Seguir
Joanne Fuller
Joanne Fuller
Senior Researcher, ConsenSys
Dirección de correo verificada de consensys.net
Título
Citado por
Citado por
Año
Trust and power as determinants of tax compliance across 44 nations
L Batrancea, A Nichita, J Olsen, C Kogler, E Kirchler, E Hoelzl, A Weiss, ...
Journal of Economic Psychology 74, 102191, 2019
2462019
Linear redundancy in S-boxes
J Fuller, W Millan
International Workshop on fast software encryption, 74-86, 2003
1212003
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
852005
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
632002
Multi-objective optimisation of bijective S-boxes
J Fuller, W Millan, E Dawson
New Generation Computing 23, 201-218, 2005
522005
Analysis of affine equivalent Boolean functions for cryptography
JE Fuller
Queensland University of Technology, 2003
472003
On linear Redundancy in the AES S-Box
J Fuller, W Millan
Cryptology ePrint Archive, 2002
452002
New concepts in evolutionary search for Boolean functions in cryptology
W Millan, J Fuller, E Dawson
Computational Intelligence 20 (3), 463-474, 2004
402004
Semi‐parametric Forecasting of Spikes in Electricity Prices
A Clements, J Fuller, S Hurn
Economic Record 89 (287), 508-521, 2013
262013
Formal verification of the ethereum 2.0 beacon chain
F Cassez, J Fuller, A Asgaonkar
International Conference on Tools and Algorithms for the Construction and …, 2022
232022
Evolutionary generation of bent functions for cryptography
J Fuller, E Dawson, W Millan
The 2003 Congress on Evolutionary Computation, 2003. CEC'03. 3, 1655-1661, 2003
222003
Forecasting increases in the VIX: A time-varying long volatility hedge for equities
A Clements, J Fuller
NCER Working Paper Series, 2012
142012
Dawson
K Chen, M Henrickson, W Millan, J Fuller, A Simpson
Hoonjae Lee, Sangjae Moon,“Dragon: A Fast Word Based Stream Cipher,” LNCS 3505, 2004
132004
Engaging students in large classes using Elluminate
J Fuller
ATEC2009 14th Annual Australasian Teaching Economics Conference What does …, 2009
102009
Deductive verification of smart contracts with Dafny
F Cassez, J Fuller, HMA Quiles
International Conference on Formal Methods for Industrial Critical Systems …, 2022
92022
Evolutionary generation of bent functions for cryptography
W Millan, J Fuller, E Dawson
Proceedings of Conference on Evolutionary Computation. CEC 2003. Canberra …, 2003
52003
Efficient algorithms for analysis of cryptographic Boolean functions
J Fuller, W Millan, E Dawson
13th Australasian Workshop on Combinatorial Algorithms (AWOCA 2002), 133-150, 2002
52002
Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson, The LILI-II Keystream Generator, proceedings of ACISP 2002
A Clark
Lecture Notes in Computer Science 2384, 25-39, 0
5
Formal and executable semantics of the ethereum virtual machine in dafny
F Cassez, J Fuller, MK Ghale, DJ Pearce, HMA Quiles
International Symposium on Formal Methods, 571-583, 2023
42023
Dragon: A fast word based stream cipher. in eSTREM, ECRYPT Stream Cipher Project
K Chen, M Henricken, W Millan, J Fuller, L Simpson, E Dawson, H Lee, ...
Report 2005 6, 2005
42005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20