The following pages link to Chris J. Mitchell (Q1113871):
Displaying 50 items.
- (Q918499) (redirect page) (← links)
- Enumerating Boolean functions of cryptographic significance (Q918500) (← links)
- Key-minimal cryptosystems for unconditional secrecy (Q923053) (← links)
- Key storage in secure networks (Q1113873) (← links)
- Decoding perfect maps (Q1321553) (← links)
- Perfect binary arrays and difference sets (Q1322276) (← links)
- Constructing \(c\)-ary perfect factors (Q1335420) (← links)
- Improvement of modified authenticated key agreement protocol (Q1399739) (← links)
- Analysis of 3gpp-MAC and two-key 3gpp-MAC (Q1811102) (← links)
- Redundant integer representations and fast exponentiation (Q1910428) (← links)
- ID-based cryptography using symmetric primitives (Q2384045) (← links)
- Partial key recovery attack against RMAC (Q2499260) (← links)
- On the existence of de Bruijn tori with two by two windows (Q2563712) (← links)
- (Q2741429) (← links)
- On the Security of 2-Key Triple DES (Q2976504) (← links)
- (Q3149704) (← links)
- (Q3218141) (← links)
- Infinite families of quasiperfect and doubly quasiperfect binary arrays (Q3358271) (← links)
- Single Sign-On Using Trusted Platforms (Q3404393) (← links)
- Minimum weight modified signed-digit representations and fast exponentiation (Q3495290) (← links)
- Permutations with Restricted Displacement (Q3768908) (← links)
- (Q3795461) (← links)
- One-stage one-sided rearrangeable switching networks (Q3816030) (← links)
- The Combinatorics of Perfect Authentication Schemes (Q4287943) (← links)
- De Bruijn Sequences and Perfect Factors (Q4337745) (← links)
- (Q4373664) (← links)
- Perfect Factors from Cyclic Codes and Interleaving (Q4388991) (← links)
- (Q4450753) (← links)
- (Q4484213) (← links)
- (Q4501498) (← links)
- (Q4502746) (← links)
- (Q4536645) (← links)
- (Q4536801) (← links)
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs (Q4550256) (← links)
- Undetachable Threshold Signatures (Q4550272) (← links)
- Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation (Q4550274) (← links)
- Minimal weight k-SR representations (Q4608495) (← links)
- On integer-valued rational polynomials and depth distributions of binary codes (Q4701239) (← links)
- (Q4831221) (← links)
- Aperiodic and semi-periodic perfect maps (Q4840874) (← links)
- A method for constructing decodable de Bruijn sequences (Q4896825) (← links)
- Constructing Orientable Sequences (Q5088591) (← links)
- Another Look at Privacy Threats in 3G Mobile Telephony (Q5170788) (← links)
- Analysing the IOBC Authenticated Encryption Mode (Q5300931) (← links)
- Information and Communications Security (Q5394019) (← links)
- Cryptography and Coding (Q5428175) (← links)
- Applied Cryptography and Network Security (Q5443109) (← links)
- (Q5446585) (← links)
- Cryptanalysis of the EPBC Authenticated Encryption Mode (Q5447512) (← links)
- Information Security and Privacy (Q5473574) (← links)