1. 1991
  2. Published

    Squeezed light from a laser with an internal chi2-nonlinear element

    Schack, R., Sizmann, A. & Schenzle, A., 1991, In: Physical Review A. 43, p. 6303 1 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    The Geometry of Shared Secret Schemes

    Martin, K. M., Simmons, G. J. & Jackson, W-A., 1991, In: Bulletin of the ICA. 1, p. 71-88 18 p.

    Research output: Contribution to journalArticlepeer-review

  4. 1990
  5. Published

    Modulo Multiplier to enhance encryption rates

    Tomlinson, A., 1 Apr 1990, In: Electronic Engineering. 62, 760, p. 25 1 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In: Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    A security scheme for resource sharing over a network

    Burns, J. & Mitchell, C. J., Feb 1990, In: Computers and Security. 9, 1, p. 67-75 9 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A secure messaging architecture implementing the X.400-1988 security features

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1990, In: The Computer Journal. 33, p. 290-295 6 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In: Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Cryptography and Cryptanalysis

    Mitchell, C. J. & Piper, F. C., 1990, Handbook of Applicable Mathematics: Supplement. Ledermann, W., Lloyd, E., Vajda, S. & Alexander, C. (eds.). John Wiley & Sons, p. 53-92 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In: Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In: Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In: Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Management of secure systems and security within Open Systems Interconnection (OSI)

    Mitchell, C. J., 1990, Proceedings of Information Security: Confidentiality, Integrity and Availability, London, July 1990. Uxbridge: UNICOM Seminars

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Moment hierarchies and cumulants in quantum optics

    Schack, R. & Schenzle, A., 1990, In: Physical Review A. 41, p. 3847-3852 6 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    OSI and X.400 security

    Mitchell, C. J., 1990, Proceedings of Network Management '90, London, March 1990. London: Blenheim Online Ltd, p. 157-167 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Some Remarks on Authentication Systems

    Anthony, M. H. G., Martin, K. M., Seberry, J. & Wild, P. R., 1990, Advances in Cryptology -Auscrypt'90. Springer-Verlag, Vol. 453. p. 122-139 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Squeezed light from a self-frequency doubling laser

    Sizmann, A., Schack, R. & Schenzle, A., 1990, In: Europhysics Letters. 13, p. 109-115 7 p.

    Research output: Contribution to journalArticlepeer-review

  20. 1989
  21. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In: Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In: Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Algorithms for software implementations of RSA

    Selby, A. & Mitchell, C. J., May 1989, In: IEE Proceedings Part E (Computers and Digital Techniques). 136, 3, p. 166-170 5 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    CCITT/ISO standards for secure message handling

    Mitchell, C. J., Walker, M. & Rush, P. D. C., May 1989, In: IEEE Journal on Selected Areas in Communications. 7, 4, p. 517-524 8 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    One-stage one-sided rearrangeable switching networks

    Mitchell, C. J. & Wild, P. R., Jan 1989, In: IEEE Transactions on Communications. 37, 1, p. 52-56 5 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    A remark on hash functions for message authentication

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1989, In: Computers and Security. 8, 1, p. 55-58 4 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In: The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticlepeer-review