1. Article › Research › Peer-reviewed
  2. Published

    Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

    Albrecht, M., Deo, A. & Paterson, K., 14 Aug 2018, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 173-213 41 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A., 1998, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Comment - Signature with message recovery

    Mitchell, C. J. & Yeun, C. Y., 1999, In: Electronics Letters. 35, p. 217 1 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In: Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Comment on "Exponential sensitivity and chaos in quantum systems"

    Schack, R., 1995, In: Physical Review Letters. 75, p. 581 1 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In: Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In: Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In: Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In: Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Commoning mobility: Towards a new politics of mobility transitions

    Nikolaeva, A., Adey, P., Cresswell, T., Jeonjae Lee, J., Novoa, A. & Temenos, C., Jun 2019, In: Transactions of the Institute of British Geographers. 44, 2, p. 346-360 15 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In: EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Computing the error linear complexity spectrum of a binary sequence of period 2^n

    Lauder, A. G. B. & Paterson, K. G., 2003, In: IEEE Transactions on Information Theory. 49, 1, p. 273-280 8 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., 2009, In: Computers and Security. 28, 7, p. 615 - 627

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Conformal prediction of biological activity of chemical compounds

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 105–123 19 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In: Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In: Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticlepeer-review

  24. E-pub ahead of print

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., Jul 2022, In: IEEE Transactions on Information Theory. 68, 7, p. 4782-4789 8 p.

    Research output: Contribution to journalArticlepeer-review

  25. E-pub ahead of print

    Criminal use of cryptocurrencies: a great new threat or is cash still king?

    Butler, S., 20 Nov 2019, (E-pub ahead of print) In: Journal of Cyber Policy. p. 1-20 20 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Criteria of efficiency for set-valued classification

    Vovk, V., Nouretdinov, I., Fedorova, V., Petej, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 21-46 26 p.

    Research output: Contribution to journalArticlepeer-review