Trust and power as determinants of tax compliance across 44 nations L Batrancea, A Nichita, J Olsen, C Kogler, E Kirchler, E Hoelzl, A Weiss, ... Journal of Economic Psychology 74, 102191, 2019 | 244 | 2019 |
Linear redundancy in S-boxes J Fuller, W Millan International Workshop on fast software encryption, 74-86, 2003 | 121 | 2003 |
Dragon: A fast word based stream cipher K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ... Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 85 | 2005 |
The LILI-II keystream generator A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ... Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002 | 63 | 2002 |
Multi-objective optimisation of bijective S-boxes J Fuller, W Millan, E Dawson New Generation Computing 23, 201-218, 2005 | 52 | 2005 |
Analysis of affine equivalent Boolean functions for cryptography JE Fuller Queensland University of Technology, 2003 | 47 | 2003 |
On linear Redundancy in the AES S-Box J Fuller, W Millan Cryptology ePrint Archive, 2002 | 45 | 2002 |
New concepts in evolutionary search for Boolean functions in cryptology W Millan, J Fuller, E Dawson Computational Intelligence 20 (3), 463-474, 2004 | 40 | 2004 |
Semi‐parametric Forecasting of Spikes in Electricity Prices A Clements, J Fuller, S Hurn Economic Record 89 (287), 508-521, 2013 | 26 | 2013 |
Formal verification of the ethereum 2.0 beacon chain F Cassez, J Fuller, A Asgaonkar International Conference on Tools and Algorithms for the Construction and …, 2022 | 23 | 2022 |
Evolutionary generation of bent functions for cryptography J Fuller, E Dawson, W Millan The 2003 Congress on Evolutionary Computation, 2003. CEC'03. 3, 1655-1661, 2003 | 22 | 2003 |
Forecasting increases in the VIX: A time-varying long volatility hedge for equities A Clements, J Fuller NCER Working Paper Series, 2012 | 14 | 2012 |
Dawson K Chen, M Henrickson, W Millan, J Fuller, A Simpson Hoonjae Lee, Sangjae Moon,“Dragon: A Fast Word Based Stream Cipher,” LNCS 3505, 2004 | 13 | 2004 |
Engaging students in large classes using Elluminate J Fuller ATEC2009 14th Annual Australasian Teaching Economics Conference What does …, 2009 | 10 | 2009 |
Deductive verification of smart contracts with Dafny F Cassez, J Fuller, HMA Quiles International Conference on Formal Methods for Industrial Critical Systems …, 2022 | 9 | 2022 |
Evolutionary generation of bent functions for cryptography W Millan, J Fuller, E Dawson Proceedings of Conference on Evolutionary Computation. CEC 2003. Canberra …, 2003 | 5 | 2003 |
Efficient algorithms for analysis of cryptographic Boolean functions J Fuller, W Millan, E Dawson 13th Australasian Workshop on Combinatorial Algorithms (AWOCA 2002), 133-150, 2002 | 5 | 2002 |
Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson, The LILI-II Keystream Generator, proceedings of ACISP 2002 A Clark Lecture Notes in Computer Science 2384, 25-39, 0 | 5 | |
Formal and executable semantics of the ethereum virtual machine in dafny F Cassez, J Fuller, MK Ghale, DJ Pearce, HMA Quiles International Symposium on Formal Methods, 571-583, 2023 | 4 | 2023 |
Dragon: A fast word based stream cipher. in eSTREM, ECRYPT Stream Cipher Project K Chen, M Henricken, W Millan, J Fuller, L Simpson, E Dawson, H Lee, ... Report 2005 6, 2005 | 4 | 2005 |