1. 2003
  2. Published

    A secure electronic payment scheme for charity donations

    Al-Meaither, M. & Mitchell, C. J., 2003, E-Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, Vol. 2738. p. 50-61 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A taxonomy of single sign-on systems

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings. Safavi-Naini, R. & Seberry, J. (eds.). Springer-Verlag, Vol. 2727. p. 249-264 16 p. (Lecture Notes in Computer Science; vol. 2727).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of 3rd Annual Information Security South Africa Conference (ISSA 2003). p. 75-88 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, In : South African Computer Journal. 31, p. 2-8 7 p.

    Research output: Contribution to journalArticle

  6. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G., 2003, In : ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticle

  7. Published

    An overview of the GlobalPlatform smart card specification

    Markantonakis, K. & Mayes, K., 2003, In : Information Security Technical Report. 8, 1, p. 17 - 29

    Research output: Contribution to journalArticle

  8. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In : Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticle

  9. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In : Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticle

  10. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Belief and Trust in Fault Tolerance

    Price, G., 2003, Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003). Dimitrakos, T. & Martinelli, F. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    Certificateless public key cryptography

    Al-Riyami, S. S. & Paterson, K. G., 2003, Proc. Asiacrypt 2003. Laih, C. S. (ed.). p. 452-473 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    Client v. Server side Protocols, Interfaces and Storage

    Price, G., 2003, Security Protocols, 11th International Workshop, Cambridge, UK. 2-4 April, 2003. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    Combinatorial schemes for protecting digital content

    Blackburn, S. R., 2003, Surveys in Combinatorics 2003. Wensley, C. D. (ed.). Cambridge: Cambridge University Press, p. 43-78 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Computing the error linear complexity spectrum of a binary sequence of period 2^n

    Lauder, A. G. B. & Paterson, K. G., 2003, In : IEEE Transactions on Information Theory. 49, 1, p. 273-280 8 p.

    Research output: Contribution to journalArticle

  16. Published
  17. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Fast Fourier Transforms using the Complex Logarithmic Number System

    Arnold, M. G., Bailey, T. A., Cowles, J. R. & Walter, C. D., 2003, In : VLSI Signal Processing. 33, 3, p. 325-335 11 p.

    Research output: Contribution to journalArticle

  20. Published

    Frameproof Codes

    Blackburn, S. R., 2003, In : SIAM Journal on Discrete Mathematics. 16, p. 499-510 12 p.

    Research output: Contribution to journalArticle

  21. Published

    Golay Complementary Sequences

    Parker, M. G., Tellambura, C. & Paterson, K. G., 2003, Wiley Encyclopedia of Telecommunications. Proakis, J. G. (ed.). Wiley-Interscience

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In : Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticle

  23. Published

    Information dynamics in cavity QED

    Soklakov, A. N. & Schack, R., 2003, In : Physical Review A. 67, p. 033804 1 p.

    Research output: Contribution to journalArticle

  24. Published

    Longer Keys May Facilitate Side Channel Attacks

    Walter, C. D., 2003, Selected Areas in Cryptography. Matsui, M. & Zuccherato, R. J. (eds.). Springer, Vol. 3006. p. 42-57 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    On permissions, inheritance and role hierarchies

    Crampton, J., 2003, Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, p. 85-92 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Optical Information

    Soklakov, A. N. & Schack, R., 2003, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing (QCMC'02). Shapiro, J. H. & Hirota, O. (eds.). Princeton, New Jersey: Rinton Press, p. 205-208

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    PANA/GSM authentication for Internet access

    Pagliusi, P. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 146-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    PANA/IKEv2: An Internet authentication protocol for heterogeneous access

    Pagliusi, P. & Mitchell, C. J., 2003, Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Springer-Verlag, Vol. 2908. p. 135-149 15 p. (Lecture Notes in Computer Science; vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    PKI revisited - current issues and future trends

    Price, G. (ed.), Piper, F. (ed.) & Paterson, K. G. (ed.), 2003, Unkown Publisher. (Information Security Technical Report)

    Research output: Book/ReportBook

  33. Published

    Posets and protocols - picking the right three-party protocol.

    Ng, S-L., 2003, In : IEEE Journal on Selected Areas in Communications. 21, 1, p. 55-61 6 p.

    Research output: Contribution to journalArticle

  34. Published

    Predicting the inversive generator

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2003, Cryptography and Coding. Proc. 9th IMA Intern. Conf on Cryptography and Coding. Paterson, K. G. (ed.). Berlin: Springer, p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    Products of subsets in an abelian group

    Blackburn, S. R. & Spencer, A. J., 2003, In : Journal of Combinatorial Theory, Series A. 103, p. 53-68 16 p.

    Research output: Contribution to journalArticle

  36. Published

    Providing anonymity in unconditionally secure secret sharing schemes

    Guillermo, M., Martin, K. M. & O'Keefe, C. M., 2003, In : Designs, Codes and Cryptography. 28, p. 227-245 19 p.

    Research output: Contribution to journalArticle

  37. Published

    Quantum theory from four of Hardy's axioms

    Schack, R., 2003, In : Foundations of Physics. 33, p. 1461-1468 8 p.

    Research output: Contribution to journalArticle

  38. Published

    Remote user authentication using public information

    Mitchell, C. J., 2003, Cryptography and Coding, 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 2003, Proceedings. Paterson, K. (ed.). Springer-Verlag, p. 360-369 10 p. (Lecture Notes in Computer Science; vol. 2898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Reputation methods for routing security for mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 130-137 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Securing FIPA agent communication

    Borselius, N. & Mitchell, C. J., 2003, Proceedings of the 2003 International Conference on Security and Management (SAM '03), Las Vegas, Nevada, USA, June 2003. Arabnia, H. R. & Mun, Y. (eds.). CSREA Press, Vol. 1. p. 135-141 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Security

    Martin, K. M., 2003, E-Commerce Handbook. Thomson-Gee

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    Security Constraints on the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2003, In : IACR Cryptology ePrint Archive. 2003, p. 13 1 p.

    Research output: Contribution to journalArticle

  43. Published

    Security protocols for biometrics-based cardholder authentication in smartcards

    Rila, L. & Mitchell, C. J., 2003, Applied Cryptography and Network Security - First International Conference, ACNS 2003 - Kunming, China, October 16-19 2003 - Proceedings. Zhou, J., Yung, M. & Han, Y. (eds.). Springer-Verlag, p. 254-264 11 p. (Lecture Notes in Computer Science; vol. 2846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Security vulnerabilities in ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of ISCTA '03, 7th International Symposium on Communications Theory and Applications, Ambleside, UK, July 2003. p. 99-104 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Some Security Aspects of the MIST Randomized Exponentiation Algorithm

    Walter, C. D., 2003, CHES 2002. Jr., B. S. K., Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 2523. p. 276-290 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Specifying and enforcing constraints in role-based access control

    Crampton, J., 2003, Proceedings of 8th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 43-50 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Ten years of information security Masters programmes: reflections and new challenges

    Martin, K. M., Ciechanowicz, C., Piper, F. C. & Robshaw, M. J. B., 2003, Security Education and Critical Infrastructures: Proceedings of WISE03. Kluwer, p. 215-230 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  51. Published

    The Maple Package “Janet”: I. Polynomials Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    The Maple Package “Janet”: II. Linear Partial Differential Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published
  54. Published

    Threshold MACs

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R., Wang, H. & Wild, P. R., 2003, Information Security and Cryptology - ICISC 2002. Springer, Vol. 2587. p. 237-252 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  55. Published

    Tripartite authenticated key agreement protocols from pairings

    Al-Riyami, S. S. & Paterson, K. G., 2003, Proc. IMA Conference on Cryptography and Coding. Paterson, K. G. (ed.). Springer, p. 332-359 28 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  56. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. 2002
  59. Published

    On the value of threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Oct 2002, In : Operating Systems Review. 36, 4, p. 30-35 6 p.

    Research output: Contribution to journalArticle

  60. Published

    A pragmatic alternative to undetectable signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Apr 2002, In : Operating Systems Review. 36, 2, p. 6-11 6 p.

    Research output: Contribution to journalArticle

  61. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2002, In : Information Security Technical Report. 7, 2, p. 1

    Research output: Contribution to journalArticle

  62. Published

    A security architecture for agent-based mobile systems

    Borselius, N., Hur, N., Kaprynski, M. & Mitchell, C. J., 2002, Proceedings - 3G2002, Third International Conference on Mobile Communications Technologies, London, UK, May 2002. IEE Press, p. 312-318 7 p. (Conference Publication; vol. 489).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  64. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In : Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticle

  66. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In : IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticle

  67. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  68. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In : Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticle

  70. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticle

  71. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Cryptography from pairings: a snapshot of current research

    Paterson, K. G., 2002, In : Information Security Technical Report. 7, 3, p. 41-54 14 p.

    Research output: Contribution to journalArticle

  73. Published

    Decoherence and linear entropy increase in the quantum baker's map

    Soklakov, A. N. & Schack, R., 2002, In : Physical Review E (Statistical, Nonlinear, and Soft Matter Physics). 66, p. 036212 1 p.

    Research output: Contribution to journalArticle

  74. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Ethernet Services-Service Definition and Market Potential

    Komisarczuk, P. P., 2002, In : Journal of the Communications Network. 1, 3, p. 20-28 9 p.

    Research output: Contribution to journalArticle

  77. Published

    Existence of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2002, Codes, Graphs, and Systems: A Celebration of the Life and Career of G. David Forney. Blahut, R. E. & Koetter, R. (eds.). Kluwer Academic Publishers, p. 187-197 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. Published

    Failures of SET implementation - What is amiss?

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - APDSI 2002, 7th Asia-Pacific Decision Sciences Institute Conference, Bangkok, Thailand, July 2002. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    ID-based signatures from pairings on elliptic curves

    Paterson, K. G., 2002, In : Electronics Letters. 38, 18, p. 1025-1028 4 p.

    Research output: Contribution to journalArticle

  80. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Quantum probabilities as Bayesian probabilities

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Physical Review A. 65, p. 022305 1 p.

    Research output: Contribution to journalArticle

  87. Published

    Renewing cryptographic timestamps

    Al-Riyami, S. S. & Mitchell, C. J., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, p. 9-16 8 p. (IFIP Conference Proceedings; vol. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Reprint of Algorithmic information and simplicity in statistical physics (1997)

    Schack, R., 2002, Maxwell's Demon 2: Entropy, Classical and Quantum Information, Computing. Leff, H. S. & Rex, A. F. (eds.). London: Institute of Physics Publishing, p. 246

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    RSA-based undeniable signatures for general moduli

    Galbraith, S., Mao, W. & Paterson, K. G., 2002, Topics in Cryptology - CT-RSA 2002. Preneel, B. (ed.). Springer, p. 200-217 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Published

    SARBAC: A New Model for Role-Based Administration

    Crampton, J. & Loizou, G., 2002.

    Research output: Working paper

  91. Published

    Securing Personal Area Networks

    Garefalakis, T. & Mitchell, C. J., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, Vol. 3. p. 1257-1259 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Securing Reconfigurable Terminals - mechanisms and protocols

    Gultchev, S., Mitchell, C. J., Moessner, K. & Tafazolli, R., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, p. 804-808 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Security analysis of smartcard to card reader communications for biometric cardholder authentication

    Rila, L. & Mitchell, C. J., 2002, Proceedings of CARDIS '02, 5th Smart Card Research and Advanced Application Conference, San Jose, California, November 2002. USENIX, p. 19-28 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory

    Paterson, K. G., 2002, Proceedings of Sequences and Their Applications - SETA01. Helleseth, T., Kumar, P. V. & Yang, K. (eds.). Springer, p. 46-71 26 p. (Discrete Mathematics and Theoretical Computer Science Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  95. Published

    Size of broadcast in threshold schemes with disenrollment

    Martin, K. M., Barwick, S. G., Jackson, W-A. & Wild, P. R., 2002, Information Security and Privacy, 7th Australasian Conference, ACISP02. Springer, Vol. 2384. p. 71-88 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Published

    Smart cards and the associated infrastructure problem

    Paterson, K. G., Piper, F. & Robshaw, M., 2002, In : Information Security Technical Report. 7, 3, p. 20-29 10 p.

    Research output: Contribution to journalArticle

  97. Published

    Some properties of the Yoshiara family of planes.

    Ng, S-L., 2002, In : European Journal of Combinatorics. 23, p. 77-81 5 p.

    Research output: Contribution to journalArticle

  98. Published

    The future of SET

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 9-17 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    The personal CA - PKI for a Personal Area Network

    Gehrmann, C., Nyberg, K. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 31-35 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Torsion-free metabelian groups with commutator quotient C_p^n x C_p^m

    Cid, C., 2002, In : Journal of Algebra. 248, p. 15-36 22 p.

    Research output: Contribution to journalArticle

  101. Published

    Unknown quantum states: The quantum de Finetti representation

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Journal of Mathematical Physics. 43, p. 4537-4559 23 p.

    Research output: Contribution to journalArticle

  102. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. 2001
  105. Published

    A logic of access control

    Crampton, J., Loizou, G. & O'Shea, G., 2001, In : The Computer Journal. 44, 2, p. 137-149 13 p.

    Research output: Contribution to journalArticle

  106. Published

    A person-to-person Internet payment system

    Al-Meaither, M. & Mitchell, C. J., 2001, Proceedings NordSec 2001 - 6th Nordic Workshop on Secure IT Systems, Lyngby, Denmark, November 2001. p. 5-17 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Actual and perceived levels of risk in consumer e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2001, Proceedings - 2nd International We-B Conference 2001, Perth, Western Australia, November 2001. p. 207-216 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In : Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticle

  110. Published

    Comments on ``Dynamic Participation in a Secure Conference Scheme for Mobile Communications''.

    Ng, S-L., 2001, In : IEEE Transaction on Vehicular Technology. 50, 1, p. 334-335

    Research output: Contribution to journalComment/debate

  111. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In : EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticle

  112. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In : Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticle

  113. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In : Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticle

  116. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W., 2001, Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?

    Markantonakis, K., 2001, Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge. Kluwer, B.V., p. 77-92 16 p. (IFIP/Sec '01).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  118. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    On k-arcs Covering a Line in Finite Projective Planes.

    Ng, S-L. & Wild, P., 2001, In : Ars Combinatoria. 58, p. 289-300

    Research output: Contribution to journalArticle

  122. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    On the composition of matroids and ideal secret sharing schemes.

    Ng, S-L. & Walker, M., 2001, In : Designs, Codes and Cryptography. 24, p. 49-67

    Research output: Contribution to journalArticle

  124. Unpublished

    On the theory of point-weight designs

    Dent, A. W., 2001, (Unpublished)

    Research output: ThesisDoctoral Thesis

  125. Published

    Quantum Bayes rule

    Schack, R., Brun, T. A. & Caves, C. M., 2001, In : Physical Review A. 64, p. 014305 1 p.

    Research output: Contribution to journalArticle

  126. Published

    Quantum computing with separable states?

    Schack, R., 2001, Macroscopic Quantum Coherence and Quantum Computing. Averin, D. V., Ruggiero, B. & Silvestrini, P. (eds.). New York: Kluwer, p. 285

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Simple algorithm for local conversion of pure states

    Jensen, J. G. & Schack, R., 2001, In : Physical Review A. 63, p. 062303 1 p.

    Research output: Contribution to journalArticle

  129. Published

    Single Track Circuit Codes

    Hiltgen, A. P. & Paterson, K. G., 2001, In : IEEE Transactions on Information Theory. 47, 6, p. 2587-2595 9 p.

    Research output: Contribution to journalArticle

  130. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    The completion of a poset in a lattice of antichains

    Crampton, J. & Loizou, G., 2001, In : International Mathematical Journal. 1, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  132. Published

    Thwarting timing attacks using ATM networks

    Price, G., 2001, Security Protocols, 9th International Workshop, Cambridge, UK. 25-27 April, 2001. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  133. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In : IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticle

  136. 2000
  137. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In : Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticle

  138. Published

    Improved Linear Systolic Array for Fast Modular Exponentiation

    Walter, C. D., 1 Sep 2000, In : IEE Proc. Computers and Digital Techniques. 147, 5, p. 323-328 6 p.

    Research output: Contribution to journalArticle

  139. Published

    Making serial number based authentication robust against loss of state

    Mitchell, C. J., Jul 2000, In : Operating Systems Review. 34, 3, p. 56-59 4 p.

    Research output: Contribution to journalArticle

  140. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2000, In : Information Security Technical Report. 5, 2, p. 1

    Research output: Contribution to journalArticle

  141. Published

    A New Family of Extended Generalized Quadrangles of Order (q+1, q-1).

    Ng, S-L. & Wild, P., 2000, In : European Journal of Combinatorics. 21, p. 395-406

    Research output: Contribution to journalArticle

  142. Published

    Baby-step giant-step algorithms for non-uniform distributions

    Blackburn, S. R. & Teske, E., 2000, Proceedings of ANTS IV. Bosma, W. (ed.). Berlin: Springer, p. 153-168 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  143. Published

    Bieberbach groups with finite commutator quotient and point-group C_p^n x C_p^m

    Cid, C., 2000, In : Journal of Group Theory. 3, 2, p. 113-125 13 p.

    Research output: Contribution to journalArticle

  144. Published

    Broadening the scope of Fault Tolerance within Secure services

    Price, G., 2000, Security Protocols, 8th International Workshop, Cambridge, UK. 3-5 April, 2000. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  145. Published

    Certificate translation

    Borselius, N. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 289-300 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Certification of secure RSA keys

    Blackburn, S. R. & Galbraith, S. D., 2000, In : Electronics Letters. 36, 1, p. 29-30 2 p.

    Research output: Contribution to journalArticle

  147. Published

    Classical limit in terms of symbolic dynamics for the quantum baker's map

    Soklakov, A. N. & Schack, R., 2000, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 61, p. 5108-5114 7 p.

    Research output: Contribution to journalArticle

  148. Published

    Comment: Horng's identification scheme based on Shamir's 'RSA for paranoids'

    Mitchell, C. J. & Ng, S-L., 2000, In : Electronics Letters. 36, 5, p. 422-422 1 p.

    Research output: Contribution to journalComment/debate

  149. Published

    Conflict of interest policies: A general approach

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  150. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Developments in security mechanism standards

    Mitchell, C. J., 2000, Internet and Intranet Security Management: Risks and Solutions. Janczewski, L. J. (ed.). Idea Group Publishing, p. 185-246 62 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  152. Published

    Efficient Decoding Algorithms for Generalised Reed-Muller Codes

    Paterson, K. G. & Jones, A. E., 2000, In : IEEE Transactions on Communications. 48, 8, p. 1272-1285 14 p.

    Research output: Contribution to journalArticle

  153. Published

    Explicit product ensembles for separable quantum states

    Schack, R. & Caves, C. M., 2000, In : J. Mod. Opt.. 47, p. 387-399 13 p.

    Research output: Contribution to journalArticle

  154. Published

    Generalised Reed-Muller Codes and Power Control in OFDM

    Paterson, K. G., 2000, In : IEEE Transactions on Information Theory. 46, 1, p. 104-120 17 p.

    Research output: Contribution to journalArticle

  155. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    Less harm, less worry or how to improve network security by bounding system offensiveness

    Bruschi, D., Cavallaro, L. & Rosti, E., 2000, 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    On the existence and construction of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2000, In : IEEE Transactions on Information Theory. 46, 6, p. 1974-1987 14 p.

    Research output: Contribution to journalArticle

  160. Published

    Perfect hash families: probabilistic methods and explicit constructions

    Blackburn, S. R., 2000, In : Journal of Combinatorial Theory, Series A. 92, p. 54-60 7 p.

    Research output: Contribution to journalArticle

  161. Published

    Preparation information and optimal decompositions for mixed quantum states

    Soklakov, A. N. & Schack, R., 2000, In : J. Mod. Opt.. 47, p. 2265-2276 12 p.

    Research output: Contribution to journalArticle

  162. Published

    Quantum probability from decision theory?

    Barnum, H., Caves, C. M., Finkelstein, J., Fuchs, C. A. & Schack, R., 2000, In : Proc. R. Soc. Lond. A. 456, p. 1175-1182 8 p.

    Research output: Contribution to journalArticle

  163. Published

    Secure Log File Download Mechanisms for Smart Cards

    Markantonakis, K., 2000, Proceedings of the The International Conference on Smart Card Research and Applications. London, UK: Springer-Verlag, p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Security: a technical approach

    Piper, F. C. & Mitchell, C. J., 2000, E-commerce Handbook. Clapperton, G. (ed.). Gee Publishing, p. 9/11-9/20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  165. Published

    Shifts on a finite qubit string: A class of quantum baker's maps

    Schack, R. & Caves, C. M., 2000, In : Applicable Algebra in Engineering, Communication and Computing (AAECC). 10, p. 305-310 6 p.

    Research output: Contribution to journalArticle

  166. Published

    Structural complexity of conflict of interest policies

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  167. Published

    Two partial orders on the set of antichains

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  168. 1999
  169. Published

    Montgomery Exponentiation Needs No Final Subtractions

    Walter, C. D., 1 Oct 1999, In : Electronics Letters. 35, 21, p. 1831-1832 2 p.

    Research output: Contribution to journalArticle

  170. Published

    Grupos de Bieberbach Metabelianos com Quociente Derivado Finito

    Cid, C., 14 Jul 1999, 90 p.

    Research output: ThesisDoctoral Thesis

  171. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Information security technical report - prospectus: Interfacing with smartcard applications. (The OpenCard Framework and PC/SC)

    Markantonakis, K., 1 Jan 1999, In : Information Security Technical Report. 4, p. 7-8 2 p.

    Research output: Contribution to journalArticle

  174. Published

    A fair certification protocol

    Mitchell, C. J. & Rantos, K., 1999, In : Computer Communication Review. 29, 3, p. 47-49 3 p.

    Research output: Contribution to journalArticle

  175. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  176. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In : Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticle

  177. Published

    Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards

    Markantonakis, K., 1999, Proceedings of the Second International Conference on Information and Communication Security. Springer-Verlag, p. 230-243 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  178. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In : The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticle

  179. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, In : Australian Computer Journal. 31, 2, p. 34-43 10 p.

    Research output: Contribution to journalArticle

  180. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy, 4th Australasian Conference, ACISP99. Springer, Vol. 1587. p. 177-191 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  181. Published

    Classical model for bulk-ensemble NMR quantum computation

    Schack, R. & Caves, C. M., 1999, In : Physical Review A. 60, p. 4354-4362 9 p.

    Research output: Contribution to journalArticle

  182. Published

    Codes, Correlations and Power Control in OFDM

    Davis, J. A., Jedwab, J. & Paterson, K. G., 1999, Difference Sets, Sequences and their Correlation Properties. Pott, A. (ed.). Dordrecht: Kluwer Academic Publishers, p. 113-132 20 p. (NATO Science Series C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  183. Published

    Combinatorics and Threshold Cryptography

    Blackburn, S. R., 1999, Combinatorial Designs and their Applications. Holroyd, F. C., Quinn, K. A. S., Rowley, C. & Web, B. S. (eds.). London: CRC Press, p. 49-70 22 p. (Chapman and Hall/CRC Research Notes in Mathematics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  184. Published

    Comment - Signature with message recovery

    Mitchell, C. J. & Yeun, C. Y., 1999, In : Electronics Letters. 35, p. 217 1 p.

    Research output: Contribution to journalArticle

  185. Published

    Comments on "On the Security of Three-Party Cryptographic Protocols" by Xu, Zhang and Zhu.

    Ng, S-L., 1999, In : Operating Systems Review. 33, 3, p. 5-6

    Research output: Contribution to journalComment/debate

  186. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In : Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticle

  187. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In : IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticle

  188. Published

    Cryptanalysis of two cryptosystems based on group actions

    Blackburn, S. R. & Galbraith, S. D., 1999, Advances in Cryptology -- ASIACRYPT '99. Lam, K. Y., Xing, C. & Okamoto, E. (eds.). Berlin: Springer, p. 52-61 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  189. Published

    Efficient Automata-Driven Pattern-Matching for Equational Programs

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1999, In : Softw., Pract. Exper.. 29, 9, p. 793-813 21 p.

    Research output: Contribution to journalArticle

  190. Published

    Evaluating and improving access control

    Crampton, J., Loizou, G. & O'Shea, G., 1999.

    Research output: Working paper

  191. Published

    Groups of prime power order with derived subgroup of prime order

    Blackburn, S. R., 1999, In : Journal of Algebra. 219, p. 625-657 33 p.

    Research output: Contribution to journalArticle

  192. Published

    Implementing a Secure Log File Download Manager for the Java Card

    Markantonakis, K. & Xenitellis, S., 1999, Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. Kluwer, B.V., p. 143-162 20 p. (CMS '99).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  193. Published

    Imprimitive permutation groups and trapdoors in iterated block ciphers

    Paterson, K. G., 1999, Proceedings, Fast Software Encryption Workshop. Knudsen, L. R. (ed.). Springer, p. 201-214 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  194. Published

    Interfacing with Smart Card Applications (The PC/SC and OpenCard Framework)

    Markantonakis, K., 1999, Interfacing with Smart Card Applications (The PC/ SC and OpenCard Framework). 2 ed. Elsevier, Vol. 4. p. 69 77 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  195. Published

    IP access service provision for broadband customers

    Komisarczuk, P., 1999, Services Over the Internet-What Does Quality Cost?(Ref. No. 1999/099), IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    Realizing the quantum baker's map on a NMR quantum computer

    Brun, T. A. & Schack, R., 1999, In : Physical Review A. 59, p. 2649-2658 10 p.

    Research output: Contribution to journalArticle

  200. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In : Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticle

  201. Published

    Security in future mobile multimedia networks

    Mitchell, C. J. & Chen, LI., 1999, Insights into Mobile Multimedia Communications. Bull, D. R., Canagarajah, C. N. & Nix, A. R. (eds.). Academic Press, p. 177-190 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  202. Published

    Separability of very noisy mixed states and implications for NMR quantum computing

    Braunstein, S. L., Caves, C. M., Jozsa, R., Linden, N., Popescu, S. & Schack, R., 1999, In : Physical Review Letters. 83, p. 1054-1057 4 p.

    Research output: Contribution to journalArticle

  203. Published

    Separable states of $N$ quantum bits

    Schack, R. & Caves, C. M., 1999, Proceedings of the X. International Symposium on Theoretical Electrical Engineering. Mathis, W. & Schindler, T. (eds.). Magdeburg: Otto-von-Guericke University, p. 73-78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published
  205. Published

    The linear complexity of the self-shrinking generator

    Blackburn, S. R., 1999, In : IEEE Transactions on Information Theory. 45, 6, p. 2073-2077 5 p.

    Research output: Contribution to journalArticle

  206. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  207. 1998
  208. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1 Oct 1998, Proc. 2nd IMACS Internat. Conf. on Circuits, Systems Computers. Vol. 2. p. 945-949 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In : Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticle

  210. Published

    An Algorithm for Efficient Geometric Secret Sharing

    Martin, K. M. & Jackson, W-A., 1998, In : Utilitas Mathematica. 54, p. 127-150 24 p.

    Research output: Contribution to journalArticle

  211. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J., 1998, In : Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticle

  213. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In : Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticle

  214. Published

    Binary Sequence Sets with Favourable Correlation Properties from Difference Sets and MDS Codes

    Paterson, K. G., 1998, In : IEEE Transactions on Information Theory. 44, p. 172-180 9 p.

    Research output: Contribution to journalArticle

  215. Published

    Bounds and Constructions for Authentication Schemes offering Secrecy

    Martin, K. M., Casse, L. R. A. & Wild, P. R., 1998, In : Designs, Codes and Cryptography. 13, p. 107-129 23 p.

    Research output: Contribution to journalArticle

  216. Published

    Bounds on Partial Correlations of Sequences

    Paterson, K. G. & Lothian, P. J. G., 1998, In : IEEE Transactions on Information Theory. 44, p. 1164-1175 12 p.

    Research output: Contribution to journalArticle

  217. Published

    Coding Techniques for Power Controlled OFDM

    Paterson, K. G., 1998, Proceedings of 9th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '98). IEEE Computer Society Press, Vol. 2. p. 801-805 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  218. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A., 1998, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticle

  219. Published

    Comment: Signature scheme based on discrete logarithm without using one-way hash-function.

    Yeun, C. Y., Mitchell, C. J. & Ng, S-L., 1998, In : Electronics Letters. 34, 24, p. 2329-2330 2 p.

    Research output: Contribution to journalComment/debate

  220. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In : Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticle

  221. Published

    Exponentiation Using Division Chains

    Walter, C. D., 1998, In : IEEE Transactions on Computers. 47, 7, p. 757-765 9 p.

    Research output: Contribution to journalArticle

  222. Published

    Fixing a problem in the Helsinki protocol

    Mitchell, C. J. & Yeun, C. Y., 1998, In : Operating Systems Review. 32, 4, p. 21-24 4 p.

    Research output: Contribution to journalArticle

  223. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    In Search of Multiple Domain Key Recovery

    Knudsen, L. R. & Martin, K. M., 1998, In : Journal of Computer Security. 6, 4, p. 219-236 18 p.

    Research output: Contribution to journalArticle

  225. Published

    Java card technology and security

    Markantonakis, K., 1998, In : Information Security Technical Report. 3, 2, p. 82 - 89

    Research output: Contribution to journalArticle

  226. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In : Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticle

  227. Published

    On integer-valued rational polynomials and depth distributions of binary codes

    Mitchell, C. J., 1998, In : IEEE Transactions on Information Theory. 44, p. 3146-3150 5 p.

    Research output: Contribution to journalArticle

  228. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Optimal linear perfect hash families

    Blackburn, S. R. & Wild, P. R., 1998, In : Journal of Combinatorial Theory, Series A. 83, p. 233-250 18 p.

    Research output: Contribution to journalArticle

  230. Published

    Orthogonal Sequences of Polynomials over Arbitrary Fields

    Blackburn, S. R., 1998, In : Journal of Number Theory. 68, 1, p. 99-111 13 p.

    Research output: Contribution to journalArticle

  231. Published

    Perfect Factors from Cyclic Codes and Interleaving

    Mitchell, C. J. & Paterson, K. G., 1998, In : SIAM Journal on Discrete Mathematics. 11, p. 241-264 24 p.

    Research output: Contribution to journalArticle

  232. Published

    Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering

    Paterson, K. G., 1998, In : Designs, Codes and Cryptography. 14, p. 247-259 13 p.

    Research output: Contribution to journalArticle

  233. Published

    Secure Billing for Mobile Information Services in UMTS

    Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H. J., Horn, G., Poliakova, A. & Howard, P., 1998, Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, 25-28 May 1998) . Trigila, S., Mullery, A., Campolargo, M. & Mampaey, M. (eds.). Springer-Verlag, Vol. 1430. p. 535-548 14 p. (Lecture Notes in Computer Science; no. 1430).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  234. Published

    Secure Log File Download Mechanisms for Smart Cards.

    Markantonakis, K., 1998, CARDIS'98. p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem

    Martin, K. M., 1998, In : Electronics Letters. 34, 24, p. 2328-2329 2 p.

    Research output: Contribution to journalArticle

  236. Published

    Some New Circuit Codes

    Paterson, K. G. & Tuliani, J., 1998, In : IEEE Transactions on Information Theory. 44, p. 1305-1309 5 p.

    Research output: Contribution to journalArticle

  237. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1998, Recent Advances in Information Science and Technology. Mastorakis, N. (ed.). World Scientific, p. 157-161 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  238. Published

    The Case for a Secure Multi-Application Smart Card Operating System

    Markantonakis, K., 1998, Proceedings of the First International Workshop on Information Security. London, UK: Springer-Verlag, p. 188-197 10 p. (ISW '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    The Filing Cabinet Problem

    Martin, K. M. & Koumandos, S., 1998, In : Bulletin of the ICA. 22, p. 25-30 6 p.

    Research output: Contribution to journalArticle

  240. Published

    Trialling Secure Billing with Trusted Third Party Support for UMTS Applications

    Horn, G., Howard, P., Martin, K. M., Mitchell, C. J., Preneel, B. & Rantos, K., 1998, Proceedings of 3rd ACTS Mobile Communications Summit, Rhodes, Greece, 9-11 June 1998. p. 574-579 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  241. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In : Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticle

  242. 1997
  243. Published

    Analysis of Delays in Converting from a Redundant Representation

    Walter, C. D., 1 Jul 1997, In : IEE Proc. Computers and Digital Techniques. 144, 4, p. 219-221 3 p.

    Research output: Contribution to journalArticle

  244. Published

    Authentication using minimally trusted servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., Jul 1997, In : Operating Systems Review. 31, 3, p. 16-28 13 p.

    Research output: Contribution to journalArticle

  245. Published

    Algorithmic information and simplicity in statistical physics

    Schack, R., 1 Jan 1997, In : Int. J. Theor. Phys.. 36, p. 209-226 18 p.

    Research output: Contribution to journalArticle

  246. Published

    Risk analysis: Requirements, conflicts and problems

    Ciechanowicz, Z., 1 Jan 1997, In : Computers and Security. 16, 3, p. 223-232 10 p.

    Research output: Contribution to journalArticle

  247. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In : Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticle

  248. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In : International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticle

  249. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In : Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticle

  250. Published

    A Note on Duality in Linear Secret Sharing Schemes

    Martin, K. M., van Dijk, M. & Jackson, W-A., 1997, In : Bulletin of the ICA. 19, p. 93-101 9 p.

    Research output: Contribution to journalArticle

  251. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  254. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  255. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In : Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticle

  256. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In : SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticle

  257. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In : Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticle

  258. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Fast Rational Interpolation, Reed--Solomon Decoding and the Linear Complexity Profiles of Sequences

    Blackburn, S. R., 1997, In : IEEE Transactions on Information Theory. 43, 2, p. 537-548 12 p.

    Research output: Contribution to journalArticle

  260. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains

    Martin, K. M., 1997, Cryptography and Coding. Springer, Vol. 1355. p. 221-232 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  262. Published

    Interconnection Networks Based on Two-dimensional de Bruijn Graphs

    Paterson, K. G., 1997, Applications of Combinatorial Mathematics. Mithcell, C. J. (ed.). Oxford: Clarendon Press, (The Institute of Mathematics and Its Applications Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  263. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Multisender authentication systems with unconditional security

    Martin, K. M. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 130-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  266. Published

    Mutually Trusted Authority free Secret Sharing Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1997, In : Journal of Cryptology. 10, p. 261-289 29 p.

    Research output: Contribution to journalArticle

  267. Published

    Network provider domain federation in TINA

    Pavón, J., Montes, E. & Komisarczuk, P., 1997, Global Convergence of Telecommunications and Distributed Object Computing, 1997. Proceedings., TINA 97. p. 334-342 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    Secret Sharing in Hierarchical Groups

    Charnes, C., Martin, K. M., Pieprzyk, J. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 81-86 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  270. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Space/Time Trade-Offs for Higher Radix Modular Multiplication using Repeated Addition

    Walter, C. D., 1997, In : IEEE Transactions on Computers. 46, 2, p. 139-141 3 p.

    Research output: Contribution to journalArticle

  272. Published

    The Sajdak Conjecture

    Blackburn, S. R., 1997, In : Math. Spectrum. 30, No. 1, p. 15-16 2 p.

    Research output: Contribution to journalArticle

  273. Published

    Unpredictability, information, and chaos

    Caves, C. M. & Schack, R., 1997, In : Complexity. 3, p. 46-57 12 p.

    Research output: Contribution to journalArticle

  274. 1996
  275. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In : Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticle

  276. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticle

  277. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticle

  278. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  279. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticle

  280. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In : Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticle

  281. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In : Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticle

  282. Published

    Chaos for Liouville probability densities

    Schack, R. & Caves, C. M., 1996, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3387 1 p.

    Research output: Contribution to journalArticle

  283. Published

    Efficient Constructions for One Sharing of Many Secrets

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 283-296 14 p.

    Research output: Contribution to journalArticle

  284. Published

    Efficient Multiplicative Sharing Schemes

    Blackburn, S. R., Burmester, M., Desmedt, Y. & Wild, P. R., 1996, Advances in Cryptology -- EUROCRYPT '96. Maurer, U. (ed.). Berlin: Springer, p. 107-118 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  285. Published

    Ideal Secret Sharing Schemes with Multiple Secrets

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Journal of Cryptology. 9, 6, p. 233-250 18 p.

    Research output: Contribution to journalArticle

  286. Published

    Information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1996, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3257 1 p.

    Research output: Contribution to journalArticle

  287. Published

    Near Optimal Single-Track Gray Codes

    Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 779-789 11 p.

    Research output: Contribution to journalArticle

  288. Published

    New Classes of Perfect Maps I

    Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 73, p. 302-334 33 p.

    Research output: Contribution to journalArticle

  289. Published

    New Classes of Perfect Maps II

    Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 73, p. 335-345 11 p.

    Research output: Contribution to journalArticle

  290. Published

    Node Bisectors of Cayley Graphs

    Blackburn, S. R., 1996, In : Mathematical Systems Theory. 29, p. 589-598 10 p.

    Research output: Contribution to journalArticle

  291. Published

    On the Existence of de Bruijn Tori with Two by Two Windows

    Hurlbert, G., Mitchell, C. J. & Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 76, p. 213-230 18 p.

    Research output: Contribution to journalArticle

  292. Published

    Perfect Secret Sharing Schemes on Five Participants

    Martin, K. M. & Jackson, W-A., 1996, In : Designs, Codes and Cryptography. 9, p. 267-286 20 p.

    Research output: Contribution to journalArticle

  293. Published

    Permutation Polynomials, de Bruijn Sequences and Linear Complexity

    Blackburn, S. R., Etzion, T. & Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 76, p. 55-82 28 p.

