1. 1997
  2. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In: Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In: SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In: Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Fast Rational Interpolation, Reed--Solomon Decoding and the Linear Complexity Profiles of Sequences

    Blackburn, S. R., 1997, In: IEEE Transactions on Information Theory. 43, 2, p. 537-548 12 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains

    Martin, K. M., 1997, Cryptography and Coding. Springer, Vol. 1355. p. 221-232 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Interconnection Networks Based on Two-dimensional de Bruijn Graphs

    Paterson, K. G., 1997, Applications of Combinatorial Mathematics. Mithcell, C. J. (ed.). Oxford: Clarendon Press, (The Institute of Mathematics and Its Applications Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Multisender authentication systems with unconditional security

    Martin, K. M. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 130-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    Mutually Trusted Authority free Secret Sharing Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1997, In: Journal of Cryptology. 10, p. 261-289 29 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Network provider domain federation in TINA

    Pavón, J., Montes, E. & Komisarczuk, P., 1997, Global Convergence of Telecommunications and Distributed Object Computing, 1997. Proceedings., TINA 97. p. 334-342 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Secret Sharing in Hierarchical Groups

    Charnes, C., Martin, K. M., Pieprzyk, J. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 81-86 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Space/Time Trade-Offs for Higher Radix Modular Multiplication using Repeated Addition

    Walter, C. D., 1997, In: IEEE Transactions on Computers. 46, 2, p. 139-141 3 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    The Sajdak Conjecture

    Blackburn, S. R., 1997, In: Math. Spectrum. 30, No. 1, p. 15-16 2 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Unpredictability, information, and chaos

    Caves, C. M. & Schack, R., 1997, In: Complexity. 3, p. 46-57 12 p.

    Research output: Contribution to journalArticlepeer-review

  21. 1996
  22. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In: Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In: Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In: IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In: Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticlepeer-review