1. 1998
  2. Published

    In Search of Multiple Domain Key Recovery

    Knudsen, L. R. & Martin, K. M., 1998, In: Journal of Computer Security. 6, 4, p. 219-236 18 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Java card technology and security

    Markantonakis, K., 1998, In: Information Security Technical Report. 3, 2, p. 82 - 89

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In: Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    On integer-valued rational polynomials and depth distributions of binary codes

    Mitchell, C. J., 1998, In: IEEE Transactions on Information Theory. 44, p. 3146-3150 5 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Optimal linear perfect hash families

    Blackburn, S. R. & Wild, P. R., 1998, In: Journal of Combinatorial Theory, Series A. 83, p. 233-250 18 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Orthogonal Sequences of Polynomials over Arbitrary Fields

    Blackburn, S. R., 1998, In: Journal of Number Theory. 68, 1, p. 99-111 13 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Perfect Factors from Cyclic Codes and Interleaving

    Mitchell, C. J. & Paterson, K. G., 1998, In: SIAM Journal on Discrete Mathematics. 11, p. 241-264 24 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering

    Paterson, K. G., 1998, In: Designs, Codes and Cryptography. 14, p. 247-259 13 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Secure Billing for Mobile Information Services in UMTS

    Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H. J., Horn, G., Poliakova, A. & Howard, P., 1998, Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, 25-28 May 1998) . Trigila, S., Mullery, A., Campolargo, M. & Mampaey, M. (eds.). Springer-Verlag, Vol. 1430. p. 535-548 14 p. (Lecture Notes in Computer Science; no. 1430).

    Research output: Chapter in Book/Report/Conference proceedingChapter