Follow
Joanne Fuller
Joanne Fuller
Senior Researcher, ConsenSys
Verified email at consensys.net
Title
Cited by
Cited by
Year
Trust and power as determinants of tax compliance across 44 nations
L Batrancea, A Nichita, J Olsen, C Kogler, E Kirchler, E Hoelzl, A Weiss, ...
Journal of Economic Psychology 74, 102191, 2019
2442019
Linear redundancy in S-boxes
J Fuller, W Millan
International Workshop on fast software encryption, 74-86, 2003
1212003
Dragon: A fast word based stream cipher
K Chen, M Henricksen, W Millan, J Fuller, L Simpson, E Dawson, HJ Lee, ...
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
852005
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
632002
Multi-objective optimisation of bijective S-boxes
J Fuller, W Millan, E Dawson
New Generation Computing 23, 201-218, 2005
522005
Analysis of affine equivalent Boolean functions for cryptography
JE Fuller
Queensland University of Technology, 2003
472003
On linear Redundancy in the AES S-Box
J Fuller, W Millan
Cryptology ePrint Archive, 2002
452002
New concepts in evolutionary search for Boolean functions in cryptology
W Millan, J Fuller, E Dawson
Computational Intelligence 20 (3), 463-474, 2004
402004
Semi‐parametric Forecasting of Spikes in Electricity Prices
A Clements, J Fuller, S Hurn
Economic Record 89 (287), 508-521, 2013
262013
Formal verification of the ethereum 2.0 beacon chain
F Cassez, J Fuller, A Asgaonkar
International Conference on Tools and Algorithms for the Construction and …, 2022
232022
Evolutionary generation of bent functions for cryptography
J Fuller, E Dawson, W Millan
The 2003 Congress on Evolutionary Computation, 2003. CEC'03. 3, 1655-1661, 2003
222003
Forecasting increases in the VIX: A time-varying long volatility hedge for equities
A Clements, J Fuller
NCER Working Paper Series, 2012
142012
Dawson
K Chen, M Henrickson, W Millan, J Fuller, A Simpson
Hoonjae Lee, Sangjae Moon,“Dragon: A Fast Word Based Stream Cipher,” LNCS 3505, 2004
132004
Engaging students in large classes using Elluminate
J Fuller
ATEC2009 14th Annual Australasian Teaching Economics Conference What does …, 2009
102009
Deductive verification of smart contracts with Dafny
F Cassez, J Fuller, HMA Quiles
International Conference on Formal Methods for Industrial Critical Systems …, 2022
92022
Evolutionary generation of bent functions for cryptography
W Millan, J Fuller, E Dawson
Proceedings of Conference on Evolutionary Computation. CEC 2003. Canberra …, 2003
52003
Efficient algorithms for analysis of cryptographic Boolean functions
J Fuller, W Millan, E Dawson
13th Australasian Workshop on Combinatorial Algorithms (AWOCA 2002), 133-150, 2002
52002
Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson, The LILI-II Keystream Generator, proceedings of ACISP 2002
A Clark
Lecture Notes in Computer Science 2384, 25-39, 0
5
Formal and executable semantics of the ethereum virtual machine in dafny
F Cassez, J Fuller, MK Ghale, DJ Pearce, HMA Quiles
International Symposium on Formal Methods, 571-583, 2023
42023
Dragon: A fast word based stream cipher. in eSTREM, ECRYPT Stream Cipher Project
K Chen, M Henricken, W Millan, J Fuller, L Simpson, E Dawson, H Lee, ...
Report 2005 6, 2005
42005
The system can't perform the operation now. Try again later.
Articles 1–20