1. Article › Research › Peer-reviewed
  2. Published

    Hearing attacks in network data: An effectiveness study

    Axon, L., Happa, J., Goldsmith, M. & Creese, S., Jun 2019, In: Computers and Security. 83, p. 367-388 22 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Hierarchical, model-based risk management of critical infrastructures

    Baiardi, F., Telmon, C. & Sgandurra, D., 2009, In: Reliability Engineering & System Safety. 94, 9, p. 1403 - 1415

    Research output: Contribution to journalArticlepeer-review

  4. Published

    High Dynamic Range Video for Cultural Heritage Documentation and Experimental Archaeology

    Happa, J., Artusi, A., Czanner, S. & Chalmers, A., 2010, In: Proceedings of VAST: International Symposium on Virtual Reality, Archaeology and Intelligent Cultural Heritage. p. 17-24 8 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Hindering data theft with encrypted data trees

    Blasco, J., Tapiador, J. E., Pens-Lopez, P. & Suarez-Tangil, G., Mar 2015, In: Journal of Systems and Software. 101, p. 147-158 12 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Honeycomb arrays

    Blackburn, S. R., Panoui, A., Paterson, M. B. & Stinson, D. R., 2010, In: The Electronic Journal of Combinatorics. 17, R172, p. 1 1 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Honeyc-the low-interaction client honeypot

    Seifert, C., Welch, I. & Komisarczuk, P., 2007, In: Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Host mobility key management in dynamic secure group communication

    Daghighi, B., Mat Kiah, M. L., Iqbal, S., Habib Ur Rehman, M. & Martin, K., Nov 2018, In: Wireless Networks. 24, 8, p. 3009–3027 19 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 15, 3, p. 223-230 8 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Hybrid cryptography

    Dent, A. W., 2004, In: Cryptology ePrint Archive: Report. 2004/210

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Hypersensitivity and chaos signatures in the quantum baker's maps

    Scott, A. J., Brun, T. A., Caves, C. M. & Schack, R., 2006, In: Journal of Physics A: Mathematical and General. 39, p. 13405 1 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Hypersensitivity to perturbation in the quantum kicked top

    Schack, R., D'Ariano, G. M. & Caves, C. M., 1 Aug 1994, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 50, p. 972-987 16 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Hypersensitivity to perturbations in the quantum baker's map

    Schack, R. & Caves, C. M., 1993, In: Physical Review Letters. 71, p. 525-528 4 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In: Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    ID-based signatures from pairings on elliptic curves

    Paterson, K. G., 2002, In: Electronics Letters. 38, 18, p. 1025-1028 4 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Ideal secret sharing schemes with multipartite access structures.

    Ng, S-L., 2006, In: IEE Proceedings on Communications. 153, 2, p. 165-168 4 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Ideal Secret Sharing Schemes with Multiple Secrets

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Journal of Cryptology. 9, 6, p. 233-250 18 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Identity crisis: on the problem of namespace design for ID-PKC and MANETs

    Balfe, S., McDonald, A., Paterson, K. & Phillips, H., 2010, In: Security and Communication Networks. 3, 6, p. 535-545

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Identity theft and reconstruction

    Ciechanowicz, C., 1 May 2010, In: Information Security Technical Report. 15, 2, p. 41

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K., 2011, In: International Journal of Information Security. 10, 1, p. 15-32

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Illuminating the Past: State of the Art

    Happa, J., Mudge, M., Debattista, K., Artusi, A., Gonçalves, A. & Chalmers, A., 2010, In: Virtual Reality. 14, 3, p. 155-182 28 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Improved Linear Systolic Array for Fast Modular Exponentiation

    Walter, C. D., 1 Sep 2000, In: IEE Proc. Computers and Digital Techniques. 147, 5, p. 323-328 6 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In: Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Improving Average Delay for On-Line Algorithms

    Walter, C. D., 1994, In: Electronics Letters. 30, 23, p. 1925-6 1 p.

