From Wikipedia, the free encyclopedia

Gregory G. "Greg" Rose (born July 15, 1955, in Sydney, Australia) was a senior vice president of technology for Qualcomm. [1] [2]

Rose is noted for designing the SOBER family of stream ciphers for wireless telephony. [3] Together with Philip Hawkes, he also designed Turing, a cipher system based on the SOBER-t32. [4] It was developed to address encryption issues, particularly the limitations to processing power, program space, and memory present in software encryption algorithms. [5]

Selected publications

  • "Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers" [6]

References

  1. ^ "Chair honours UNIX veteran". Sydney Morning Herald. November 24, 2005. Retrieved May 20, 2010.
  2. ^ Sturdevant, Cameron (March 6, 2006). "Give Secure Code a Chance; Architecture-level views, automation and outsourcing are key". eWeek. 23 (10): 35–36. ProQuest  198567722.
  3. ^ Knudsen, Lars (2003). Fast Software Encryption: 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999 Proceedings. Berlin: Springer. p. 305. ISBN  354066226X.
  4. ^ Robshaw, Matthew; Billet, Olivier (2008). New Stream Cipher Designs: The ESTREAM Finalists. Berlin: Springer Science & Business Media. p. 58. ISBN  9783540683506.
  5. ^ Johansson, Thomas (2003). Fast Software Encryption: 10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers. Berlin: Springer Science & Business Media. p. 290. ISBN  3540204490.
  6. ^ Association for Computing Machinery portal

External links


From Wikipedia, the free encyclopedia

Gregory G. "Greg" Rose (born July 15, 1955, in Sydney, Australia) was a senior vice president of technology for Qualcomm. [1] [2]

Rose is noted for designing the SOBER family of stream ciphers for wireless telephony. [3] Together with Philip Hawkes, he also designed Turing, a cipher system based on the SOBER-t32. [4] It was developed to address encryption issues, particularly the limitations to processing power, program space, and memory present in software encryption algorithms. [5]

Selected publications

  • "Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers" [6]

References

  1. ^ "Chair honours UNIX veteran". Sydney Morning Herald. November 24, 2005. Retrieved May 20, 2010.
  2. ^ Sturdevant, Cameron (March 6, 2006). "Give Secure Code a Chance; Architecture-level views, automation and outsourcing are key". eWeek. 23 (10): 35–36. ProQuest  198567722.
  3. ^ Knudsen, Lars (2003). Fast Software Encryption: 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999 Proceedings. Berlin: Springer. p. 305. ISBN  354066226X.
  4. ^ Robshaw, Matthew; Billet, Olivier (2008). New Stream Cipher Designs: The ESTREAM Finalists. Berlin: Springer Science & Business Media. p. 58. ISBN  9783540683506.
  5. ^ Johansson, Thomas (2003). Fast Software Encryption: 10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers. Berlin: Springer Science & Business Media. p. 290. ISBN  3540204490.
  6. ^ Association for Computing Machinery portal

External links



Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook