1. 2001
  2. Published

    Actual and perceived levels of risk in consumer e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2001, Proceedings - 2nd International We-B Conference 2001, Perth, Western Australia, November 2001. p. 207-216 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In : Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticle

  5. Published

    Comments on ``Dynamic Participation in a Secure Conference Scheme for Mobile Communications''.

    Ng, S-L., 2001, In : IEEE Transaction on Vehicular Technology. 50, 1, p. 334-335

    Research output: Contribution to journalComment/debate

  6. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In : EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticle

  7. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In : Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticle

  8. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In : Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticle

  11. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W., 2001, Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?

    Markantonakis, K., 2001, Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge. Kluwer, B.V., p. 77-92 16 p. (IFIP/Sec '01).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    On k-arcs Covering a Line in Finite Projective Planes.

    Ng, S-L. & Wild, P., 2001, In : Ars Combinatoria. 58, p. 289-300

    Research output: Contribution to journalArticle

  17. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    On the composition of matroids and ideal secret sharing schemes.

    Ng, S-L. & Walker, M., 2001, In : Designs, Codes and Cryptography. 24, p. 49-67

    Research output: Contribution to journalArticle

  19. Unpublished

    On the theory of point-weight designs

    Dent, A. W., 2001, (Unpublished)

    Research output: ThesisDoctoral Thesis

  20. Published

    Quantum Bayes rule

    Schack, R., Brun, T. A. & Caves, C. M., 2001, In : Physical Review A. 64, p. 014305 1 p.

    Research output: Contribution to journalArticle

  21. Published

    Quantum computing with separable states?

    Schack, R., 2001, Macroscopic Quantum Coherence and Quantum Computing. Averin, D. V., Ruggiero, B. & Silvestrini, P. (eds.). New York: Kluwer, p. 285

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Simple algorithm for local conversion of pure states

    Jensen, J. G. & Schack, R., 2001, In : Physical Review A. 63, p. 062303 1 p.

    Research output: Contribution to journalArticle

  24. Published

    Single Track Circuit Codes

    Hiltgen, A. P. & Paterson, K. G., 2001, In : IEEE Transactions on Information Theory. 47, 6, p. 2587-2595 9 p.

    Research output: Contribution to journalArticle

  25. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    The completion of a poset in a lattice of antichains

    Crampton, J. & Loizou, G., 2001, In : International Mathematical Journal. 1, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  27. Published

    Thwarting timing attacks using ATM networks

    Price, G., 2001, Security Protocols, 9th International Workshop, Cambridge, UK. 25-27 April, 2001. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  28. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In : IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticle

  31. 2000
  32. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In : Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticle

  33. Published

    Improved Linear Systolic Array for Fast Modular Exponentiation

    Walter, C. D., 1 Sep 2000, In : IEE Proc. Computers and Digital Techniques. 147, 5, p. 323-328 6 p.

    Research output: Contribution to journalArticle

  34. Published

    Making serial number based authentication robust against loss of state

    Mitchell, C. J., Jul 2000, In : Operating Systems Review. 34, 3, p. 56-59 4 p.

    Research output: Contribution to journalArticle

  35. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2000, In : Information Security Technical Report. 5, 2, p. 1

    Research output: Contribution to journalArticle

  36. Published

    A New Family of Extended Generalized Quadrangles of Order (q+1, q-1).

    Ng, S-L. & Wild, P., 2000, In : European Journal of Combinatorics. 21, p. 395-406

    Research output: Contribution to journalArticle

  37. Published

    Baby-step giant-step algorithms for non-uniform distributions

    Blackburn, S. R. & Teske, E., 2000, Proceedings of ANTS IV. Bosma, W. (ed.). Berlin: Springer, p. 153-168 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Published

    Bieberbach groups with finite commutator quotient and point-group C_p^n x C_p^m

    Cid, C., 2000, In : Journal of Group Theory. 3, 2, p. 113-125 13 p.

    Research output: Contribution to journalArticle

  39. Published

    Broadening the scope of Fault Tolerance within Secure services

    Price, G., 2000, Security Protocols, 8th International Workshop, Cambridge, UK. 3-5 April, 2000. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    Certificate translation

    Borselius, N. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 289-300 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Certification of secure RSA keys

    Blackburn, S. R. & Galbraith, S. D., 2000, In : Electronics Letters. 36, 1, p. 29-30 2 p.

    Research output: Contribution to journalArticle

  42. Published

    Classical limit in terms of symbolic dynamics for the quantum baker's map

    Soklakov, A. N. & Schack, R., 2000, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 61, p. 5108-5114 7 p.

    Research output: Contribution to journalArticle

  43. Published

    Comment: Horng's identification scheme based on Shamir's 'RSA for paranoids'

    Mitchell, C. J. & Ng, S-L., 2000, In : Electronics Letters. 36, 5, p. 422-422 1 p.

    Research output: Contribution to journalComment/debate

  44. Published

    Conflict of interest policies: A general approach

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  45. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Developments in security mechanism standards

    Mitchell, C. J., 2000, Internet and Intranet Security Management: Risks and Solutions. Janczewski, L. J. (ed.). Idea Group Publishing, p. 185-246 62 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Published

    Efficient Decoding Algorithms for Generalised Reed-Muller Codes

    Paterson, K. G. & Jones, A. E., 2000, In : IEEE Transactions on Communications. 48, 8, p. 1272-1285 14 p.

    Research output: Contribution to journalArticle

  48. Published

    Explicit product ensembles for separable quantum states

    Schack, R. & Caves, C. M., 2000, In : J. Mod. Opt.. 47, p. 387-399 13 p.

    Research output: Contribution to journalArticle

  49. Published

    Generalised Reed-Muller Codes and Power Control in OFDM

    Paterson, K. G., 2000, In : IEEE Transactions on Information Theory. 46, 1, p. 104-120 17 p.

    Research output: Contribution to journalArticle

  50. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution