1. 1993
  2. Published

    Untrustworthy Participants in Secret Sharing Schemes

    Martin, K. M., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 255-264 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. 1992
  4. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In: IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published
  7. Published

    Digital signatures

    Mitchell, C. J., Piper, F. C. & Wild, P., 1992, Contemporary cryptology: The science of information integrity . Simmons, G. J. (ed.). IEEE, p. 325-378 54 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Information and entropy in the baker's map

    Schack, R. & Caves, C. M., 1992, In: Physical Review Letters. 69, p. 3413-3416 4 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Quantum-nondemolition measurement of small photon numbers and the preparation of number states

    Schack, R., Breitenbach, A. & Schenzle, A., 1992, In: Physical Review A. 45, p. 3260-3267 8 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Resolvable Designs Applicable to Cryptographic Authentication Schemes

    Martin, K. M., Seberry, J. & Wild, P., 1992, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 12, p. 153-160 8 p.

    Research output: Contribution to journalArticlepeer-review

  12. 1991
  13. Published

    Modified forms of cipher block chaining

    Mitchell, C. J. & Varadharajan, V., Feb 1991, In: Computers and Security. 10, 1, p. 37-40

    Research output: Contribution to journalArticlepeer-review