Jennifer Seberry
Jennifer Seberry
Professor, Centre for Computer and Information Security Research, University of Wollongong
Verified email at - Homepage
TitleCited byYear
Algorithms and theory of computation handbook
MJ Atallah
CRC press, 1998
Orthogonal designs, quadraic forms and Hadamard matrices
AV Geramita
Lecture Notes in Pure and Applied Math. 45, 1979
Hadamard matrices, sequences, and block designs
J Seberry, M Yamada
Contemporary design theory: a collection of surveys, 431-560, 1992
Fundamentals of computer security
J Pieprzyk, T Hardjono, J Seberry
Springer Science & Business Media, 2013
HAVAL—a one-way hashing algorithm with variable length of output
Y Zheng, J Pieprzyk, J Seberry
International workshop on the theory and application of cryptographic …, 1992
Cryptography: an introduction to computer security
J Seberry
Prentice-Hall, Inc., 1988
LOKI—a cryptographic primitive for authentication and secrecy applications
L Brown, J Pieprzyk, J Seberry
International Conference on Cryptology, 229-236, 1990
On constructions and nonlinearity of correlation immune functions
J Seberry, XM Zhang, Y Zheng
Workshop on the Theory and Application of of Cryptographic Techniques, 181-199, 1993
Nonlinearity and propagation characteristics of balanced boolean functions
J Seberry, XM Zhang, YL Zheng
Information and Computation 119 (1), 1-13, 1995
Nonlinearly balanced Boolean functions and their propagation characteristics
J Seberry, XM Zhang, Y Zheng
Annual International Cryptology Conference, 49-60, 1993
Orthogonal desingns
AV Geramita, JM Geramita, JS Wallis
Linear and Multilinear Algebra 3 (4), 281-306, 1976
Improving resistance to differential cryptanalysis and the redesign of LOKI
L Brown, M Kwan, J Pieprzyk, J Seberry
International Conference on the Theory and Application of Cryptology, 36-50, 1991
Hadamard matrices
JS Wallis
Combinatorics: Room squares, Sum-free sets, Hadamard matrices, 274-489, 1972
Identity-based proxy signature from pairings
W Wu, Y Mu, W Susilo, J Seberry, X Huang
International Conference on Autonomic and Trusted Computing, 22-31, 2007
Immunizing public key cryptosystems against chosen ciphertext attacks
Y Zheng, J Seberry
IEEE journal on selected areas in communications 11 (5), 715-724, 1993
Systematic generation of cryptographically robust S-boxes
J Seberry, XM Zhang, Y Zheng
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
The theory of quaternion orthogonal designs
J Seberry, K Finlayson, SS Adams, TA Wysocki, T Xia, BJ Wysocki
IEEE Transactions on Signal Processing 56 (1), 256-265, 2007
On some applications of Hadamard matrices
J Seberry, B JWysocki, T AWysocki
Metrika 62 (2-3), 221-239, 2005
Secret sharing schemes arising from Latin squares
J Cooper, D Donovan, J Seberry
Relationships among nonlinearity criteria
J Seberry, XM Zhang, Y Zheng
Workshop on the Theory and Application of of Cryptographic Techniques, 376-388, 1994
The system can't perform the operation now. Try again later.
Articles 1–20