Simon R. Blackburn

From MaRDI portal
(Redirected from Person:396880)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Permutations that separate close elements, and rectangle packings in the torus
The Electronic Journal of Combinatorics
2024-11-09Paper
Constructions and bounds for codes with restricted overlaps
IEEE Transactions on Information Theory
2024-07-22Paper
Block‐avoiding point sequencings
Journal of Combinatorial Designs
2024-02-02Paper
Subsets of free groups with distinct differences
 
2023-07-07Paper
Permutations that separate close elements, and rectangle packings in the torus
 
2023-06-06Paper
Permutations that separate close elements
Journal of Combinatorial Theory. Series A
2023-03-06Paper
Constructions and bounds for codes with restricted overlaps
 
2022-11-18Paper
The capacity of a finite field matrix channel
 
2022-10-25Paper
Permutations that separate close elements
 
2022-07-20Paper
The enumeration of finite rings
 
2021-07-28Paper
PIR Array Codes With Optimal Virtual Server Rate
IEEE Transactions on Information Theory
2020-01-28Paper
PIR Schemes With Small Download Complexity and Low Storage Requirements
IEEE Transactions on Information Theory
2020-01-28Paper
Inglenook shunting puzzles
The Electronic Journal of Combinatorics
2019-04-30Paper
Finite-Field Matrix Channels for Network Coding
IEEE Transactions on Information Theory
2019-03-28Paper
Practical attacks against the walnut digital signature scheme
 
2018-12-20Paper
The minimum Manhattan distance and minimum jump of permutations
Journal of Combinatorial Theory. Series A
2018-11-08Paper
Counting additive decompositions of quadratic residues in finite fields
Functiones et Approximatio. Commentarii Mathematici
2018-04-20Paper
Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes
IEEE Transactions on Information Theory
2017-07-27Paper
Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks
IEEE Transactions on Information Theory
2017-07-27Paper
The Asymptotic Behavior of Grassmannian Codes
IEEE Transactions on Information Theory
2017-06-08Paper
Probabilistic Existence Results for Separable Codes
IEEE Transactions on Information Theory
2017-04-28Paper
Non-Overlapping Codes
IEEE Transactions on Information Theory
2017-04-28Paper
Maximum Likelihood Decoding for Multilevel Channels With Gain and Offset Mismatch
IEEE Transactions on Information Theory
2017-04-28Paper
Pearson Codes
IEEE Transactions on Information Theory
2017-04-28Paper
A practical cryptanalysis of the Algebraic Eraser
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Triangulations of the sphere, bitrades and abelian groups
Combinatorica
2015-01-07Paper
The discrete logarithm problem for exponents of bounded height
LMS Journal of Computation and Mathematics
2014-09-05Paper
Efficient Multiplicative Sharing Schemes
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Enumerating finite racks, quandles and kei
The Electronic Journal of Combinatorics
2014-08-14Paper
Constructing \(k\)-radius sequences
Mathematics of Computation
2013-07-17Paper
The probability that a pair of elements of a finite group are conjugate.
Journal of the London Mathematical Society
2012-12-06Paper
On the distribution of the subset sum pseudorandom number generator on elliptic curves
Uniform Distribution Theory
2012-06-20Paper
On the complexity of the herding attack and some related attacks on hash functions
Designs, Codes and Cryptography
2012-05-22Paper
Group theory in cryptography
 
2011-11-22Paper
Cryptanalysis of three matrix-based key establishment protocols
Journal of Mathematical Cryptology
2011-11-15Paper
The existence of \(k\)-radius sequences
Journal of Combinatorial Theory. Series A
2011-11-11Paper
Putting dots in triangles
 
2011-08-24Paper
Honeycomb arrays
The Electronic Journal of Combinatorics
2010-12-16Paper
The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem
Journal of Mathematical Cryptology
2010-11-12Paper
Traceability codes
Journal of Combinatorial Theory. Series A
2010-09-27Paper
Cryptanalysis of the \(MST_{3}\) public key cryptosystem
Journal of Mathematical Cryptology
2010-05-06Paper
Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem
Journal of Mathematical Cryptology
2010-02-05Paper
Connectivity of the uniform random intersection graph
Discrete Mathematics
2009-12-15Paper
Prolific Codes with the Identifiable Parent Property
SIAM Journal on Discrete Mathematics
2009-11-27Paper
A mathematical walk in Surrey
BSHM Bulletin: Journal of the British Society for the History of Mathematics
2009-03-10Paper
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
Lecture Notes in Computer Science
2009-01-09Paper
Key Refreshing in Wireless Sensor Networks
Lecture Notes in Computer Science
2009-01-09Paper
Two-dimensional runlength constrained arrays with equal horizontal and vertical constraints
IEEE Transactions on Information Theory
2008-12-21Paper
A bound on the size of separating hash families
Journal of Combinatorial Theory. Series A
2008-12-08Paper
scientific article; zbMATH DE number 5272192 (Why is no real title available?)
 
