1. 2000
  2. Published

    Classical limit in terms of symbolic dynamics for the quantum baker's map

    Soklakov, A. N. & Schack, R., 2000, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 61, p. 5108-5114 7 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Comment: Horng's identification scheme based on Shamir's 'RSA for paranoids'

    Mitchell, C. J. & Ng, S-L., 2000, In: Electronics Letters. 36, 5, p. 422-422 1 p.

    Research output: Contribution to journalComment/debatepeer-review

  4. Published

    Conflict of interest policies: A general approach

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  5. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Developments in security mechanism standards

    Mitchell, C. J., 2000, Internet and Intranet Security Management: Risks and Solutions. Janczewski, L. J. (ed.). Idea Group Publishing, p. 185-246 62 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Efficient Decoding Algorithms for Generalised Reed-Muller Codes

    Paterson, K. G. & Jones, A. E., 2000, In: IEEE Transactions on Communications. 48, 8, p. 1272-1285 14 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Explicit product ensembles for separable quantum states

    Schack, R. & Caves, C. M., 2000, In: J. Mod. Opt.. 47, p. 387-399 13 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Generalised Reed-Muller Codes and Power Control in OFDM

    Paterson, K. G., 2000, In: IEEE Transactions on Information Theory. 46, 1, p. 104-120 17 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution