1. 1995
  2. Published

    Efficient Secret Sharing without a Mutually Trusted Authority

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Eurocrypt '95. Springer, Vol. 921. p. 183-193 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Enumerating Perfect Maps

    Paterson, K. G. & Hoare, P. R., 1995, Cryptography and Coding IV. Farrell, P. G. (ed.). Southend-On-Sea, Essex: Formara Ltd.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Key distribution without individual trusted authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, Proceedings: The 8th IEEE Computer Security Foundations Workshop, Kenmare, Co. Kerry, Ireland, June 1995. IEEE Computer Society Press, p. 30-36 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Mathematics of Dependable Systems: Proceedings of the first IMA Conference, Royal Holloway, September 1993

    Mitchell, C. J. (ed.) & Stavridou, V. (ed.), 1995, Oxford University Press. 295 p.

    Research output: Book/ReportAnthology

  6. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    New c-ary perfect factors in the de Bruijn Graph

    Mitchell, C. J., 1995, Codes and Cyphers - Cryptography and Coding IV: Proceedings of the fourth IMA Cryptography and Coding Conference, Cirencester, December 1993. Southend: Formara Ltd., p. 299-313 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    On Sharing Many Secrets

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Asiacrypt '94, Lecture Notes in Computer Science. Springer, Vol. 917. p. 42-54 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Optimal Parameters for Fully On-Line Arithmetic

    Walter, C. D., 1995, In: International J. of Computer Mathematics. 56, p. 11-18 8 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Perfect Factors in the de Bruijn Graph

    Paterson, K. G., 1995, In: Designs, Codes and Cryptography. 5, p. 115-138 24 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Quantum state diffusion, localization and computation

    Schack, R., Brun, T. A. & Percival, I. C., 1995, In: Journal of Physics A: Mathematical and General. 28, p. 5401-5413 13 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Security in future mobile networks

    Mitchell, C. J., 1995, Proceedings of the Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Security techniques

    Mitchell, C. J., 1995, Proceedings of the IEE Electronics Division Colloquium on Security in Networks, London, February 1995. IEE Press, p. 2/1-2/6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Still Faster Modular Multiplication

    Walter, C. D., 1995, In: Electronics Letters. 31, 4, p. 263-264 2 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Storage efficient decoding for a class of binary de Bruijn sequences

    Paterson, K. G. & Robshaw, M. J. B., 1995, In: Discrete Mathematics. 138, p. 327-341 15 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Verification of Hardware combining Multiplication, Division Square Root

    Walter, C. D., 1995, In: Microprocessors and Microsystems. 19, p. 243-245 3 p.

    Research output: Contribution to journalArticlepeer-review

  18. 1994
  19. Published

    Hypersensitivity to perturbation in the quantum kicked top

    Schack, R., D'Ariano, G. M. & Caves, C. M., 1 Aug 1994, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 50, p. 972-987 16 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In: IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    A Weak Cipher that Generates the Symmetric Group

    Murphy, S., Paterson, K. G. & Wild, P. R., 1994, In: Journal of Cryptology. 7, p. 61-65 5 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In: International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In: Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In: Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Decoding Perfect Maps

    Mitchell, C. J. & Paterson, K. G., 1994, In: Designs, Codes and Cryptography. 4, p. 11-30 20 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Enumeration within Isoclinism Classes of Groups of Prime Power Order

    Blackburn, S. R., 1994, In: Journal of the London Mathematical Society. 50, p. 293-304 12 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Geometric Secret Sharing Schemes and their Duals

    Martin, K. M. & Jackson, W-A., 1994, In: Designs, Codes and Cryptography. 4, p. 83-95 13 p.

    Research output: Contribution to journalArticlepeer-review