    Research output: Contribution to journalArticle

  294. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    Public-key Cryptography on Smart Cards

    Fuchsberger, A., Gollmann, D., Lothian, P., Paterson, K. G. & Sidiropoulos, A., 1996, Cryptography: Policy and Algorithms, Proceedings. Springer, p. 250-269 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  296. Published

    Quantum chaos in open systems: a quantum state diffusion analysis

    Brun, T. A., Percival, I. C. & Schack, R., 1996, In : Journal of Physics A: Mathematical and General. 29, p. 2077-2090 14 p.

    Research output: Contribution to journalArticle

  297. Published

    Quantum state diffusion with a moving basis: computing quantum-optical spectra

    Schack, R., Brun, T. A. & Percival, I. C., 1996, In : Physical Review A. 53, p. 2694 1 p.

    Research output: Contribution to journalArticle

  298. Published

    Redundant integer representations and fast exponentiation

    Gollmann, D., Han, Y. & Mitchell, C. J., 1996, In : Designs, Codes and Cryptography. 7, p. 135-151 17 p.

    Research output: Contribution to journalArticle

  299. Published

    Single Track Gray Codes

    Hiltgen, A. P., Paterson, K. G. & Brandestini, M., 1996, In : IEEE Transactions on Information Theory. 42, p. 1555-1561.

    Research output: Contribution to journalArticle

  300. Published

    Some Remarks on an Algorithm of Fitzpatrick

    Blackburn, S. R. & Chambers, W. G., 1996, In : IEEE Transactions on Information Theory. 42, 4, p. 1269-1271 3 p.

    Research output: Contribution to journalArticle

  301. Published

    Tailoring authentication protocols to match underlying mechanisms

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1996, Information Security and Privacy - Proceedings: First Australasian Conference, Wollongong, NSW, Australia, June 1996. Pieprzyk, J. & Seberry, J. (eds.). Springer-Verlag, p. 121-133 13 p. (Lecture Notes in Computer Science; no. 1172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In : Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticle

  303. Published

    The use of Trusted Third Parties and Secure Billing in UMTS

    Chen, LI., Hitz, H-J., Horn, G., Howker, K., Kessler, V., Knudsen, L. R., Mitchell, C. J. & Radu, C., 1996, Proceedings of the ACTS Mobile Communications Summit, Granada, Spain, 27-29 November 1996. Vol. 2. p. 493-499 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. 1995
  305. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In : IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticle

  306. Published

    A storage complexity based analogue of Maurer key establishment using public channels

    Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 84-93 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Clock-controlled Pseudorandom Generators on Finite Groups

    Baum, U. & Blackburn, S. R., 1995, Fast Software Encryption, 2nd International Workshop, Leuven, Belgium. Preneel, B. (ed.). Berlin: Springer, p. 6-21 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  308. Published

    Comment on "Exponential sensitivity and chaos in quantum systems"

    Schack, R., 1995, In : Physical Review Letters. 75, p. 581 1 p.

    Research output: Contribution to journalArticle

  309. Published

    Distributing trust amongst multiple authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, In : Journal of Computer Security. 3, 4, p. 255-267 13 p.

    Research output: Contribution to journalArticle

  310. Published

    Efficient Secret Sharing without a Mutually Trusted Authority

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Eurocrypt '95. Springer, Vol. 921. p. 183-193 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  311. Published

    Enumerating Perfect Maps

    Paterson, K. G. & Hoare, P. R., 1995, Cryptography and Coding IV. Farrell, P. G. (ed.). Southend-On-Sea, Essex: Formara Ltd.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  312. Published

    Key distribution without individual trusted authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, Proceedings: The 8th IEEE Computer Security Foundations Workshop, Kenmare, Co. Kerry, Ireland, June 1995. IEEE Computer Society Press, p. 30-36 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    Mathematics of Dependable Systems: Proceedings of the first IMA Conference, Royal Holloway, September 1993

    Mitchell, C. J. (ed.) & Stavridou, V. (ed.), 1995, Oxford University Press. 295 p.

    Research output: Book/ReportAnthology

  314. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    New c-ary perfect factors in the de Bruijn Graph

    Mitchell, C. J., 1995, Codes and Cyphers - Cryptography and Coding IV: Proceedings of the fourth IMA Cryptography and Coding Conference, Cirencester, December 1993. Southend: Formara Ltd., p. 299-313 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    On Sharing Many Secrets

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Asiacrypt '94, Lecture Notes in Computer Science. Springer, Vol. 917. p. 42-54 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  317. Published

    Optimal Parameters for Fully On-Line Arithmetic

    Walter, C. D., 1995, In : International J. of Computer Mathematics. 56, p. 11-18 8 p.

    Research output: Contribution to journalArticle

  318. Published

    Perfect Factors in the de Bruijn Graph

    Paterson, K. G., 1995, In : Designs, Codes and Cryptography. 5, p. 115-138 24 p.

    Research output: Contribution to journalArticle

  319. Published

    Quantum state diffusion, localization and computation

    Schack, R., Brun, T. A. & Percival, I. C., 1995, In : Journal of Physics A: Mathematical and General. 28, p. 5401-5413 13 p.

    Research output: Contribution to journalArticle

  320. Published

    Security in future mobile networks

    Mitchell, C. J., 1995, Proceedings of the Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    Security techniques

    Mitchell, C. J., 1995, Proceedings of the IEE Electronics Division Colloquium on Security in Networks, London, February 1995. IEE Press, p. 2/1-2/6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Still Faster Modular Multiplication

    Walter, C. D., 1995, In : Electronics Letters. 31, 4, p. 263-264 2 p.

    Research output: Contribution to journalArticle

  323. Published

    Storage efficient decoding for a class of binary de Bruijn sequences

    Paterson, K. G. & Robshaw, M. J. B., 1995, In : Discrete Mathematics. 138, p. 327-341 15 p.

    Research output: Contribution to journalArticle

  324. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    Verification of Hardware combining Multiplication, Division Square Root

    Walter, C. D., 1995, In : Microprocessors and Microsystems. 19, p. 243-245 3 p.

    Research output: Contribution to journalArticle

  326. 1994
  327. Published

    Hypersensitivity to perturbation in the quantum kicked top

    Schack, R., D'Ariano, G. M. & Caves, C. M., 1 Aug 1994, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 50, p. 972-987 16 p.

    Research output: Contribution to journalArticle

  328. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In : IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticle

  329. Published

    A Weak Cipher that Generates the Symmetric Group

    Murphy, S., Paterson, K. G. & Wild, P. R., 1994, In : Journal of Cryptology. 7, p. 61-65 5 p.

    Research output: Contribution to journalArticle

  330. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In : International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  331. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In : Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticle

  332. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In : Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticle

  333. Published

    Decoding Perfect Maps

    Mitchell, C. J. & Paterson, K. G., 1994, In : Designs, Codes and Cryptography. 4, p. 11-30 20 p.

    Research output: Contribution to journalArticle

  334. Published

    Enumeration within Isoclinism Classes of Groups of Prime Power Order

    Blackburn, S. R., 1994, In : Journal of the London Mathematical Society. 50, p. 293-304 12 p.

    Research output: Contribution to journalArticle

  335. Published

    Geometric Secret Sharing Schemes and their Duals

    Martin, K. M. & Jackson, W-A., 1994, In : Designs, Codes and Cryptography. 4, p. 83-95 13 p.

    Research output: Contribution to journalArticle

  336. Published

    Improving Average Delay for On-Line Algorithms

    Walter, C. D., 1994, In : Electronics Letters. 30, 23, p. 1925-6 1 p.

