H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 34 Citations 4,650 202 World Ranking 6221 National Ranking 182

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer security
  • Algorithm

Ed Dawson spends much of his time researching Cryptography, Algorithm, Theoretical computer science, Computer security and Keystream. His study in Cryptography is interdisciplinary in nature, drawing from both Intelligibility, Speech recognition, Speech processing, Financial cryptography and Key. His research in Algorithm intersects with topics in Scheme and Permutation.

He has included themes like Homomorphic encryption, Homomorphism, Multiplicative function, Homomorphic secret sharing and Shared secret in his Theoretical computer science study. Ed Dawson studied Computer security and Signature that intersect with Cryptosystem. The Keystream study combines topics in areas such as Plaintext, Correlation attack, Null cipher and Arithmetic.

His most cited work include:

  • Twisted Edwards Curves Revisited (183 citations)
  • Multistage secret sharing based on one-way function (132 citations)
  • Providing Receipt-Freeness In Mixnet-Based Voting Protocols (120 citations)

What are the main themes of his work throughout his whole career to date?

Ed Dawson mainly focuses on Computer security, Cryptography, Theoretical computer science, Stream cipher and Algorithm. His work on Digital signature expands to the thematically related Computer security. His Cryptography study integrates concerns from other disciplines, such as Computer network, Encryption and Correctness.

His work deals with themes such as Differential cryptanalysis, Hash function and Boolean function, which intersect with Theoretical computer science. The various areas that Ed Dawson examines in his Stream cipher study include State and Cipher. His study in the fields of Block cipher and Decoding methods under the domain of Algorithm overlaps with other disciplines such as Shift register and Nonlinear filter.

He most often published in these fields:

  • Computer security (32.72%)
  • Cryptography (25.31%)
  • Theoretical computer science (23.15%)

What were the highlights of his more recent work (between 2010-2020)?

  • Stream cipher (21.91%)
  • Computer security (32.72%)
  • Authenticated encryption (5.56%)

In recent papers he was focusing on the following fields of study:

Stream cipher, Computer security, Authenticated encryption, Theoretical computer science and State are his primary areas of study. Ed Dawson's looking at Stream cipher as part of his Algorithm and Key and Stream cipher study. His study brings together the fields of Encryption and Algorithm.

The Computer security study which covers Permission that intersects with Computer access control. As part of his inquiry into Computer network and Cryptography, Ed Dawson is doing Authenticated encryption research. Ed Dawson interconnects Combinatorial design, Cryptographic primitive, Trivium and eSTREAM, SOSEMANUK in the investigation of issues within Theoretical computer science.

Between 2010 and 2020, his most popular works were:

  • An Approach to Access Control under Uncertainty (18 citations)
  • Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS (16 citations)
  • An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks (11 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Computer security
  • Operating system

Ed Dawson mostly deals with Stream cipher, Computer security, Access control, Authenticated encryption and Building information modeling. His Stream cipher study frequently links to related topics such as Theoretical computer science. His study in Theoretical computer science is interdisciplinary in nature, drawing from both eSTREAM, Block cipher and Trivium.

His Computer security research is mostly focused on the topic Role-based access control. His research in the fields of Zero-knowledge proof overlaps with other disciplines such as Soundness. His study explores the link between State and topics such as Cryptography that cross with problems in Encryption.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Multistage secret sharing based on one-way function

J. He;E. Dawson.
Electronics Letters (1994)

274 Citations

Twisted Edwards Curves Revisited

Huseyin Hisil;Kenneth Koon-Ho Wong;Gary Carter;Ed Dawson.
international conference on the theory and application of cryptology and information security (2008)

245 Citations

Multisecret-sharing scheme based on one-way function

J. He;E. Dawson.
Electronics Letters (1995)

187 Citations

Secure key issuing in ID-based cryptography

Byoungcheon Lee;Colin Boyd;Ed Dawson;Kwangjo Kim.
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32 (2004)

184 Citations

Providing Receipt-Freeness In Mixnet-Based Voting Protocols

Byoungcheon Lee;Byoungcheon Lee;Colin Boyd;Edward Dawson;Kwangjo Kim.
international conference on information security and cryptology (2003)

174 Citations

Heuristic Design of Cryptographically Strong Balanced Boolean Functions

William Millan;Andrew J. Clark;Ed Dawson.
theory and application of cryptographic techniques (1998)

168 Citations

A novel identity-based strong designated verifier signature scheme

Baoyuan Kang;Colin Boyd;Ed Dawson.
Journal of Systems and Software (2009)

133 Citations

SKMA: a key management architecture for SCADA systems

Robert Dawson;Colin Boyd;Ed Dawson;Juan Manuel González Nieto.
grid computing (2006)

130 Citations

A computer package for measuring the strength of encryption algorithms

H. Gustafson;E. Dawson;L. Nielsen;W. Caelli.
Computers & Security (1994)

114 Citations

Design and cryptanalysis of transform-based analog speech scramblers

B. Goldburg;S. Sridharan;E. Dawson.
IEEE Journal on Selected Areas in Communications (1993)

101 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Ed Dawson

Daniel J. Bernstein

Daniel J. Bernstein

University of Illinois at Chicago

Publications: 33

Tanja Lange

Tanja Lange

Eindhoven University of Technology

Publications: 32

John A. Clark

John A. Clark

University of Sheffield

Publications: 15

Thomas Johansson

Thomas Johansson

Lund University

Publications: 13

Lein Harn

Lein Harn

University of Missouri–Kansas City

Publications: 12

Harald Niederreiter

Harald Niederreiter

Austrian Academy of Sciences

Publications: 11

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 11

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 10

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 10

Lars R. Knudsen

Lars R. Knudsen

Technical University of Denmark

Publications: 9

Willi Meier

Willi Meier

University of Applied Sciences and Arts Northwestern Switzerland

Publications: 9

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 9

Subhamoy Maitra

Subhamoy Maitra

Indian Statistical Institute

Publications: 8

Eduardo Fernández-Medina

Eduardo Fernández-Medina

University of Castilla-La Mancha

Publications: 8

Peter Schwabe

Peter Schwabe

Radboud University Nijmegen

Publications: 8

Bart Preneel

Bart Preneel

KU Leuven

Publications: 8

Something went wrong. Please try again later.