1. 1976
  2. Published

    The class number of pure fields of prime degree

    Parry, C. J. & Walter, C. D., 1976, In : Mathematika. 23, p. 220-226 7 p.

    Research output: Contribution to journalArticle

  3. Published

    Class Number Relations in Algebraic Number Fields

    Walter, C. D., 1 Apr 1976, University of Cambridge.

    Research output: Book/ReportCommissioned report

  4. 1977
  5. Published

    A class number relation in Frobenius extensions of number fields

    Walter, C. D., 1977, In : Mathematika. 24, p. 216-225 10 p.

    Research output: Contribution to journalArticle

  6. Published

    The class number of pure fields of prime degree (addendum)

    Parry, C. J. & Walter, C. D., 1977, In : Mathematika. 24, p. 122 1 p.

    Research output: Contribution to journalArticle

  7. 1978
  8. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In : Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticle

  9. 1979
  10. Published

    An infinite family of symmetric designs

    Mitchell, C. J., 1979, In : Discrete Mathematics. 26, p. 247-250 4 p.

    Research output: Contribution to journalArticle

  11. Published

    Brauer's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 33-40 8 p.

    Research output: Contribution to journalArticle

  12. Published

    Kuroda's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 41-51 11 p.

    Research output: Contribution to journalArticle

  13. Published

    The ambiguous class group and the genus group of certain non-normal extensions

    Walter, C. D., 1979, In : Mathematika. 26, p. 113-124 12 p.

    Research output: Contribution to journalArticle

  14. 1980
  15. Published

    Pure fields of degree 9 with class number prime to 3

    Walter, C. D., 1980, In : Annales de l'Institut Fourier, Grenoble. 30, p. 1-16 16 p.

    Research output: Contribution to journalArticle

  16. 1982
  17. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In : Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticle

  18. 1983
  19. Published

    Intersection numbers for coherent configurations and the spectrum of a graph

    Walter, C. D., 1983, In : Journal of Combinatorial Theory, Series B. 35, 2, p. 201-204 4 p.

    Research output: Contribution to journalArticle

  20. 1984
  21. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In : Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticle

  23. 1985
  24. Published

    A classification of time element speech scramblers

    Mitchell, C. J. & Piper, F. C., Nov 1985, In : Journal of the Institution of Electronic and Radio Engineers. 55, 11/12, p. 391-396 6 p.

    Research output: Contribution to journalArticle

  25. 1986
  26. Published

    A First Course in Formal Logic and its Applications in Computer Science

    Dowsing, R., Rayward-Smith, V. J. & Walter, C. D., 1986, Blackwell Scientific Publications, Oxford.

    Research output: Book/ReportBook

  27. Published

    Adjacency Matrices

    Walter, C. D., 1986, In : SIAM Journal on Algebraic and Discrete Methods. 7, p. 18-29 12 p.

    Research output: Contribution to journalArticle

  28. 1987
  29. Published

    One-to-one correspondence between slowly decaying interfacial profiles and reflectivity

    Dietrich, S. & Schack, R., 1987, In : Physical Review Letters. 58, p. 140-143 4 p.

    Research output: Contribution to journalArticle

  30. Published

    Permutations with restricted displacement

    Beker, H. J. & Mitchell, C. J., 1987, In : SIAM Journal on Algebraic and Discrete Methods. 8, p. 338-363 26 p.

    Research output: Contribution to journalArticle

  31. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In : Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticle

  32. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In : Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticle

  33. 1988
  34. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In : Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticle

  35. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In : Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticle

  36. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In : Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticle

  37. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In : Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticle

  38. Published

    The security architecture of the secure mobile messaging demonstrator

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1988, Proceedings of UK IT 88. IED, Swansea, p. 171-174 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In : Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticle

  40. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In : Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticle

  41. 1989
  42. Published

    A remark on hash functions for message authentication

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1989, In : Computers and Security. 8, 1, p. 55-58 4 p.

    Research output: Contribution to journalArticle

  43. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In : The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticle

  44. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticle

  45. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticle

  46. Published

    Experiences of SOLO 1000 in research at the University of Edinburgh

    McGregor, M. S., Tomlinson, A. & Tan, O. K., 1989, Electronics Computer Aided Design. Jones, P. L. & Buckley, A. (eds.). Manchester University Press, p. 182-184 3 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Published

    Minimum weight modified signed-digit representations and fast exponentiation

    Jedwab, J. & Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1171-1172 2 p.

    Research output: Contribution to journalArticle

  48. Published

    Multi-destination secure electronic mail

    Mitchell, C. J., 1989, In : The Computer Journal. 32, 1, p. 13-15 3 p.

    Research output: Contribution to journalArticle

  49. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Single--chip 2-port Adapters for Wave Digital Filters

    Tomlinson, A. & Mirza, A. R., 1989, In : Electronics Letters. 25, 23, p. 1553-1555 3 p.

    Research output: Contribution to journalArticle

  51. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    The security issue

    Mitchell, C. J., 1989, Proceedings of Value Added Network Services for Europe, London, September 1989. London: IBC Technical Services Ltd, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    One-stage one-sided rearrangeable switching networks

    Mitchell, C. J. & Wild, P. R., Jan 1989, In : IEEE Transactions on Communications. 37, 1, p. 52-56 5 p.

    Research output: Contribution to journalArticle

  54. Published

    Algorithms for software implementations of RSA

    Selby, A. & Mitchell, C. J., May 1989, In : IEE Proceedings Part E (Computers and Digital Techniques). 136, 3, p. 166-170 5 p.

    Research output: Contribution to journalArticle

  55. Published

    CCITT/ISO standards for secure message handling

    Mitchell, C. J., Walker, M. & Rush, P. D. C., May 1989, In : IEEE Journal on Selected Areas in Communications. 7, 4, p. 517-524 8 p.

    Research output: Contribution to journalArticle

  56. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In : Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticle

  57. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In : Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticle

  58. 1990
  59. Published

    A secure messaging architecture implementing the X.400-1988 security features

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1990, In : The Computer Journal. 33, p. 290-295 6 p.

    Research output: Contribution to journalArticle

  60. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In : Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticle

  61. Published

    Cryptography and Cryptanalysis

    Mitchell, C. J. & Piper, F. C., 1990, Handbook of Applicable Mathematics: Supplement. Ledermann, W., Lloyd, E., Vajda, S. & Alexander, C. (eds.). John Wiley & Sons, p. 53-92 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  62. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In : Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticle

  63. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In : Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticle

  64. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In : Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  66. Published

    Management of secure systems and security within Open Systems Interconnection (OSI)

    Mitchell, C. J., 1990, Proceedings of Information Security: Confidentiality, Integrity and Availability, London, July 1990. Uxbridge: UNICOM Seminars

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Moment hierarchies and cumulants in quantum optics

    Schack, R. & Schenzle, A., 1990, In : Physical Review A. 41, p. 3847-3852 6 p.

    Research output: Contribution to journalArticle

  68. Published

    OSI and X.400 security

    Mitchell, C. J., 1990, Proceedings of Network Management '90, London, March 1990. London: Blenheim Online Ltd, p. 157-167 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Some Remarks on Authentication Systems

    Anthony, M. H. G., Martin, K. M., Seberry, J. & Wild, P. R., 1990, Advances in Cryptology -Auscrypt'90. Springer-Verlag, Vol. 453. p. 122-139 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  70. Published

    Squeezed light from a self-frequency doubling laser

    Sizmann, A., Schack, R. & Schenzle, A., 1990, In : Europhysics Letters. 13, p. 109-115 7 p.

    Research output: Contribution to journalArticle

  71. Published

    A security scheme for resource sharing over a network

    Burns, J. & Mitchell, C. J., Feb 1990, In : Computers and Security. 9, 1, p. 67-75 9 p.

    Research output: Contribution to journalArticle

  72. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In : Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticle

  73. Published

    Modulo Multiplier to enhance encryption rates

    Tomlinson, A., 1 Apr 1990, In : Electronic Engineering. 62, 760, p. 25 1 p.

    Research output: Contribution to journalArticle

  74. 1991
  75. Published

    Dynamics and symmetry of a laser with a squeezed reservoir

    Ginzel, C., Schack, R. & Schenzle, A., 1991, In : J. Opt. Soc. Am. B. 8, p. 1704-1711 8 p.

    Research output: Contribution to journalArticle

  76. Published

    Fast Modular Multiplication using 2-Power Radix

    Walter, C. D., 1991, In : International J. of Computer Mathematics. 3, p. 21-28 8 p.

    Research output: Contribution to journalArticle

  77. Published

    Formal Methods

    Walter, C. D., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 135-138 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  78. Published

    Formal Specification and Verification of Software

    Walter, C. D. & Eldridge, S. E., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 331-338 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  79. Published

    Positive P representation

    Schack, R. & Schenzle, A., 1991, In : Physical Review A. 44, p. 682-687 6 p.

    Research output: Contribution to journalArticle

  80. Published

    Squeezed light from a laser with an internal chi2-nonlinear element

    Schack, R., Sizmann, A. & Schenzle, A., 1991, In : Physical Review A. 43, p. 6303 1 p.

    Research output: Contribution to journalArticle

  81. Published

    The Geometry of Shared Secret Schemes

    Martin, K. M., Simmons, G. J. & Jackson, W-A., 1991, In : Bulletin of the ICA. 1, p. 71-88 18 p.

