1. 1993
  2. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In: Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Systolic Modular Multiplication

    Walter, C. D., 1993, In: IEEE Transactions on Computers. 42, 3, p. 376-378 3 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Untrustworthy Participants in Secret Sharing Schemes

    Martin, K. M., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 255-264 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. 1992
  6. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In: IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published
  9. Published

    Digital signatures

    Mitchell, C. J., Piper, F. C. & Wild, P., 1992, Contemporary cryptology: The science of information integrity . Simmons, G. J. (ed.). IEEE, p. 325-378 54 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Information and entropy in the baker's map

    Schack, R. & Caves, C. M., 1992, In: Physical Review Letters. 69, p. 3413-3416 4 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Quantum-nondemolition measurement of small photon numbers and the preparation of number states

    Schack, R., Breitenbach, A. & Schenzle, A., 1992, In: Physical Review A. 45, p. 3260-3267 8 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Resolvable Designs Applicable to Cryptographic Authentication Schemes

    Martin, K. M., Seberry, J. & Wild, P., 1992, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 12, p. 153-160 8 p.

    Research output: Contribution to journalArticlepeer-review

  14. 1991
  15. Published

    Modified forms of cipher block chaining

    Mitchell, C. J. & Varadharajan, V., Feb 1991, In: Computers and Security. 10, 1, p. 37-40

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Dynamics and symmetry of a laser with a squeezed reservoir

    Ginzel, C., Schack, R. & Schenzle, A., 1991, In: J. Opt. Soc. Am. B. 8, p. 1704-1711 8 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Fast Modular Multiplication using 2-Power Radix

    Walter, C. D., 1991, In: International J. of Computer Mathematics. 3, p. 21-28 8 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Formal Methods

    Walter, C. D., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 135-138 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  19. Published

    Formal Specification and Verification of Software

    Walter, C. D. & Eldridge, S. E., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 331-338 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  20. Published

    Positive P representation

    Schack, R. & Schenzle, A., 1991, In: Physical Review A. 44, p. 682-687 6 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Squeezed light from a laser with an internal chi2-nonlinear element

    Schack, R., Sizmann, A. & Schenzle, A., 1991, In: Physical Review A. 43, p. 6303 1 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    The Geometry of Shared Secret Schemes

    Martin, K. M., Simmons, G. J. & Jackson, W-A., 1991, In: Bulletin of the ICA. 1, p. 71-88 18 p.

    Research output: Contribution to journalArticlepeer-review

  23. 1990
  24. Published

    Modulo Multiplier to enhance encryption rates

    Tomlinson, A., 1 Apr 1990, In: Electronic Engineering. 62, 760, p. 25 1 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In: Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    A security scheme for resource sharing over a network

    Burns, J. & Mitchell, C. J., Feb 1990, In: Computers and Security. 9, 1, p. 67-75 9 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    A secure messaging architecture implementing the X.400-1988 security features

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1990, In: The Computer Journal. 33, p. 290-295 6 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In: Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Cryptography and Cryptanalysis

    Mitchell, C. J. & Piper, F. C., 1990, Handbook of Applicable Mathematics: Supplement. Ledermann, W., Lloyd, E., Vajda, S. & Alexander, C. (eds.). John Wiley & Sons, p. 53-92 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter