1. Published

    The physically observable security of signature schemes

    Dent, A. W. & Malone-Lee, J., 2005, Cryptography and Coding: 10th IMA International Conference. Smart, N. P. (ed.). Springer-Verlag, p. 220-232 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. Published

    The Principal Principle and Probability in the Many-Worlds interpretation

    Schack, R., 2010, Many Worlds? Everett, Quantum Theory, and Reality. S., S., J., B., A., K. & D., W. (eds.). Oxford: Oxford University Press, p. 467-475

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    The probability that a pair of elements of a finite group are conjugate

    Blackburn, S. R., Britnell, J. R. & Wildon, M., 2012, In: Journal of the London Mathematical Society. 86, 3, p. 755-778

    Research output: Contribution to journalArticlepeer-review

  4. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  5. Published

    The Problem with Curtains: Public Attitudes to Encryption and the Dilemma they Create

    Haggman, A., 19 Aug 2015.

    Research output: Contribution to conferencePaperpeer-review

  6. Published

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    The RAKAPOSHI Stream Cipher

    Cid, C., Kiyomoto, S. & Kurihara, J., 2009, Information and Communications Security, 11th International Conference, ICICS 2009. Springer, Vol. 5927. p. 32-46 15 p. (Lecture Notes in Computer Sciences - LNCS; vol. 5927).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L., Aug 2016, In: Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    The rise and fall and rise of combinatorial key predistribution

    Martin, K. M., 2011, Selected Areas in Cryptography. Springer, Vol. 6544. p. 93-98 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In: Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticlepeer-review