    Research output: Contribution to journalArticlepeer-review

  25. Submitted

    Improving Convergence and Practicality of Slide-type Reductions

    Li, J. & Walter, M., 9 Mar 2021, (Submitted) In: Submitted.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Improving the security of CardSpace

    Alrodhan, W. & Mitchell, C. J., 2009, In: EURASIP Journal on Information Security. 2009, 8 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    In Search of Multiple Domain Key Recovery

    Knudsen, L. R. & Martin, K. M., 1998, In: Journal of Computer Security. 6, 4, p. 219-236 18 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Increasing the Rate of Output of m-Sequences

    Blackburn, S. R., 1994, In: Information Processing Letters. 51, p. 73-77 5 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In: Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Information and entropy in the baker's map

    Schack, R. & Caves, C. M., 1992, In: Physical Review Letters. 69, p. 3413-3416 4 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Information dynamics in cavity QED

    Soklakov, A. N. & Schack, R., 2003, In: Physical Review A. 67, p. 033804 1 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2000, In: Information Security Technical Report. 5, 2, p. 1

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jun 2003, In: Information Security Technical Report. 8, 2, p. 5

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Information Security Technical Report: Editorial

    Ciechanowicz, C., 1 Jan 2006, In: Information Security Technical Report. 11, 1

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Apr 2003, In: Information Security Technical Report. 8, 4, p. 5

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2002, In: Information Security Technical Report. 7, 2, p. 1

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Information security technical report - prospectus: Interfacing with smartcard applications. (The OpenCard Framework and PC/SC)

    Markantonakis, K., 1 Jan 1999, In: Information Security Technical Report. 4, p. 7-8 2 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1996, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3257 1 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles

    Al Tabash, K. & Happa, J., Aug 2018, In: Computers and Security. 77, p. 838-859 22 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Intersection numbers for coherent configurations and the spectrum of a graph

    Walter, C. D., 1983, In: Journal of Combinatorial Theory, Series B. 35, 2, p. 201-204 4 p.

    Research output: Contribution to journalArticlepeer-review

  41. Forthcoming

    Introduction to Industrial Control Networks

    Galloway, B. & Hancke, G., 2012, (Accepted/In press) In: IEEE Communications Surveys and Tutorials.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Iterative Plan Construction for the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 21 Nov 2014, In: Journal of Artificial Intelligence Research. 51, p. 555-577 23 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Java card technology and security

    Markantonakis, K., 1998, In: Information Security Technical Report. 3, 2, p. 82 - 89

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Key assignment schemes with authenticated encryption, revisited

    Pijnenburg, J. & Poettering, B., 24 Jul 2020, In: IACR Transactions on Symmetric Cryptology. 2020, 2, p. 40-67 28 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In: Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Key predistribution for homogeneous wireless sensor networks with group deployment of nodes

    Martin, K. M., Paterson, M. B. & Stinson, D. R., Aug 2010, In: ACM Transactions on Sensor Networks. 7, 2, 11.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In: Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In: Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In: Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Kuroda's class number relation

    Walter, C. D., 1979, In: Acta Arithmetica. 35, p. 41-51 11 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Language Redux

    Thornton, P., 2018, In: A Peer Review Journal About. 7, 1, p. 1-8 8 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Legislation-Driven Development of a Gift Aid system using Event-B

    Williams, D. M., Darwish, S., Schneider, S. & Michael, D. R., 25 May 2020, In: Formal Aspects of Computing. 32, 2, p. 251-273 23 p.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    libInterMAC: Beyond Confidentiality and Integrity in Practice

    Albrecht, M., Hansen, T. & Paterson, K., 8 Mar 2019, In: IACR Transactions on Symmetric Cryptology. 2019, 1, p. 46-83 38 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In: Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Localised multisecret sharing

    Laing, T., Martin, K., Paterson, M. & Stinson, D., Sep 2017, In: Cryptography and Communications. 9, p. 581–597 17 p.

    Research output: Contribution to journalArticlepeer-review

  56. Published

    Locating Subverted Processes using Random Packet Comparison in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2013, In: International Journal of Critical Infrastructures. 9, 1/2, p. 32-51

    Research output: Contribution to journalArticlepeer-review

  57. Published

    Logarithmic Speed Modular Multiplication

    Walter, C. D., 1994, In: Electronics Letters. 30, 17, p. 1397-1398 2 p.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Logical LEGO: Co-constructed perspectives on service design.

    Heath, C. P., Coles-Kemp, L. & Hall, P. A., 2014, In: NordDesign 2014, Proceedings.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud

    Coles-Kemp, L., Reddington, J. & Williams, P. A. H., 2011, In: Information Security Technical Report. 16, 3-4, p. 115-122

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Lost in translation: theory and practice in cryptography

    Paterson, K. G. & Yau, A. K. L., 2006, In: IEEE Security and Privacy Magazine. 4, 3, p. 69-72 4 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention

    Saracino, A., Sgandurra, D., Dini, G. & Martinelli, F., 1 Mar 2016, In: IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    Majority vote ensembles of conformal predictors

    Cherubin, G., Mar 2019, In: Machine Learning. 108, 3, p. 475–488 14 p.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Making Digital Technology Research Human: Learning from Clowning as a Social Research Intervention

    Coles-Kemp, L. & Stang, F., 2019, In: Rivista Italiana di Studi sull’Umorismo (RISU). 2, 1, p. 35-45 11 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Making serial number based authentication robust against loss of state

    Mitchell, C. J., Jul 2000, In: Operating Systems Review. 34, 3, p. 56-59 4 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Malicious attacks on ad hoc network routing protocols

    Yau, P-W., Hu, S. & Mitchell, C. J., 2007, In: International Journal of Computer Research. 15, 1, p. 73-100 38 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Manual authentication for wireless devices

    Gehrmann, C., Mitchell, C. J. & Nyberg, K., Apr 2004, In: Cryptobytes. 7, 1, p. 29-37

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Matching key recovery mechanisms to business requirements

    Rantos, K. & Mitchell, C. J., 2005, In: Computers and Security. 24, 3, p. 232-245 14 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Minimum weight modified signed-digit representations and fast exponentiation

    Jedwab, J. & Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1171-1172 2 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Mobile communication security controllers an evaluation paper

    Mayes, K. E. & Markantonakis, K., 1 Aug 2008, In: Information Security Technical Report. 13, p. 173-192 20 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    Mobile security and trusted computing

    Mitchell, C. J., 2006, In: Information Technology. 48, p. 321-326

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Modified forms of cipher block chaining

    Mitchell, C. J. & Varadharajan, V., Feb 1991, In: Computers and Security. 10, 1, p. 37-40

    Research output: Contribution to journalArticlepeer-review

  72. Published

    Modulating a noisy carrier signal for eavesdropping-resistant HF RFID

    Hancke, G. P., 2007, In: Elektrotechnik und Informationstechnik. 124, 11, p. 404-408 5 p.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    Modulo Multiplier to enhance encryption rates

    Tomlinson, A., 1 Apr 1990, In: Electronic Engineering. 62, 760, p. 25 1 p.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    Moment hierarchies and cumulants in quantum optics

    Schack, R. & Schenzle, A., 1990, In: Physical Review A. 41, p. 3847-3852 6 p.

    Research output: Contribution to journalArticlepeer-review

  75. Forthcoming

    Monoidal Computer I: Basic Computability by String Diagrams

    Pavlovic, D., 2013, (Accepted/In press) In: Information and Computation. 38 p.

    Research output: Contribution to journalArticlepeer-review

  76. Published

    Montgomery Exponentiation Needs No Final Subtractions

    Walter, C. D., 1 Oct 1999, In: Electronics Letters. 35, 21, p. 1831-1832 2 p.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    Multi-destination secure electronic mail

    Mitchell, C. J., 1989, In: The Computer Journal. 32, 1, p. 13-15 3 p.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Multilinear Maps from Obfuscation

    Albrecht, M. R., Farshim, P., Han, S., Hofheinz, D., Larraia, E. & Paterson, K. G., 2 Jan 2020, In: Journal of Cryptology. p. 1-34 34 p.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 31 Dec 2016, In: International Journal on Advances in Security. 9, 3&4, p. 158-168 11 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    Multi-Platform Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., Dec 2017, In: International Journal on Advances in Security. 10, 3&4, p. 196-207 12 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Multiple Attacks on Authentication Protocols for Low-Cost RFID Tags

    Bilal, Z., Martin, K. M. & Saeed, Q., 1 Mar 2015, In: Applied Mathematics and Information Sciences. 9, 2, p. 561-569 9 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Mutually Trusted Authority free Secret Sharing Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1997, In: Journal of Cryptology. 10, p. 261-289 29 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Near Optimal Single-Track Gray Codes

    Etzion, T. & Paterson, K. G., 1996, In: IEEE Transactions on Information Theory. 42, p. 779-789 11 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    New Classes of Perfect Maps I

    Paterson, K. G., 1996, In: Journal of Combinatorial Theory, Series A. 73, p. 302-334 33 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    New Classes of Perfect Maps II

    Paterson, K. G., 1996, In: Journal of Combinatorial Theory, Series A. 73, p. 335-345 11 p.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    New Secret Sharing Schemes from Old

    Martin, K. M., 1993, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 14, p. 65-77 13 p.

    Research output: Contribution to journalArticlepeer-review

  87. Submitted

    Nigerian Society and Culture

    Ibrahim, S., 2017, (Submitted) In: The Journal of Intercultural Studies. special issue

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Node Bisectors of Cayley Graphs

    Blackburn, S. R., 1996, In: Mathematical Systems Theory. 29, p. 589-598 10 p.

    Research output: Contribution to journalArticlepeer-review

  89. E-pub ahead of print

    Novel implementation of defence strategy of relay attack based on cloud in RFID systems

    Xu, H., Shen, W., Li, P., Mayes, K., Wang, R., Li, D. & Yang, S., 30 Jan 2019, (E-pub ahead of print) In: International Journal of Information and Computer Security. 11, 2, p. 120-144 25 p.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    OCPP Protocol: Security Threats and Challenges

    Alcaraz, C., Lopez, J. & Wolthusen, S., Sep 2017, In: IEEE Transactions on Smart Grid. 8, 5, p. 2452-2459 8 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    On Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA

    Paterson, K. G., 2004, In: IEEE Transactions on Information Theory. 50, 3, p. 550-559 10 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    On integer-valued rational polynomials and depth distributions of binary codes

    Mitchell, C. J., 1998, In: IEEE Transactions on Information Theory. 44, p. 3146-3150 5 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    On k-arcs Covering a Line in Finite Projective Planes.

    Ng, S-L. & Wild, P., 2001, In: Ars Combinatoria. 58, p. 289-300

    Research output: Contribution to journalArticlepeer-review

  94. Published

    On parameter selection for server-aided RSA computation schemes

    Burns, J. & Mitchell, C. J., 1994, In: IEEE Transactions on Computers. 43, 2, p. 163-174 12 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    On Recovering Affine Encodings in White-Box Implementations

    Derbez, P., Fouque, P-A., Lambin, B. & Minaud, B., 14 Aug 2018, In: TCHES. 2018, 3, p. 121-149 29 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    On the average energy of circulant graphs

    Blackburn, S. R. & Shparlinski, I. E., 2008, In: Linear Algebra and Its Applications. 428, p. 1956-1963 8 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    On the complexity of the BKW algorithm on LWE

    Albrecht, M., Cid, C., Faugere, J-C., Fitzpatrick, R. & Perret, L., Feb 2015, In: Designs, Codes and Cryptography. 74, 2, p. 325-354 30 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    On the composition of matroids and ideal secret sharing schemes.

    Ng, S-L. & Walker, M., 2001, In: Designs, Codes and Cryptography. 24, p. 49-67

    Research output: Contribution to journalArticlepeer-review

  99. Published

    On the concrete hardness of Learning with Errors

    Albrecht, M., Player, R. & Scott, S., 2 Oct 2015, In: Journal of Mathematical Cryptology. 9, 3, p. 169–203 35 p.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    ON THE DISTRIBUTION OF THE SUBSET SUM PSEUDORANDOM NUMBER GENERATOR ON ELLIPTIC CURVES

    Blackburn, S. R., Ostafe, A. & Shparlinski, I. E., 2011, In: Uniform Distribution Theory. 6, 1, p. 127-142 16 p.

    Research output: Contribution to journalArticlepeer-review

  101. Published

    On the existence and construction of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2000, In: IEEE Transactions on Information Theory. 46, 6, p. 1974-1987 14 p.

    Research output: Contribution to journalArticlepeer-review

Previous 12 3 4 5 6 7 8 9 ...22 Next