1. 1996
  2. Published

    Permutation Polynomials, de Bruijn Sequences and Linear Complexity

    Blackburn, S. R., Etzion, T. & Paterson, K. G., 1996, In: Journal of Combinatorial Theory, Series A. 76, p. 55-82 28 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Public-key Cryptography on Smart Cards

    Fuchsberger, A., Gollmann, D., Lothian, P., Paterson, K. G. & Sidiropoulos, A., 1996, Cryptography: Policy and Algorithms, Proceedings. Springer, p. 250-269 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Quantum chaos in open systems: a quantum state diffusion analysis

    Brun, T. A., Percival, I. C. & Schack, R., 1996, In: Journal of Physics A: Mathematical and General. 29, p. 2077-2090 14 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Quantum state diffusion with a moving basis: computing quantum-optical spectra

    Schack, R., Brun, T. A. & Percival, I. C., 1996, In: Physical Review A. 53, p. 2694 1 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Redundant integer representations and fast exponentiation

    Gollmann, D., Han, Y. & Mitchell, C. J., 1996, In: Designs, Codes and Cryptography. 7, p. 135-151 17 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Single Track Gray Codes

    Hiltgen, A. P., Paterson, K. G. & Brandestini, M., 1996, In: IEEE Transactions on Information Theory. 42, p. 1555-1561.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Some Remarks on an Algorithm of Fitzpatrick

    Blackburn, S. R. & Chambers, W. G., 1996, In: IEEE Transactions on Information Theory. 42, 4, p. 1269-1271 3 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Tailoring authentication protocols to match underlying mechanisms

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1996, Information Security and Privacy - Proceedings: First Australasian Conference, Wollongong, NSW, Australia, June 1996. Pieprzyk, J. & Seberry, J. (eds.). Springer-Verlag, p. 121-133 13 p. (Lecture Notes in Computer Science; no. 1172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In: Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    The use of Trusted Third Parties and Secure Billing in UMTS

    Chen, LI., Hitz, H-J., Horn, G., Howker, K., Kessler, V., Knudsen, L. R., Mitchell, C. J. & Radu, C., 1996, Proceedings of the ACTS Mobile Communications Summit, Granada, Spain, 27-29 November 1996. Vol. 2. p. 493-499 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In: Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticlepeer-review

  14. 1997
  15. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In: Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In: International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In: Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    A Note on Duality in Linear Secret Sharing Schemes

    Martin, K. M., van Dijk, M. & Jackson, W-A., 1997, In: Bulletin of the ICA. 19, p. 93-101 9 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  22. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In: Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In: SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In: Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Fast Rational Interpolation, Reed--Solomon Decoding and the Linear Complexity Profiles of Sequences

    Blackburn, S. R., 1997, In: IEEE Transactions on Information Theory. 43, 2, p. 537-548 12 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...3 4 5 6 7 8 9 10 ...86 Next