    Research output: Contribution to journalArticle

  82. Published

    Modified forms of cipher block chaining

    Mitchell, C. J. & Varadharajan, V., Feb 1991, In : Computers and Security. 10, 1, p. 37-40

    Research output: Contribution to journalArticle

  83. 1992
  84. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In : IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticle

  85. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In : J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticle

  86. Published
  87. Published

    Digital signatures

    Mitchell, C. J., Piper, F. C. & Wild, P., 1992, Contemporary cryptology: The science of information integrity . Simmons, G. J. (ed.). IEEE, p. 325-378 54 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Information and entropy in the baker's map

    Schack, R. & Caves, C. M., 1992, In : Physical Review Letters. 69, p. 3413-3416 4 p.

    Research output: Contribution to journalArticle

  90. Published

    Quantum-nondemolition measurement of small photon numbers and the preparation of number states

    Schack, R., Breitenbach, A. & Schenzle, A., 1992, In : Physical Review A. 45, p. 3260-3267 8 p.

    Research output: Contribution to journalArticle

  91. Published

    Resolvable Designs Applicable to Cryptographic Authentication Schemes

    Martin, K. M., Seberry, J. & Wild, P., 1992, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 12, p. 153-160 8 p.

    Research output: Contribution to journalArticle

  92. 1993
  93. Published

    B-ISDN implementation via satellite: the catalyst project

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F. & Smythe, C., 1993, Teletraffic Symposium, 10th. Performance Engineering in Telecommunications Network, Tenth UK. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Coding schemes for two-dimensional position sensing

    Burns, J. & Mitchell, C. J., 1993, Cryptography and Coding III: Proceedings of the third IMA Cryptography and Coding Conference, Cirencester, December 1991. Ganley, M. J. (ed.). Oxford University Press, p. 31-66 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Cumulative Arrays and Geometric Secret Sharing Schemes

    Jackson, W-A. & Martin, K. M., 1993, Advances in Cryptology: Auscrypt '92. Springer, Vol. 718. p. 48-55 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Hardware Implementation of Montgomery's Modular Multiplication Algorithm

    Eldridge, S. E. & Walter, C. D., 1993, In : IEEE Transactions on Computers. 42, 6, p. 693-699 7 p.

    Research output: Contribution to journalArticle

  99. Published

    Hypersensitivity to perturbations in the quantum baker's map

    Schack, R. & Caves, C. M., 1993, In : Physical Review Letters. 71, p. 525-528 4 p.

    Research output: Contribution to journalArticle

  100. Published

    Information and available work in the perturbed baker's map

    Schack, R. & Caves, C. M., 1993, Workshop on Physics and Computation: PhysComp '92. Los Alamitos, California: IEEE Computer Society Press, p. 69-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Management of secure systems and security within OSI

    Mitchell, C. J., 1993, Information Security. Ettinger, J. E. (ed.). Chapman & Hall, p. 47-60 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  102. Published

    New Secret Sharing Schemes from Old

    Martin, K. M., 1993, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 14, p. 65-77 13 p.

    Research output: Contribution to journalArticle

  103. Unpublished

    On sequences and arrays with specific window properties

    Paterson, K. G., 1993, (Unpublished)

    Research output: ThesisDoctoral Thesis

  104. Published

    Orientable Sequences

    Martin, K. M., Dai, Z. D., Robshaw, M. J. B. & Wild, P. R., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 97-115 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  105. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In : Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticle

  106. Published

    Systolic Modular Multiplication

    Walter, C. D., 1993, In : IEEE Transactions on Computers. 42, 3, p. 376-378 3 p.

    Research output: Contribution to journalArticle

  107. Published

    Untrustworthy Participants in Secret Sharing Schemes

    Martin, K. M., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 255-264 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  108. 1994
  109. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In : IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticle

  110. Published

    A Weak Cipher that Generates the Symmetric Group

    Murphy, S., Paterson, K. G. & Wild, P. R., 1994, In : Journal of Cryptology. 7, p. 61-65 5 p.

    Research output: Contribution to journalArticle

  111. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In : International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  112. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In : Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticle

  113. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In : Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticle

  114. Published

    Decoding Perfect Maps

    Mitchell, C. J. & Paterson, K. G., 1994, In : Designs, Codes and Cryptography. 4, p. 11-30 20 p.

    Research output: Contribution to journalArticle

  115. Published

    Enumeration within Isoclinism Classes of Groups of Prime Power Order

    Blackburn, S. R., 1994, In : Journal of the London Mathematical Society. 50, p. 293-304 12 p.

    Research output: Contribution to journalArticle

  116. Published

    Geometric Secret Sharing Schemes and their Duals

    Martin, K. M. & Jackson, W-A., 1994, In : Designs, Codes and Cryptography. 4, p. 83-95 13 p.

    Research output: Contribution to journalArticle

  117. Published

    Improving Average Delay for On-Line Algorithms

    Walter, C. D., 1994, In : Electronics Letters. 30, 23, p. 1925-6 1 p.

    Research output: Contribution to journalArticle

  118. Published

    Increasing the Rate of Output of m-Sequences

    Blackburn, S. R., 1994, In : Information Processing Letters. 51, p. 73-77 5 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...20 Next