default search action
Harry Bartlett
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. ACISP 2023: 89-108 - 2021
- [c23]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Algebraic Attacks on Grain-Like Keystream Generators. ICISC 2021: 241-270 - 2020
- [c22]Matthew Beighton, Harry Bartlett, Leonie Simpson:
Security Analysis of Fountain V1. ACSW 2020: 6:1-6:8 - [c21]Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output. ATIS 2020: 42-60 - [i8]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material). IACR Cryptol. ePrint Arch. 2020: 22 (2020)
2010 – 2019
- 2019
- [j7]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault analysis of AEZ. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j6]Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong:
Random Fault Attacks on a Class of Stream Ciphers. Secur. Commun. Networks 2019: 1680263:1-1680263:12 (2019) - [c20]Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. ICISC 2019: 297-315 - 2018
- [j5]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptogr. 2(1): 4 (2018) - [j4]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A fundamental flaw in the ++AE authenticated encryption mode. J. Math. Cryptol. 12(1): 37-42 (2018) - [c19]Md. Iftekhar Salam, Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault attacks on Tiaoxin-346. ACSW 2018: 5:1-5:9 - [i7]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. IACR Cryptol. ePrint Arch. 2018: 66 (2018) - 2017
- [c18]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes. ACISP (1) 2017: 285-305 - [c17]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A Fault-based Attack on AEZ v4.2. TrustCom/BigDataSE/ICESS 2017: 634-641 - [c16]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. TrustCom/BigDataSE/ICESS 2017: 961-966 - [i6]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes. IACR Cryptol. ePrint Arch. 2017: 717 (2017) - 2016
- [c15]Hassan Qahur Al Mahri, Leonie Ruth Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Forgery attacks on ++AE authenticated encryption mode. ACSW 2016: 33 - [c14]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Ruth Simpson, Ed Dawson, Josef Pieprzyk:
Finding state collisions in the authenticated encryption stream cipher ACORN. ACSW 2016: 36 - [c13]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. ATIS 2016: 15-26 - [c12]Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. ATIS 2016: 41-53 - [i5]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2016: 743 (2016) - 2015
- [j3]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett:
CHURNs: Freshness Assurance for Humans. Comput. J. 58(10): 2404-2425 (2015) - [c11]Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Correcting flaws in Mitchell's analysis of EPBC. AISC 2015: 57-60 - [i4]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2015: 918 (2015) - 2014
- [c10]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Weak key-IV Pairs in the A5/1 Stream Cipher. AISC 2014: 23-36 - [c9]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers (Poster). AISC 2014: 77-81 - [c8]Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher. SETA 2014: 220-233 - 2013
- [j2]Mufeed Al Mashrafi, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Indirect message injection for MAC generation. J. Math. Cryptol. 7(3): 253-277 (2013) - [j1]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett:
Security analysis of linearly filtered NLFSRs. J. Math. Cryptol. 7(4): 313-332 (2013) - [c7]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slid Pairs in the Initialisation of the A5/1 Stream Cipher. AISC 2013: 3-12 - [i3]Sui-Guan Teo, Harry Bartlett, Ali Al-Hamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State convergence in bit-based stream ciphers. IACR Cryptol. ePrint Arch. 2013: 96 (2013) - [i2]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett:
Security Analysis of Linearly Filtered NLFSRs. IACR Cryptol. ePrint Arch. 2013: 185 (2013) - [i1]Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers. IACR Cryptol. ePrint Arch. 2013: 240 (2013) - 2012
- [c6]Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. ACISP 2012: 138-151 - [c5]Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
State convergence in the initialisation of the Sfinks stream cipher. AISC 2012: 27-32 - [c4]Harry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
A General Model for MAC Generation Using Direct Injection. Inscrypt 2012: 198-215 - [c3]Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slide attacks on the Sfinks stream cipher. ICSPCS 2012: 1-10 - 2011
- [c2]Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State Convergence in the Initialisation of Stream Ciphers. ACISP 2011: 75-88 - [c1]Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson:
Algebraic analysis of the SSS stream cipher. SIN 2011: 199-204
Coauthor Index
aka: Leonie Simpson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint