1. 1988
  2. Published

    The security architecture of the secure mobile messaging demonstrator

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1988, Proceedings of UK IT 88. IED, Swansea, p. 171-174 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticlepeer-review

  5. 1989
  6. Published

    A remark on hash functions for message authentication

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1989, In: Computers and Security. 8, 1, p. 55-58 4 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In: The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Experiences of SOLO 1000 in research at the University of Edinburgh

    McGregor, M. S., Tomlinson, A. & Tan, O. K., 1989, Electronics Computer Aided Design. Jones, P. L. & Buckley, A. (eds.). Manchester University Press, p. 182-184 3 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Minimum weight modified signed-digit representations and fast exponentiation

    Jedwab, J. & Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1171-1172 2 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Multi-destination secure electronic mail

    Mitchell, C. J., 1989, In: The Computer Journal. 32, 1, p. 13-15 3 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Single--chip 2-port Adapters for Wave Digital Filters

    Tomlinson, A. & Mirza, A. R., 1989, In: Electronics Letters. 25, 23, p. 1553-1555 3 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    The security issue

    Mitchell, C. J., 1989, Proceedings of Value Added Network Services for Europe, London, September 1989. London: IBC Technical Services Ltd, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    One-stage one-sided rearrangeable switching networks

    Mitchell, C. J. & Wild, P. R., Jan 1989, In: IEEE Transactions on Communications. 37, 1, p. 52-56 5 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Algorithms for software implementations of RSA

    Selby, A. & Mitchell, C. J., May 1989, In: IEE Proceedings Part E (Computers and Digital Techniques). 136, 3, p. 166-170 5 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    CCITT/ISO standards for secure message handling

    Mitchell, C. J., Walker, M. & Rush, P. D. C., May 1989, In: IEEE Journal on Selected Areas in Communications. 7, 4, p. 517-524 8 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In: Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In: Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticlepeer-review

  22. 1990
  23. Published

    A secure messaging architecture implementing the X.400-1988 security features

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1990, In: The Computer Journal. 33, p. 290-295 6 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In: Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Cryptography and Cryptanalysis

    Mitchell, C. J. & Piper, F. C., 1990, Handbook of Applicable Mathematics: Supplement. Ledermann, W., Lloyd, E., Vajda, S. & Alexander, C. (eds.). John Wiley & Sons, p. 53-92 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In: Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In: Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...85 Next