Jennifer Seberry
Jennifer Seberry
Professor, Centre for Computer and Information Security Research, University of Wollongong
Verified email at uow.edu.au - Homepage
TitleCited byYear
Algorithms and theory of computation handbook
MJ Atallah
CRC press, 1998
803*1998
Orthogonal designs, quadraic forms and Hadamard matrices
AV Geramita
Lecture Notes in Pure and Applied Math. 45, 1979
782*1979
Hadamard matrices, sequences, and block designs
J Seberry, M Yamada
Contemporary design theory: a collection of surveys, 431-560, 1992
4261992
Fundamentals of computer security
J Pieprzyk, T Hardjono, J Seberry
Springer Science & Business Media, 2013
3662013
HAVAL—a one-way hashing algorithm with variable length of output
Y Zheng, J Pieprzyk, J Seberry
International workshop on the theory and application of cryptographic …, 1992
3131992
Cryptography: an introduction to computer security
J Seberry
Prentice-Hall, Inc., 1988
3091988
LOKI—a cryptographic primitive for authentication and secrecy applications
L Brown, J Pieprzyk, J Seberry
International Conference on Cryptology, 229-236, 1990
1851990
On constructions and nonlinearity of correlation immune functions
J Seberry, XM Zhang, Y Zheng
Workshop on the Theory and Application of of Cryptographic Techniques, 181-199, 1993
1601993
Nonlinearity and propagation characteristics of balanced boolean functions
J Seberry, XM Zhang, YL Zheng
Information and Computation 119 (1), 1-13, 1995
1341995
Nonlinearly balanced Boolean functions and their propagation characteristics
J Seberry, XM Zhang, Y Zheng
Annual International Cryptology Conference, 49-60, 1993
1321993
Orthogonal desingns
AV Geramita, JM Geramita, JS Wallis
Linear and Multilinear Algebra 3 (4), 281-306, 1976
1231976
Improving resistance to differential cryptanalysis and the redesign of LOKI
L Brown, M Kwan, J Pieprzyk, J Seberry
International Conference on the Theory and Application of Cryptology, 36-50, 1991
1211991
Hadamard matrices
JS Wallis
Combinatorics: Room squares, Sum-free sets, Hadamard matrices, 274-489, 1972
1021972
Identity-based proxy signature from pairings
W Wu, Y Mu, W Susilo, J Seberry, X Huang
International Conference on Autonomic and Trusted Computing, 22-31, 2007
932007
Immunizing public key cryptosystems against chosen ciphertext attacks
Y Zheng, J Seberry
IEEE journal on selected areas in communications 11 (5), 715-724, 1993
891993
Systematic generation of cryptographically robust S-boxes
J Seberry, XM Zhang, Y Zheng
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
871993
The theory of quaternion orthogonal designs
J Seberry, K Finlayson, SS Adams, TA Wysocki, T Xia, BJ Wysocki
IEEE Transactions on Signal Processing 56 (1), 256-265, 2007
792007
On some applications of Hadamard matrices
J Seberry, B JWysocki, T AWysocki
Metrika 62 (2-3), 221-239, 2005
782005
Secret sharing schemes arising from Latin squares
J Cooper, D Donovan, J Seberry
751994
Relationships among nonlinearity criteria
J Seberry, XM Zhang, Y Zheng
Workshop on the Theory and Application of of Cryptographic Techniques, 376-388, 1994
671994
The system can't perform the operation now. Try again later.
Articles 1–20