    Research output: Contribution to journalArticle

  337. Published

    Increasing the Rate of Output of m-Sequences

    Blackburn, S. R., 1994, In : Information Processing Letters. 51, p. 73-77 5 p.

    Research output: Contribution to journalArticle

  338. Published

    Logarithmic Speed Modular Multiplication

    Walter, C. D., 1994, In : Electronics Letters. 30, 17, p. 1397-1398 2 p.

    Research output: Contribution to journalArticle

  339. Published

    Modelling the Satellite Bridge for B-ISDN Islands

    Sun, Z., Komisarczuk, P., Coakley, F. P. & Evans, B. G., 1994, Broadband Islands '94, Connecting with the End-User, Proceedings of the 3rd Intermational Conference on Broadband Islands, Hamburg, Germany, 7-9 June, 1994. p. 211-219 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Multisecret Threshold Schemes

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1994, Advances in Cryptology: Crypto '93. Springer, Vol. 773. p. 126-135 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  341. Published

    On parameter selection for server-aided RSA computation schemes

    Burns, J. & Mitchell, C. J., 1994, In : IEEE Transactions on Computers. 43, 2, p. 163-174 12 p.

    Research output: Contribution to journalArticle

  342. Published

    Perfect binary arrays and difference sets

    Jedwab, J., Mitchell, C. J., Piper, F. C. & Wild, P., 1994, In : Discrete Mathematics. 125, p. 241-254 14 p.

    Research output: Contribution to journalArticle

  343. Published

    Perfect Maps

    Paterson, K. G., 1994, In : IEEE Transactions on Information Theory. IT-40, p. 743-753 11 p.

    Research output: Contribution to journalArticle

  344. Published

    Satellite connections for multimedia communications

    Sun, Z., Hadjitheodosiou, MH., Komisarczuk, P. & Coakley, FP., 1994, Multimedia Communication Systems, IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    The combinatorics of perfect authentication schemes

    Mitchell, C. J., Walker, M. & Wild, P. R., 1994, In : SIAM Journal on Discrete Mathematics. 7, 1, p. 102-107 6 p.

    Research output: Contribution to journalArticle

  346. Published

    The length of a typical Huffman codeword

    Schack, R., 1994, In : IEEE Transactions on Information Theory. IT-40, p. 1246-1247 2 p.

    Research output: Contribution to journalArticle

  347. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. 1993
  350. Published

    B-ISDN implementation via satellite: the catalyst project

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F. & Smythe, C., 1993, Teletraffic Symposium, 10th. Performance Engineering in Telecommunications Network, Tenth UK. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Published

    Coding schemes for two-dimensional position sensing

    Burns, J. & Mitchell, C. J., 1993, Cryptography and Coding III: Proceedings of the third IMA Cryptography and Coding Conference, Cirencester, December 1991. Ganley, M. J. (ed.). Oxford University Press, p. 31-66 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    Cumulative Arrays and Geometric Secret Sharing Schemes

    Jackson, W-A. & Martin, K. M., 1993, Advances in Cryptology: Auscrypt '92. Springer, Vol. 718. p. 48-55 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  353. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    Hardware Implementation of Montgomery's Modular Multiplication Algorithm

    Eldridge, S. E. & Walter, C. D., 1993, In : IEEE Transactions on Computers. 42, 6, p. 693-699 7 p.

    Research output: Contribution to journalArticle

  356. Published

    Hypersensitivity to perturbations in the quantum baker's map

    Schack, R. & Caves, C. M., 1993, In : Physical Review Letters. 71, p. 525-528 4 p.

    Research output: Contribution to journalArticle

  357. Published

    Information and available work in the perturbed baker's map

    Schack, R. & Caves, C. M., 1993, Workshop on Physics and Computation: PhysComp '92. Los Alamitos, California: IEEE Computer Society Press, p. 69-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    Management of secure systems and security within OSI

    Mitchell, C. J., 1993, Information Security. Ettinger, J. E. (ed.). Chapman & Hall, p. 47-60 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  359. Published

    New Secret Sharing Schemes from Old

    Martin, K. M., 1993, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 14, p. 65-77 13 p.

    Research output: Contribution to journalArticle

  360. Unpublished

    On sequences and arrays with specific window properties

    Paterson, K. G., 1993, (Unpublished)

    Research output: ThesisDoctoral Thesis

  361. Published

    Orientable Sequences

    Martin, K. M., Dai, Z. D., Robshaw, M. J. B. & Wild, P. R., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 97-115 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  362. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In : Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticle

  363. Published

    Systolic Modular Multiplication

    Walter, C. D., 1993, In : IEEE Transactions on Computers. 42, 3, p. 376-378 3 p.

    Research output: Contribution to journalArticle

  364. Published

    Untrustworthy Participants in Secret Sharing Schemes

    Martin, K. M., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 255-264 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  365. 1992
  366. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In : IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticle

  367. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In : J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticle

  368. Published
  369. Published

    Digital signatures

    Mitchell, C. J., Piper, F. C. & Wild, P., 1992, Contemporary cryptology: The science of information integrity . Simmons, G. J. (ed.). IEEE, p. 325-378 54 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  370. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Information and entropy in the baker's map

    Schack, R. & Caves, C. M., 1992, In : Physical Review Letters. 69, p. 3413-3416 4 p.

    Research output: Contribution to journalArticle

  372. Published

    Quantum-nondemolition measurement of small photon numbers and the preparation of number states

    Schack, R., Breitenbach, A. & Schenzle, A., 1992, In : Physical Review A. 45, p. 3260-3267 8 p.

    Research output: Contribution to journalArticle

  373. Published

    Resolvable Designs Applicable to Cryptographic Authentication Schemes

    Martin, K. M., Seberry, J. & Wild, P., 1992, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 12, p. 153-160 8 p.

    Research output: Contribution to journalArticle

  374. 1991
  375. Published

    Modified forms of cipher block chaining

    Mitchell, C. J. & Varadharajan, V., Feb 1991, In : Computers and Security. 10, 1, p. 37-40

    Research output: Contribution to journalArticle

  376. Published

    Dynamics and symmetry of a laser with a squeezed reservoir

    Ginzel, C., Schack, R. & Schenzle, A., 1991, In : J. Opt. Soc. Am. B. 8, p. 1704-1711 8 p.

    Research output: Contribution to journalArticle

  377. Published

    Fast Modular Multiplication using 2-Power Radix

    Walter, C. D., 1991, In : International J. of Computer Mathematics. 3, p. 21-28 8 p.

    Research output: Contribution to journalArticle

  378. Published

    Formal Methods

    Walter, C. D., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 135-138 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  379. Published

    Formal Specification and Verification of Software

    Walter, C. D. & Eldridge, S. E., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 331-338 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  380. Published

    Positive P representation

    Schack, R. & Schenzle, A., 1991, In : Physical Review A. 44, p. 682-687 6 p.

    Research output: Contribution to journalArticle

  381. Published

    Squeezed light from a laser with an internal chi2-nonlinear element

    Schack, R., Sizmann, A. & Schenzle, A., 1991, In : Physical Review A. 43, p. 6303 1 p.

    Research output: Contribution to journalArticle

  382. Published

    The Geometry of Shared Secret Schemes

    Martin, K. M., Simmons, G. J. & Jackson, W-A., 1991, In : Bulletin of the ICA. 1, p. 71-88 18 p.

    Research output: Contribution to journalArticle

  383. 1990
  384. Published

    Modulo Multiplier to enhance encryption rates

    Tomlinson, A., 1 Apr 1990, In : Electronic Engineering. 62, 760, p. 25 1 p.

    Research output: Contribution to journalArticle

  385. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In : Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticle

  386. Published

    A security scheme for resource sharing over a network

    Burns, J. & Mitchell, C. J., Feb 1990, In : Computers and Security. 9, 1, p. 67-75 9 p.

