Ed Dawson spends much of his time researching Cryptography, Algorithm, Theoretical computer science, Computer security and Keystream. His study in Cryptography is interdisciplinary in nature, drawing from both Intelligibility, Speech recognition, Speech processing, Financial cryptography and Key. His research in Algorithm intersects with topics in Scheme and Permutation.
He has included themes like Homomorphic encryption, Homomorphism, Multiplicative function, Homomorphic secret sharing and Shared secret in his Theoretical computer science study. Ed Dawson studied Computer security and Signature that intersect with Cryptosystem. The Keystream study combines topics in areas such as Plaintext, Correlation attack, Null cipher and Arithmetic.
Ed Dawson mainly focuses on Computer security, Cryptography, Theoretical computer science, Stream cipher and Algorithm. His work on Digital signature expands to the thematically related Computer security. His Cryptography study integrates concerns from other disciplines, such as Computer network, Encryption and Correctness.
His work deals with themes such as Differential cryptanalysis, Hash function and Boolean function, which intersect with Theoretical computer science. The various areas that Ed Dawson examines in his Stream cipher study include State and Cipher. His study in the fields of Block cipher and Decoding methods under the domain of Algorithm overlaps with other disciplines such as Shift register and Nonlinear filter.
Stream cipher, Computer security, Authenticated encryption, Theoretical computer science and State are his primary areas of study. Ed Dawson's looking at Stream cipher as part of his Algorithm and Key and Stream cipher study. His study brings together the fields of Encryption and Algorithm.
The Computer security study which covers Permission that intersects with Computer access control. As part of his inquiry into Computer network and Cryptography, Ed Dawson is doing Authenticated encryption research. Ed Dawson interconnects Combinatorial design, Cryptographic primitive, Trivium and eSTREAM, SOSEMANUK in the investigation of issues within Theoretical computer science.
Ed Dawson mostly deals with Stream cipher, Computer security, Access control, Authenticated encryption and Building information modeling. His Stream cipher study frequently links to related topics such as Theoretical computer science. His study in Theoretical computer science is interdisciplinary in nature, drawing from both eSTREAM, Block cipher and Trivium.
His Computer security research is mostly focused on the topic Role-based access control. His research in the fields of Zero-knowledge proof overlaps with other disciplines such as Soundness. His study explores the link between State and topics such as Cryptography that cross with problems in Encryption.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Multistage secret sharing based on one-way function
J. He;E. Dawson.
Electronics Letters (1994)
Twisted Edwards Curves Revisited
Huseyin Hisil;Kenneth Koon-Ho Wong;Gary Carter;Ed Dawson.
international conference on the theory and application of cryptology and information security (2008)
Multisecret-sharing scheme based on one-way function
J. He;E. Dawson.
Electronics Letters (1995)
Secure key issuing in ID-based cryptography
Byoungcheon Lee;Colin Boyd;Ed Dawson;Kwangjo Kim.
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32 (2004)
Providing Receipt-Freeness In Mixnet-Based Voting Protocols
Byoungcheon Lee;Byoungcheon Lee;Colin Boyd;Edward Dawson;Kwangjo Kim.
international conference on information security and cryptology (2003)
Heuristic Design of Cryptographically Strong Balanced Boolean Functions
William Millan;Andrew J. Clark;Ed Dawson.
theory and application of cryptographic techniques (1998)
A novel identity-based strong designated verifier signature scheme
Baoyuan Kang;Colin Boyd;Ed Dawson.
Journal of Systems and Software (2009)
SKMA: a key management architecture for SCADA systems
Robert Dawson;Colin Boyd;Ed Dawson;Juan Manuel González Nieto.
grid computing (2006)
A computer package for measuring the strength of encryption algorithms
H. Gustafson;E. Dawson;L. Nielsen;W. Caelli.
Computers & Security (1994)
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes
William Millan;L. Burnett;G. Carter;Andrew Clark.
international conference on information and communication security (1999)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: