Person:1113871: Difference between revisions

From MaRDI portal
Person:1113871
Created automatically from import231006081045
 
m AuthorDisambiguator moved page Chris J. Mitchell to Chris J. Mitchell: Duplicate
 
(No difference)

Latest revision as of 03:36, 13 December 2023

Available identifiers

zbMath Open mitchell.chris-jMaRDI QIDQ1113871

List of research outcomes





PublicationDate of PublicationType
Constructing Orientable Sequences2022-07-13Paper
Minimal weight k-SR representations2018-03-21Paper
On the Security of 2-Key Triple DES2017-04-28Paper
Another Look at Privacy Threats in 3G Mobile Telephony2014-07-24Paper
Analysing the IOBC Authenticated Encryption Mode2013-06-28Paper
Single Sign-On Using Trusted Platforms2010-02-09Paper
Cryptanalysis of the EPBC Authenticated Encryption Mode2008-03-07Paper
https://portal.mardi4nfdi.de/entity/Q54465852008-03-06Paper
Applied Cryptography and Network Security2008-02-19Paper
Cryptography and Coding2007-11-28Paper
ID-based cryptography using symmetric primitives2007-09-20Paper
Cryptography and Coding2006-11-01Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
Partial key recovery attack against RMAC2006-08-14Paper
Information Security and Privacy2006-06-22Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2006-06-22Paper
https://portal.mardi4nfdi.de/entity/Q48312212004-12-22Paper
https://portal.mardi4nfdi.de/entity/Q44507532004-02-16Paper
Improvement of modified authenticated key agreement protocol2003-07-30Paper
https://portal.mardi4nfdi.de/entity/Q44842132003-06-12Paper
Analysis of 3gpp-MAC and two-key 3gpp-MAC2003-06-10Paper
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs2002-12-02Paper
Undetachable Threshold Signatures2002-11-25Paper
https://portal.mardi4nfdi.de/entity/Q31497042002-09-26Paper
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation2002-08-21Paper
https://portal.mardi4nfdi.de/entity/Q45014982002-08-05Paper
https://portal.mardi4nfdi.de/entity/Q45368012002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q45366452002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27414292001-10-14Paper
https://portal.mardi4nfdi.de/entity/Q45027462000-11-07Paper
On integer-valued rational polynomials and depth distributions of binary codes1999-11-21Paper
Perfect Factors from Cyclic Codes and Interleaving1998-05-11Paper
https://portal.mardi4nfdi.de/entity/Q43736641998-01-21Paper
De Bruijn Sequences and Perfect Factors1997-05-26Paper
On the existence of de Bruijn tori with two by two windows1996-12-16Paper
Redundant integer representations and fast exponentiation1996-12-12Paper
A method for constructing decodable de Bruijn sequences1996-10-22Paper
Aperiodic and semi-periodic perfect maps1996-06-03Paper
Constructing \(c\)-ary perfect factors1995-03-05Paper
Perfect binary arrays and difference sets1994-11-27Paper
Decoding perfect maps1994-08-24Paper
The Combinatorics of Perfect Authentication Schemes1994-04-19Paper
Enumerating Boolean functions of cryptographic significance1990-01-01Paper
Key-minimal cryptosystems for unconditional secrecy1990-01-01Paper
Infinite families of quasiperfect and doubly quasiperfect binary arrays1990-01-01Paper
Minimum weight modified signed-digit representations and fast exponentiation1989-01-01Paper
One-stage one-sided rearrangeable switching networks1989-01-01Paper
Key storage in secure networks1988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37954611988-01-01Paper
Permutations with Restricted Displacement1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32181411984-01-01Paper

Research outcomes over time

This page was built for person: Chris J. Mitchell