1. 1995
  2. Published

    Quantum state diffusion, localization and computation

    Schack, R., Brun, T. A. & Percival, I. C., 1995, In : Journal of Physics A: Mathematical and General. 28, p. 5401-5413 13 p.

    Research output: Contribution to journalArticle

  3. Published

    Security in future mobile networks

    Mitchell, C. J., 1995, Proceedings of the Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Security techniques

    Mitchell, C. J., 1995, Proceedings of the IEE Electronics Division Colloquium on Security in Networks, London, February 1995. IEE Press, p. 2/1-2/6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Still Faster Modular Multiplication

    Walter, C. D., 1995, In : Electronics Letters. 31, 4, p. 263-264 2 p.

    Research output: Contribution to journalArticle

  6. Published

    Storage efficient decoding for a class of binary de Bruijn sequences

    Paterson, K. G. & Robshaw, M. J. B., 1995, In : Discrete Mathematics. 138, p. 327-341 15 p.

    Research output: Contribution to journalArticle

  7. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Verification of Hardware combining Multiplication, Division Square Root

    Walter, C. D., 1995, In : Microprocessors and Microsystems. 19, p. 243-245 3 p.

    Research output: Contribution to journalArticle

  9. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In : IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticle

  10. 1996
  11. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticle

  12. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticle

  13. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticle

  15. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In : Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticle

  16. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In : Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticle

  17. Published

    Chaos for Liouville probability densities

    Schack, R. & Caves, C. M., 1996, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3387 1 p.

    Research output: Contribution to journalArticle

  18. Published

    Efficient Constructions for One Sharing of Many Secrets

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 283-296 14 p.

    Research output: Contribution to journalArticle

  19. Published

    Efficient Multiplicative Sharing Schemes

    Blackburn, S. R., Burmester, M., Desmedt, Y. & Wild, P. R., 1996, Advances in Cryptology -- EUROCRYPT '96. Maurer, U. (ed.). Berlin: Springer, p. 107-118 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Ideal Secret Sharing Schemes with Multiple Secrets

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Journal of Cryptology. 9, 6, p. 233-250 18 p.

    Research output: Contribution to journalArticle

  21. Published

    Information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1996, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3257 1 p.

    Research output: Contribution to journalArticle

  22. Published

    Near Optimal Single-Track Gray Codes

    Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 779-789 11 p.

    Research output: Contribution to journalArticle

  23. Published

    New Classes of Perfect Maps I

    Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 73, p. 302-334 33 p.

    Research output: Contribution to journalArticle

  24. Published

    New Classes of Perfect Maps II

    Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 73, p. 335-345 11 p.

    Research output: Contribution to journalArticle

  25. Published

    Node Bisectors of Cayley Graphs

    Blackburn, S. R., 1996, In : Mathematical Systems Theory. 29, p. 589-598 10 p.

    Research output: Contribution to journalArticle

  26. Published

    On the Existence of de Bruijn Tori with Two by Two Windows

    Hurlbert, G., Mitchell, C. J. & Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 76, p. 213-230 18 p.

    Research output: Contribution to journalArticle

  27. Published

    Perfect Secret Sharing Schemes on Five Participants

    Martin, K. M. & Jackson, W-A., 1996, In : Designs, Codes and Cryptography. 9, p. 267-286 20 p.

    Research output: Contribution to journalArticle

Previous 12 3 4 5 6 7 8 9 ...83 Next