    Research output: Contribution to journalArticle

  387. Published

    A secure messaging architecture implementing the X.400-1988 security features

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1990, In : The Computer Journal. 33, p. 290-295 6 p.

    Research output: Contribution to journalArticle

  388. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In : Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticle

  389. Published

    Cryptography and Cryptanalysis

    Mitchell, C. J. & Piper, F. C., 1990, Handbook of Applicable Mathematics: Supplement. Ledermann, W., Lloyd, E., Vajda, S. & Alexander, C. (eds.). John Wiley & Sons, p. 53-92 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  390. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In : Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticle

  391. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In : Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticle

  392. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In : Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  394. Published

    Management of secure systems and security within Open Systems Interconnection (OSI)

    Mitchell, C. J., 1990, Proceedings of Information Security: Confidentiality, Integrity and Availability, London, July 1990. Uxbridge: UNICOM Seminars

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    Moment hierarchies and cumulants in quantum optics

    Schack, R. & Schenzle, A., 1990, In : Physical Review A. 41, p. 3847-3852 6 p.

    Research output: Contribution to journalArticle

  396. Published

    OSI and X.400 security

    Mitchell, C. J., 1990, Proceedings of Network Management '90, London, March 1990. London: Blenheim Online Ltd, p. 157-167 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Some Remarks on Authentication Systems

    Anthony, M. H. G., Martin, K. M., Seberry, J. & Wild, P. R., 1990, Advances in Cryptology -Auscrypt'90. Springer-Verlag, Vol. 453. p. 122-139 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  398. Published

    Squeezed light from a self-frequency doubling laser

    Sizmann, A., Schack, R. & Schenzle, A., 1990, In : Europhysics Letters. 13, p. 109-115 7 p.

    Research output: Contribution to journalArticle

  399. 1989
  400. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In : Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticle

  401. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In : Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticle

  402. Published

    Algorithms for software implementations of RSA

    Selby, A. & Mitchell, C. J., May 1989, In : IEE Proceedings Part E (Computers and Digital Techniques). 136, 3, p. 166-170 5 p.

    Research output: Contribution to journalArticle

  403. Published

    CCITT/ISO standards for secure message handling

    Mitchell, C. J., Walker, M. & Rush, P. D. C., May 1989, In : IEEE Journal on Selected Areas in Communications. 7, 4, p. 517-524 8 p.

    Research output: Contribution to journalArticle

  404. Published

    One-stage one-sided rearrangeable switching networks

    Mitchell, C. J. & Wild, P. R., Jan 1989, In : IEEE Transactions on Communications. 37, 1, p. 52-56 5 p.

    Research output: Contribution to journalArticle

  405. Published

    A remark on hash functions for message authentication

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1989, In : Computers and Security. 8, 1, p. 55-58 4 p.

    Research output: Contribution to journalArticle

  406. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In : The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticle

  407. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticle

  408. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticle

  409. Published

    Experiences of SOLO 1000 in research at the University of Edinburgh

    McGregor, M. S., Tomlinson, A. & Tan, O. K., 1989, Electronics Computer Aided Design. Jones, P. L. & Buckley, A. (eds.). Manchester University Press, p. 182-184 3 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  410. Published

    Minimum weight modified signed-digit representations and fast exponentiation

    Jedwab, J. & Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1171-1172 2 p.

    Research output: Contribution to journalArticle

  411. Published

    Multi-destination secure electronic mail

    Mitchell, C. J., 1989, In : The Computer Journal. 32, 1, p. 13-15 3 p.

    Research output: Contribution to journalArticle

  412. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Single--chip 2-port Adapters for Wave Digital Filters

    Tomlinson, A. & Mirza, A. R., 1989, In : Electronics Letters. 25, 23, p. 1553-1555 3 p.

    Research output: Contribution to journalArticle

  414. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    The security issue

    Mitchell, C. J., 1989, Proceedings of Value Added Network Services for Europe, London, September 1989. London: IBC Technical Services Ltd, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. 1988
  417. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In : Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticle

  418. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In : Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticle

  419. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In : Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticle

  420. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In : Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticle

  421. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In : Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticle

  422. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In : Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticle

  423. Published

    The security architecture of the secure mobile messaging demonstrator

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1988, Proceedings of UK IT 88. IED, Swansea, p. 171-174 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. 1987
  425. Published

    One-to-one correspondence between slowly decaying interfacial profiles and reflectivity

    Dietrich, S. & Schack, R., 1987, In : Physical Review Letters. 58, p. 140-143 4 p.

    Research output: Contribution to journalArticle

  426. Published

    Permutations with restricted displacement

    Beker, H. J. & Mitchell, C. J., 1987, In : SIAM Journal on Algebraic and Discrete Methods. 8, p. 338-363 26 p.

    Research output: Contribution to journalArticle

  427. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In : Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticle

  428. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In : Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticle

  429. 1986
  430. Published

    A First Course in Formal Logic and its Applications in Computer Science

    Dowsing, R., Rayward-Smith, V. J. & Walter, C. D., 1986, Blackwell Scientific Publications, Oxford.

    Research output: Book/ReportBook

  431. Published

    Adjacency Matrices

    Walter, C. D., 1986, In : SIAM Journal on Algebraic and Discrete Methods. 7, p. 18-29 12 p.

    Research output: Contribution to journalArticle

  432. 1985
  433. Published

    A classification of time element speech scramblers

    Mitchell, C. J. & Piper, F. C., Nov 1985, In : Journal of the Institution of Electronic and Radio Engineers. 55, 11/12, p. 391-396 6 p.

    Research output: Contribution to journalArticle

  434. 1984
  435. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In : Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticle

  437. 1983
  438. Published

    Intersection numbers for coherent configurations and the spectrum of a graph

    Walter, C. D., 1983, In : Journal of Combinatorial Theory, Series B. 35, 2, p. 201-204 4 p.

    Research output: Contribution to journalArticle

  439. 1982
  440. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In : Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticle

  441. 1980
  442. Published

    Pure fields of degree 9 with class number prime to 3

    Walter, C. D., 1980, In : Annales de l'Institut Fourier, Grenoble. 30, p. 1-16 16 p.

    Research output: Contribution to journalArticle

  443. 1979
  444. Published

    An infinite family of symmetric designs

    Mitchell, C. J., 1979, In : Discrete Mathematics. 26, p. 247-250 4 p.

    Research output: Contribution to journalArticle

  445. Published

    Brauer's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 33-40 8 p.

    Research output: Contribution to journalArticle

  446. Published

    Kuroda's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 41-51 11 p.

    Research output: Contribution to journalArticle

  447. Published

    The ambiguous class group and the genus group of certain non-normal extensions

    Walter, C. D., 1979, In : Mathematika. 26, p. 113-124 12 p.

    Research output: Contribution to journalArticle

  448. 1978
  449. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In : Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticle

  450. 1977
  451. Published

    A class number relation in Frobenius extensions of number fields

    Walter, C. D., 1977, In : Mathematika. 24, p. 216-225 10 p.

    Research output: Contribution to journalArticle

  452. Published

    The class number of pure fields of prime degree (addendum)

    Parry, C. J. & Walter, C. D., 1977, In : Mathematika. 24, p. 122 1 p.

    Research output: Contribution to journalArticle

  453. 1976
  454. Published

    Class Number Relations in Algebraic Number Fields

    Walter, C. D., 1 Apr 1976, University of Cambridge.

    Research output: Book/ReportCommissioned report

  455. Published

    The class number of pure fields of prime degree

    Parry, C. J. & Walter, C. D., 1976, In : Mathematika. 23, p. 220-226 7 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 Next