Home > ISG home > Research > Profile > Publications

Former organisational unit. 24/08/12. Taken over by Department of Information Security

  1. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In: Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In: Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In: Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In: International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In: IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In: Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    A mathematical walk in Surrey

    Blackburn, S. R., 2008, In: BSHM Bulletin: Journal of the British Society for the History of Mathematics. 23, p. 178-180 3 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    A Note on Game-Hopping Proofs

    Dent, A. W., 2006, In: Cryptology ePrint Archive: Report. 2006/260

    Research output: Contribution to journalArticlepeer-review

  13. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In: Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G. & Mayes, K., Mar 2013, In: International Journal of RFID Security and Cryprography (IJRFIDSC). 2, 1-4, p. 92-106 14 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In: Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A simple necessary decoherence condition for a set of histories

    Scherer, A., Soklakov, A. N. & Schack, R., 2004, In: Physics Letters A. 326, p. 307 1 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A Survey of Certificateless Encryption Schemes and Security Models

    Dent, A. W., 2008, In: International Journal of Information Security. 7, 9, p. 349-377 29 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    A survey on Reinforcement learning models and algorithms for traffic signal control

    Yau, K. L. A., Qadir, J., Khoo, H. L., Ling, M. H. & Komisarczuk, P., 1 Jun 2017, In: ACM Computing Surveys. 50, 3, 3068287.

    Research output: Contribution to journalReview articlepeer-review

  19. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Algorithmic information and simplicity in statistical physics

    Schack, R., 1 Jan 1997, In: Int. J. Theor. Phys.. 36, p. 209-226 18 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796. p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In: Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In: Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Baby-step giant-step algorithms for non-uniform distributions

    Blackburn, S. R. & Teske, E., 2000, Proceedings of ANTS IV. Bosma, W. (ed.). Berlin: Springer, p. 153-168 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Bayesian Conditioning, the Reflection Principle, and Quantum Decoherence

    Fuchs, C. A. & Schack, R., 2012, Probability in Physics. Ben-Menahem, Y. & Hemmo, M. (eds.). Berlin: Springer Verlag, p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingChapter

  28. Published

    Bayesian probability in quantum mechanics

    Schack, R., 2007, Bayesian Statistics 8: Proceedings of the Eighth Valencia International Meeting. Bernardo, J. M., Bayarri, M. J., Berger, J. O., Dawid, A. P., Heckerman, D., Smith, A. F. M. & West, M. (eds.). Oxford: Oxford University Press, p. 453-464

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Bayesian updating of a probability distribution encoded on a quantum register

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 74, p. 032315 1 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Bayesian versus frequentist predictions in quantum tomography

    Schack, R., 2007, Foundations of Probability and Physics 4: AIP Conference Proceedings Vol.~889. Adenier, G., Fuchs, C. A. & Khrennikov, A. (eds.). Melville, New York: American Institute of Physics, p. 230-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Broadcast Encryption with Multiple Trust Authorities

    Boklan, K. D., Dent, A. W. & Seaman, C. A., 2010, Latincrypt 2010. Abdalla, M. & Baretto, P. S. L. M. (eds.). Springer-Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  32. Published

    Building better signcryption schemes with Tag-KEMs

    Bjørstad, T. E. & Dent, A. W., 2006, Public Key Cryptography -- PKC 2006. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Springer-Verlag, p. 491-507 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. Published

    Certification of secure RSA keys

    Blackburn, S. R. & Galbraith, S. D., 2000, In: Electronics Letters. 36, 1, p. 29-30 2 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Chaos for Liouville probability densities

    Schack, R. & Caves, C. M., 1996, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3387 1 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Character sums and nonlinear recurrence sequences

    Blackburn, S. R. & Shparlinski, I. E., 2006, In: Discrete Mathematics. 306, p. 1132-1138 7 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Classical limit in terms of symbolic dynamics for the quantum baker's map

    Soklakov, A. N. & Schack, R., 2000, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 61, p. 5108-5114 7 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Classical model for bulk-ensemble NMR quantum computation

    Schack, R. & Caves, C. M., 1999, In: Physical Review A. 60, p. 4354-4362 9 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Classical predictability and coarse-grained evolution of the quantum baker's map

    Scherer, A., Soklakov, A. N. & Schack, R., 2006, In: Physical Review D . 73, p. 125009 1 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Clock-controlled Pseudorandom Generators on Finite Groups

    Baum, U. & Blackburn, S. R., 1995, Fast Software Encryption, 2nd International Workshop, Leuven, Belgium. Preneel, B. (ed.). Berlin: Springer, p. 6-21 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    Combinatorial schemes for protecting digital content

    Blackburn, S. R., 2003, Surveys in Combinatorics 2003. Wensley, C. D. (ed.). Cambridge: Cambridge University Press, p. 43-78 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  41. Published

    Combinatorics and Threshold Cryptography

    Blackburn, S. R., 1999, Combinatorial Designs and their Applications. Holroyd, F. C., Quinn, K. A. S., Rowley, C. & Web, B. S. (eds.). London: CRC Press, p. 49-70 22 p. (Chapman and Hall/CRC Research Notes in Mathematics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In: Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Comment on "Exponential sensitivity and chaos in quantum systems"

    Schack, R., 1995, In: Physical Review Letters. 75, p. 581 1 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Computational and Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2004, Proceedings of the Seventh International Workshop on Computer Algebra in Scientific Computing, CASC 2004. p. 93-103 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Confidential Signatures and Deterministic Signcryption

    Dent, A. W., Fischlin, M., Maulis, M., Stam, M. & Schroder, D., 2010, Public Key Cryptography -- PKC 2010. Nguyen, P. & Pointcheval, D. (eds.). p. 462-479 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  48. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In: Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., 6 Aug 2021, arXiv, 19 p.

    Research output: Working paper

  51. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In: Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In: Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

    Choi, S-J., Blackburn, S. R. & Wild, P. R., 2007, In: Journal of Mathematical Cryptology. 1, p. 351-358 8 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In: Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In: IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticlepeer-review

  56. Published

    Cryptanalysis of two cryptosystems based on group actions

    Blackburn, S. R. & Galbraith, S. D., 1999, Advances in Cryptology -- ASIACRYPT '99. Lam, K. Y., Xing, C. & Okamoto, E. (eds.). Berlin: Springer, p. 52-61 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  57. Published

    Decoherence and linear entropy increase in the quantum baker's map

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review E (Statistical, Nonlinear, and Soft Matter Physics). 66, p. 036212 1 p.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Dynamics and symmetry of a laser with a squeezed reservoir

    Ginzel, C., Schack, R. & Schenzle, A., 1991, In: J. Opt. Soc. Am. B. 8, p. 1704-1711 8 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In: Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards

    Birkett, J., Dent, A. W., Neven, G. & Schuldt, J. C. N., 2007, Information Security and Privacy: 12th Australasian Conference -- ACISP 2007. Pieprzyk, J., Ghodosi, H. & Dawson, E. (eds.). Springer-Verlag, p. 274-292 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  61. Published

    Efficient KEMs with Partial Message Recovery

    Bjørstad, T. E., Dent, A. W. & Smart, N. P., 2007, Cryptography and Coding -- 11th IMA International Conference. Galbraith, S. D. (ed.). Springer-Verlag, p. 233-256 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  62. Published

    Efficient Multiplicative Sharing Schemes

    Blackburn, S. R., Burmester, M., Desmedt, Y. & Wild, P. R., 1996, Advances in Cryptology -- EUROCRYPT '96. Maurer, U. (ed.). Berlin: Springer, p. 107-118 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  63. Published

    Efficient state preparation for a register of quantum bits

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 73, p. 012307 1 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In: Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Enumeration of Finite Groups

    Blackburn, S. R., Neumann, P. M. & Venkataraman, G., 2007, Cambridge: Cambridge University Press.

    Research output: Book/ReportBook

  66. Published

    Enumeration within Isoclinism Classes of Groups of Prime Power Order

    Blackburn, S. R., 1994, In: Journal of the London Mathematical Society. 50, p. 293-304 12 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Exchangeability and de Finetti's theorem: from probabilities to quantum-mechanical states

    Schack, R., 2004, Bayesian Inference and Maximum Entropy Methods in Science and Engineering: AIP Conference Proceedings Vol.~735. Fischer, R., Preuss, R. & von Toussaint, U. (eds.). Melville, New York: AIP Press, p. 565

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Explicit product ensembles for separable quantum states

    Schack, R. & Caves, C. M., 2000, In: J. Mod. Opt.. 47, p. 387-399 13 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Fast Rational Interpolation, Reed--Solomon Decoding and the Linear Complexity Profiles of Sequences

    Blackburn, S. R., 1997, In: IEEE Transactions on Information Theory. 43, 2, p. 537-548 12 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    Flaws in an e-mail protocol of Sun, Hsieh and Hwang

    Dent, A. W., 2005, In: IEEE Communications Letters. 9, 8, p. 718-719 2 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity

    Talhouk, R., Coles-Kemp, L., Jensen, R. B., Balaam, M., Garbett, A., Ghattas, H., Araujo-Soares, V., Ahmad, B. & Montague, K., Oct 2020, ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, Vol. 4. p. 1-25 25 p. 134

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Frameproof Codes

    Blackburn, S. R., 2003, In: SIAM Journal on Discrete Mathematics. 16, p. 499-510 12 p.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    From Quantum Interference to Bayesian Coherence and Back Round Again

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J-A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 260-279

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Fundamental problems in provable security and cryptography

    Dent, A. W., 2006, In: Phil Trans R Soc A. 364, 1849, p. 3215-3230 16 p.

