1. Submitted

    A Complete Analysis of the BKZ Lattice Reduction Algorithm

    Li, J. & Nguyen, P. Q., 2020, (Submitted) TBC.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies

    Eagles, K., Markantonakis, K. & Mayes, K., 2007, Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. Berlin, Heidelberg: Springer-Verlag, p. 161-174 14 p. (WISTP'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticle

  6. Published

    A combinatorial framework for frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., 2014, Proceedings of the Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory. p. 271 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    A Combinatorial Approach for Frequency Hopping Schemes

    Nyirenda, M., 14 Nov 2017, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  8. Published

    A collaborative framework for generating probabilistic contracts

    Martinelli, F., Saracino, A., Sgandurra, D. & Aldini, A., 1 May 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS). p. 139-142 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Paterson, K., Polychroniadou, A. & Sibborn, D., 2012, ASIACRYPT 2012. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 386-403 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A cluster-based approach to consensus based distributed task allocation

    Smith, D., Wetherall, J., Woodhead, S. & Adekunle, A., 2014, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing. p. 428-431 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A classification of time element speech scramblers

    Mitchell, C. J. & Piper, F. C., Nov 1985, In : Journal of the Institution of Electronic and Radio Engineers. 55, 11/12, p. 391-396 6 p.

    Research output: Contribution to journalArticle

  13. Published

    A class number relation in Frobenius extensions of number fields

    Walter, C. D., 1977, In : Mathematika. 24, p. 216-225 10 p.

    Research output: Contribution to journalArticle

  14. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In : Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticle

  15. E-pub ahead of print
  16. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In : Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticle

  17. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2007, 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2020, (Submitted).

    Research output: Working paper

  19. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In : Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticle

  20. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In : NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  23. Published

    A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks

    Askoxylakis, I. G., Sauveron, D., Markantonakis, K., Tryfonas, T. & Traganitis, A., 2008, Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Washington, DC, USA: IEEE Computer Society Press, p. 193-202 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A board game for teaching internet engineering

    Komisarczuk, P. & Welch, I., 2006, Proceedings of the 8th Australasian Conference on Computing Education-Volume 52. p. 117-123 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Bit-fixing PRF with O(1) Collusion-Resistance from LWE

    Davidson, A. & Nishimaki, R., 21 Sep 2018, In : IACR Cryptology ePrint Archive. 2018, 890, p. 1-25 25 p.

    Research output: Contribution to journalArticle