2008-05-07Paper
On the average energy of circulant graphs
Linear Algebra and its Applications
2008-03-26Paper
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
Journal of Mathematical Cryptology
2008-02-21Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
Reconstructing noisy polynomial evaluation in residue rings
Journal of Algorithms
2007-01-09Paper
A comment on "A new public-key cipher system based upon the Diophantine equations"
IEEE Transactions on Computers
2007-01-09Paper
Sets of permutations that generate the symmetric group pairwise.
Journal of Combinatorial Theory. Series A
2006-12-07Paper
Character sums and nonlinear recurrence sequences
Discrete Mathematics
2006-08-04Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Predicting nonlinear pseudorandom number generators
Mathematics of Computation
2005-04-27Paper
Frameproof Codes
SIAM Journal on Discrete Mathematics
2004-01-08Paper
scientific article; zbMATH DE number 1996248 (Why is no real title available?)
 
2003-10-22Paper
Products of subsets in an Abelian group
Journal of Combinatorial Theory. Series A
2003-07-30Paper
An upper bound on the size of a code with the \(k\)-identifiable parent property
Journal of Combinatorial Theory. Series A
2003-05-27Paper
scientific article; zbMATH DE number 1643924 (Why is no real title available?)
 
2002-12-01Paper
scientific article; zbMATH DE number 1424181 (Why is no real title available?)
 
2002-03-18Paper
Perfect hash families: Probabilistic methods and explicit constructions
Journal of Combinatorial Theory. Series A
2000-11-14Paper
scientific article; zbMATH DE number 1504539 (Why is no real title available?)
 
2000-09-12Paper
The linear complexity of the self-shrinking generator
IEEE Transactions on Information Theory
2000-09-07Paper
scientific article; zbMATH DE number 1455083 (Why is no real title available?)
 
2000-06-05Paper
scientific article; zbMATH DE number 1394312 (Why is no real title available?)
 
2000-02-01Paper
Groups of prime power order with derived subgroup of prime order
Journal of Algebra
1999-11-14Paper
Orthogonal sequences of polynomials over arbitrary fields
Journal of Number Theory
1999-07-07Paper
scientific article; zbMATH DE number 1284201 (Why is no real title available?)
 
1999-06-13Paper
Optimal linear perfect hash families
Journal of Combinatorial Theory. Series A
1998-10-18Paper
scientific article; zbMATH DE number 1008447 (Why is no real title available?)
 
1998-06-07Paper
A generalized rational interpolation problem and the solution of the Welch-Berlekamp key equation
Designs, Codes and Cryptography
1998-05-18Paper
Fast rational interpolation, Reed-Solomon decoding, and the linear complexity profiles of sequences
IEEE Transactions on Information Theory
1998-02-23Paper
Permutation polynomials, de Bruijn sequences, and linear complexity
Journal of Combinatorial Theory. Series A
1997-10-01Paper
A note on sequences with the shift and add property
Designs, Codes and Cryptography
1997-08-17Paper
scientific article; zbMATH DE number 1047548 (Why is no real title available?)
 
1997-08-17Paper
Node bisectors of Cayley graphs
Mathematical Systems Theory
1996-12-01Paper
Some remarks on an algorithm of Fitzpatrick
IEEE Transactions on Information Theory
1996-07-28Paper
The cryptanalysis of a public-key implementation of finite group mappings
Journal of Cryptology
1995-09-26Paper
A generalisation of the discrete Fourier transform: determining the minimal polynomial of a periodic sequence
IEEE Transactions on Information Theory
1995-03-01Paper
Enumeration within Isoclinism Classes of Groups of Prime Power Order
Journal of the London Mathematical Society
1994-12-18Paper
Increasing the rate of output of \(m\)-sequences
Information Processing Letters
1994-10-19Paper
Exponent-Critical Groups
 
N/APaper


Research outcomes over time


This page was built for person: Simon R. Blackburn