    Research output: Contribution to journalArticlepeer-review

  75. Published

    Groups of prime power order with derived subgroup of prime order

    Blackburn, S. R., 1999, In: Journal of Algebra. 219, p. 625-657 33 p.

    Research output: Contribution to journalArticlepeer-review

  76. Published

    Hidden pairings and trapdoor DDH groups

    Dent, A. W. & Galbraith, S. D., 2006, Algorithmic Number Theory: 7th International Symposium (ANTS VII). Hess, F., Pauli, S. & Pohst, M. (eds.). Springer-Verlag, p. 436-451 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Published

    Hybrid cryptography

    Dent, A. W., 2004, In: Cryptology ePrint Archive: Report. 2004/210

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Hybrid signcryption schemes with insider security

    Dent, A. W., 2005, Information Security and Privacy: 10th Australasian Conference -- ACISP 2005. Boyd, C. & Nieto, J. M. G. (eds.). Springer-Verlag, p. 253-266 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  79. Published

    Hybrid signcryption schemes with outsider security

    Dent, A. W., 2005, Information Security: 8th International Conference -- ISC 2005. Zhou, J., Lopez, J., Deng, R. H. & Bao, F. (eds.). Springer-Verlag, p. 203-217 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. Published

    Hypersensitivity and chaos signatures in the quantum baker's maps

    Scott, A. J., Brun, T. A., Caves, C. M. & Schack, R., 2006, In: Journal of Physics A: Mathematical and General. 39, p. 13405 1 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Hypersensitivity to perturbation in the quantum kicked top

    Schack, R., D'Ariano, G. M. & Caves, C. M., 1 Aug 1994, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 50, p. 972-987 16 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Hypersensitivity to perturbations in the quantum baker's map

    Schack, R. & Caves, C. M., 1993, In: Physical Review Letters. 71, p. 525-528 4 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Hypothesis elimination on a quantum computer

    Soklakov, A. N. & Schack, R., 2004, Quantum Communication, Measurement and Computing (QCMC'04). Barnett, S. M. (ed.). Melville, New York: AIP Press, p. 151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In: Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    Identity-based encryption gone wild

    Abdalla, M., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G. & Smart, N. P., 2006, Automata, Languages and Programming (2) -- ICALP 2006. Bugliesi, M., Preneel, B., Sassone, V. & Wegener, I. (eds.). Springer-Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    Identity-based traitor tracing

    Abdalla, M., Dent, A. W., Malone-Lee, J., Neven, G., Phan, D. H. & Smart, N. P., 2007, Public Key Cryptography -- PKC 2007. Okamoto, T. & Wang, X. (eds.). Springer-Verlag, p. 458-476 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    Improving interpretations of trust claims

    Sel, M., 24 May 2017, Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Proceedings. Vassileva, J., Mauw, S., Habib, S. M. & Muhlhauser, M. (eds.). Springer New York LLC, p. 164-173 10 p. (IFIP Advances in Information and Communication Technology; vol. 473).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Increasing the Rate of Output of m-Sequences

    Blackburn, S. R., 1994, In: Information Processing Letters. 51, p. 73-77 5 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Information and available work in the perturbed baker's map

    Schack, R. & Caves, C. M., 1993, Workshop on Physics and Computation: PhysComp '92. Los Alamitos, California: IEEE Computer Society Press, p. 69-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Information and entropy in the baker's map

    Schack, R. & Caves, C. M., 1992, In: Physical Review Letters. 69, p. 3413-3416 4 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Information dynamics in cavity QED

    Soklakov, A. N. & Schack, R., 2003, In: Physical Review A. 67, p. 033804 1 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1996, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3257 1 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    Key establishment using signcryption techniques

    Dent, A. W., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 217-240

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Published

    Moment hierarchies and cumulants in quantum optics

    Schack, R. & Schenzle, A., 1990, In: Physical Review A. 41, p. 3847-3852 6 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Node Bisectors of Cayley Graphs

    Blackburn, S. R., 1996, In: Mathematical Systems Theory. 29, p. 589-598 10 p.

    Research output: Contribution to journalArticlepeer-review

  99. Published

    On the average energy of circulant graphs

    Blackburn, S. R. & Shparlinski, I. E., 2008, In: Linear Algebra and Its Applications. 428, p. 1956-1963 8 p.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    ON THE DISTRIBUTION OF THE SUBSET SUM PSEUDORANDOM NUMBER GENERATOR ON ELLIPTIC CURVES

    Blackburn, S. R., Ostafe, A. & Shparlinski, I. E., 2011, In: Uniform Distribution Theory. 6, 1, p. 127-142 16 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 Next