Cities.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Fault attacks on Tiaoxin-346.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Stream cipher based key derivation function.
Int. J. Secur. Networks, 2017

Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes.
IACR Cryptol. ePrint Arch., 2017

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Fault-based Attack on AEZ v4.2.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2016

Forgery attacks on ++AE authenticated encryption mode.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

Initialisation flaws in the A5-GMR-1 satphone encryption algorithm.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2015

Correcting flaws in Mitchell's analysis of EPBC.
Proceedings of the 13th Australasian Information Security Conference, 2015

2014
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

Algebraic analysis of Trivium-like ciphers (Poster).
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Weak key-IV Pairs in the A5/1 Stream Cipher.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Indirect message injection for MAC generation.
J. Math. Cryptol., 2013

Algebraic analysis of Trivium-like ciphers.
IACR Cryptol. ePrint Arch., 2013

State convergence in bit-based stream ciphers.
IACR Cryptol. ePrint Arch., 2013

Key Derivation Function: The SCKDF Scheme.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Security and Privacy in eHealth: Is it possible?
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Slid Pairs in the Initialisation of the A5/1 Stream Cipher.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
State cycles, initialization and the Trivium stream cipher.
Cryptogr. Commun., 2012

A Framework for Security Analysis of Key Derivation Functions.
Proceedings of the Information Security Practice and Experience, 2012

Slide attacks on the Sfinks stream cipher.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

A General Model for MAC Generation Using Direct Injection.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

State convergence in the initialisation of the Sfinks stream cipher.
Proceedings of the Tenth Australasian Information Security Conference, 2012

Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Algebraic analysis of the SSS stream cipher.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

State Convergence in the Initialisation of Stream Ciphers.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

State convergence and the effectiveness of time-memory-data tradeoffs.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
State convergence and keyspace reduction of the Mixer stream cipher.
IACR Cryptol. ePrint Arch., 2010

Bias in the nonlinear filter generator output sequence.
IACR Cryptol. ePrint Arch., 2010

2009
Linearity within the SMS4 Block Cipher.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Algebraic Analysis of LEX.
Proceedings of the Seventh Australasian Information Security Conference, 2009

Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

2007
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Improved Cryptanalysis of MAG.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2004
Dragon: A Fast Word Based Stream Cipher.
Proceedings of the Information Security and Cryptology, 2004

Perspectives on Word Based Stream Ciphers.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

2003
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher.
Proceedings of the Information Security and Cryptology, 2003

2002
Analysis of a measure of correlation between two binary strings of different lengths.
Australas. J Comb., 2002

The LILI-II Keystream Generator.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2000
LILI Keystream Generator.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

1999
A Fast Correlation Attack on Multiplexer Generators.
Inf. Process. Lett., 1999

1998
Cryptanalysis of ORYX.
Proceedings of the Selected Areas in Cryptography '98, 1998

A Probabilistic Correlation Attack on the Shrinking Generator.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Fast Correlation Attacks on Nonlinear Filter Generators.
Inf. Process. Lett., 1997

Fast Correlation Attacks and Multiple Linear Approximations.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997


  Loading...