Chris J. Mitchell

From MaRDI portal
Person:1113871


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Constructing Orientable Sequences
IEEE Transactions on Information Theory
2022-07-13Paper
Minimal weight \(k\)-SR representations
Cryptography and Coding
2018-03-21Paper
On the Security of 2-Key Triple DES
IEEE Transactions on Information Theory
2017-04-28Paper
Another look at privacy threats in 3G mobile telephony
Information Security and Privacy
2014-07-24Paper
Analysing the IOBC authenticated encryption mode
Information Security and Privacy
2013-06-28Paper
Single sign-on using trusted platforms
Lecture Notes in Computer Science
2010-02-09Paper
Cryptanalysis of the EPBC Authenticated Encryption Mode
Cryptography and Coding
2008-03-07Paper
Malicious attacks on ad hoc network routing protocols
 
2008-03-06Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
ID-based cryptography using symmetric primitives
Designs, Codes and Cryptography
2007-09-20Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Partial key recovery attack against RMAC
Journal of Cryptology
2006-08-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
scientific article; zbMATH DE number 2123733 (Why is no real title available?)
 
2004-12-22Paper
scientific article; zbMATH DE number 2043326 (Why is no real title available?)
 
2004-02-16Paper
Improvement of modified authenticated key agreement protocol
Applied Mathematics and Computation
2003-07-30Paper
scientific article; zbMATH DE number 1927320 (Why is no real title available?)
 
2003-06-12Paper
Analysis of 3gpp-MAC and two-key 3gpp-MAC
Discrete Applied Mathematics
2003-06-10Paper
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
Cryptography and Coding
2002-12-02Paper
Undetachable Threshold Signatures
Cryptography and Coding
2002-11-25Paper
scientific article; zbMATH DE number 1808246 (Why is no real title available?)
 
2002-09-26Paper
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation
Cryptography and Coding
2002-08-21Paper
scientific article; zbMATH DE number 1500489 (Why is no real title available?)
 
2002-08-05Paper
scientific article; zbMATH DE number 1759778 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1759649 (Why is no real title available?)
 
2002-06-25Paper
An analysis of the 3gpp-MAC scheme
 
2001-10-14Paper
scientific article; zbMATH DE number 1504788 (Why is no real title available?)
 
2000-11-07Paper
On integer-valued rational polynomials and depth distributions of binary codes
IEEE Transactions on Information Theory
1999-11-21Paper
Perfect Factors from Cyclic Codes and Interleaving
SIAM Journal on Discrete Mathematics
1998-05-11Paper
scientific article; zbMATH DE number 1107716 (Why is no real title available?)
 
1998-01-21Paper
De Bruijn Sequences and Perfect Factors
SIAM Journal on Discrete Mathematics
1997-05-26Paper
On the existence of de Bruijn tori with two by two windows
Journal of Combinatorial Theory. Series A
1996-12-16Paper
Redundant integer representations and fast exponentiation
Designs, Codes and Cryptography
1996-12-12Paper
A method for constructing decodable de Bruijn sequences
IEEE Transactions on Information Theory
1996-10-22Paper
Aperiodic and semi-periodic perfect maps
IEEE Transactions on Information Theory
1996-06-03Paper
Constructing \(c\)-ary perfect factors
Designs, Codes and Cryptography
1995-03-05Paper
Perfect binary arrays and difference sets
Discrete Mathematics
1994-11-27Paper
Decoding perfect maps
Designs, Codes and Cryptography
1994-08-24Paper
The Combinatorics of Perfect Authentication Schemes
SIAM Journal on Discrete Mathematics
1994-04-19Paper
Enumerating Boolean functions of cryptographic significance
Journal of Cryptology
1990-01-01Paper
Key-minimal cryptosystems for unconditional secrecy
Journal of Cryptology
1990-01-01Paper
Infinite families of quasiperfect and doubly quasiperfect binary arrays
Electronics Letters
1990-01-01Paper
Minimum weight modified signed-digit representations and fast exponentiation
Electronics Letters
1989-01-01Paper
One-stage one-sided rearrangeable switching networks
IEEE Transactions on Communications
1989-01-01Paper
Key storage in secure networks
Discrete Applied Mathematics
1988-01-01Paper
scientific article; zbMATH DE number 4060971 (Why is no real title available?)
 
1988-01-01Paper
Permutations with Restricted Displacement
SIAM Journal on Algebraic Discrete Methods
1987-01-01Paper
scientific article; zbMATH DE number 3884180 (Why is no real title available?)
 
1984-01-01Paper


Research outcomes over time


This page was built for person: Chris J. Mitchell