D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 37 Citations 5,129 285 World Ranking 6882 National Ranking 195

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer security
  • Algorithm

Ed Dawson spends much of his time researching Cryptography, Algorithm, Theoretical computer science, Computer security and Keystream. His study in Cryptography is interdisciplinary in nature, drawing from both Intelligibility, Speech recognition, Speech processing, Financial cryptography and Key. His research in Algorithm intersects with topics in Scheme and Permutation.

He has included themes like Homomorphic encryption, Homomorphism, Multiplicative function, Homomorphic secret sharing and Shared secret in his Theoretical computer science study. Ed Dawson studied Computer security and Signature that intersect with Cryptosystem. The Keystream study combines topics in areas such as Plaintext, Correlation attack, Null cipher and Arithmetic.

His most cited work include:

  • Twisted Edwards Curves Revisited (183 citations)
  • Multistage secret sharing based on one-way function (132 citations)
  • Providing Receipt-Freeness In Mixnet-Based Voting Protocols (120 citations)

What are the main themes of his work throughout his whole career to date?

Ed Dawson mainly focuses on Computer security, Cryptography, Theoretical computer science, Stream cipher and Algorithm. His work on Digital signature expands to the thematically related Computer security. His Cryptography study integrates concerns from other disciplines, such as Computer network, Encryption and Correctness.

His work deals with themes such as Differential cryptanalysis, Hash function and Boolean function, which intersect with Theoretical computer science. The various areas that Ed Dawson examines in his Stream cipher study include State and Cipher. His study in the fields of Block cipher and Decoding methods under the domain of Algorithm overlaps with other disciplines such as Shift register and Nonlinear filter.

He most often published in these fields:

  • Computer security (32.72%)
  • Cryptography (25.31%)
  • Theoretical computer science (23.15%)

What were the highlights of his more recent work (between 2010-2020)?

  • Stream cipher (21.91%)
  • Computer security (32.72%)
  • Authenticated encryption (5.56%)

In recent papers he was focusing on the following fields of study:

Stream cipher, Computer security, Authenticated encryption, Theoretical computer science and State are his primary areas of study. Ed Dawson's looking at Stream cipher as part of his Algorithm and Key and Stream cipher study. His study brings together the fields of Encryption and Algorithm.

The Computer security study which covers Permission that intersects with Computer access control. As part of his inquiry into Computer network and Cryptography, Ed Dawson is doing Authenticated encryption research. Ed Dawson interconnects Combinatorial design, Cryptographic primitive, Trivium and eSTREAM, SOSEMANUK in the investigation of issues within Theoretical computer science.

Between 2010 and 2020, his most popular works were:

  • An Approach to Access Control under Uncertainty (18 citations)
  • Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS (16 citations)
  • An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks (11 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Computer security
  • Operating system

Ed Dawson mostly deals with Stream cipher, Computer security, Access control, Authenticated encryption and Building information modeling. His Stream cipher study frequently links to related topics such as Theoretical computer science. His study in Theoretical computer science is interdisciplinary in nature, drawing from both eSTREAM, Block cipher and Trivium.

His Computer security research is mostly focused on the topic Role-based access control. His research in the fields of Zero-knowledge proof overlaps with other disciplines such as Soundness. His study explores the link between State and topics such as Cryptography that cross with problems in Encryption.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Multistage secret sharing based on one-way function

J. He;E. Dawson.
Electronics Letters (1994)

281 Citations

Twisted Edwards Curves Revisited

Huseyin Hisil;Kenneth Koon-Ho Wong;Gary Carter;Ed Dawson.
international conference on the theory and application of cryptology and information security (2008)

258 Citations

Multisecret-sharing scheme based on one-way function

J. He;E. Dawson.
Electronics Letters (1995)

187 Citations

Secure key issuing in ID-based cryptography

Byoungcheon Lee;Colin Boyd;Ed Dawson;Kwangjo Kim.
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32 (2004)

185 Citations

Providing Receipt-Freeness In Mixnet-Based Voting Protocols

Byoungcheon Lee;Byoungcheon Lee;Colin Boyd;Edward Dawson;Kwangjo Kim.
international conference on information security and cryptology (2003)

181 Citations

Heuristic Design of Cryptographically Strong Balanced Boolean Functions

William Millan;Andrew J. Clark;Ed Dawson.
theory and application of cryptographic techniques (1998)

179 Citations

A novel identity-based strong designated verifier signature scheme

Baoyuan Kang;Colin Boyd;Ed Dawson.
Journal of Systems and Software (2009)

138 Citations

SKMA: a key management architecture for SCADA systems

Robert Dawson;Colin Boyd;Ed Dawson;Juan Manuel González Nieto.
grid computing (2006)

131 Citations

A computer package for measuring the strength of encryption algorithms

H. Gustafson;E. Dawson;L. Nielsen;W. Caelli.
Computers & Security (1994)

117 Citations

Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes

William Millan;L. Burnett;G. Carter;Andrew Clark.
international conference on information and communication security (1999)

104 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Ed Dawson

Daniel J. Bernstein

Daniel J. Bernstein

University of Illinois at Chicago

Publications: 33

Tanja Lange

Tanja Lange

Eindhoven University of Technology

Publications: 32

John A. Clark

John A. Clark

University of Sheffield

Publications: 15

Thomas Johansson

Thomas Johansson

Lund University

Publications: 13

Lein Harn

Lein Harn

University of Missouri–Kansas City

Publications: 12

Harald Niederreiter

Harald Niederreiter

Austrian Academy of Sciences

Publications: 11

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 11

Kouichi Sakurai

Kouichi Sakurai

Kyushu University

Publications: 10

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 10

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 10

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 9

Lars R. Knudsen

Lars R. Knudsen

Technical University of Denmark

Publications: 9

Willi Meier

Willi Meier

University of Applied Sciences and Arts Northwestern Switzerland

Publications: 9

Eduardo Fernández-Medina

Eduardo Fernández-Medina

University of Castilla-La Mancha

Publications: 8

Subhamoy Maitra

Subhamoy Maitra

Indian Statistical Institute

Publications: 8

Bart Preneel

Bart Preneel

KU Leuven

Publications: 8

Trending Scientists

Stephen A. Cook

Stephen A. Cook

University of Toronto

Jie Xu

Jie Xu

University of Leeds

Robert Lee Angell

Robert Lee Angell

IBM (United States)

Rustem F. Ismagilov

Rustem F. Ismagilov

California Institute of Technology

Etienne F. Vansant

Etienne F. Vansant

International Hellenic University

Nianqiang Wu

Nianqiang Wu

University of Massachusetts Amherst

Masao Yoshinari

Masao Yoshinari

Tokyo Dental College

LaDeana W. Hillier

LaDeana W. Hillier

University of Washington

Robin Wait

Robin Wait

Imperial College London

Philip A. Cole

Philip A. Cole

Brigham and Women's Hospital

Sharon L. Campbell

Sharon L. Campbell

University of North Carolina at Chapel Hill

Patrick G. Bray

Patrick G. Bray

Liverpool School of Tropical Medicine

George V. Rebec

George V. Rebec

Indiana University

Daniel Nettle

Daniel Nettle

Newcastle University

Philip S. Rosenberg

Philip S. Rosenberg

National Institutes of Health

Ruth E. Patterson

Ruth E. Patterson

University of California, San Diego

Something went wrong. Please try again later.