Jennifer Seberry
#25,570
Most Influential Person Now
Australian cryptographer
Jennifer Seberry's AcademicInfluence.com Rankings
Jennifer Seberrymathematics Degrees
Mathematics
#3129
World Rank
#4680
Historical Rank
Measure Theory
#1161
World Rank
#1481
Historical Rank
Download Badge
Computer Science Mathematics
Why Is Jennifer Seberry Influential?
(Suggest an Edit or Addition)According to Wikipedia, Jennifer Roma Seberry is an Australian cryptographer, mathematician, and computer scientist, currently a professor at the University of Wollongong, Australia. She was formerly the head of the Department of Computer Science and director of the Centre for Computer Security Research at the university.
Jennifer Seberry's Published Works
Published Works
- Orthogonal Designs: Quadratic Forms and Hadamard Matrices (1979) (490)
- Hadamard matrices, Sequences, and Block Designs (1992) (307)
- Fundamentals of Computer Security (2003) (274)
- Public Key Cryptography (2000) (245)
- HAVAL - A One-Way Hashing Algorithm with Variable Length of Output (1992) (219)
- Cryptography - an introduction to computer security (1991) (182)
- Advances in Cryptology — AUSCRYPT '92 (1992) (163)
- LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications (1990) (132)
- Nonlinearity and Propagation Characteristics of Balanced Boolean Functions (1995) (99)
- Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract) (1993) (94)
- Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI (1991) (92)
- On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract) (1994) (89)
- D-optimal designs (2011) (79)
- Identity-Based Proxy Signature from Pairings (2007) (77)
- On some applications of Hadamard matrices (2005) (77)
- The Theory of Quaternion Orthogonal Designs (2008) (77)
- Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks (1993) (77)
- Secret sharing schemes arising from latin squares (1994) (68)
- Complex Hadamard matrices (1973) (68)
- Systematic generation of cryptographically robust S-boxes (1993) (66)
- Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays (2005) (63)
- Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext (2015) (63)
- Application of the discrete Fourier transform to the search for generalised Legendre pairs and Hadamard matrices (2001) (60)
- On the Existence of Hadamard Matrices (1976) (59)
- Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract) (1992) (58)
- New weighing matrices and orthogonal designs constructed using two sequences with zero autocorrelation function – a review (1999) (54)
- Identification of Bad Signatures in Batches (2000) (52)
- Latin squares and critical sets of minimal size (1991) (50)
- Hadamard matrices, orthogonal designs and construction algorithms (2003) (48)
- Relationships among nonlinearity criteria (1994) (47)
- A construction for generalized hadamard matrices (1980) (46)
- Weighing matrices and their applications (1997) (44)
- Advances in Cryptology — AUSCRYPT '90 (1990) (43)
- Orthogonal designs (2014) (41)
- Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion (1992) (41)
- Circulant weighing matrices (2010) (40)
- Supplementary difference sets and optimal designs (1991) (39)
- Some classes of Hadamard matrices with constant diagonal (1972) (38)
- Some remarks on supplementary difference sets (1973) (37)
- Regular group divisible designs and Bhaskar Rao designs with block size three (1984) (37)
- Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) (1998) (35)
- New Hadamard matrices and conference matrices obtained via Mathon's construction (1988) (35)
- A review and new symmetric conference matrices (2014) (35)
- Reusing Shares in Secret Sharing Schemes (1994) (34)
- Hadamard ideals and Hadamard matrices with two circulant cores (2006) (34)
- Orthogonal Designs: Hadamard Matrices, Quadratic Forms and Algebras (2017) (34)
- All Directed BIBDs with k = 3 Exist (1980) (33)
- All DBIBDs with block size four exist (1980) (33)
- The Strong Kronecker Product (1994) (31)
- Key Scheduling In Des Type Cryptosystems (1990) (31)
- Homogeneous bent functions of degree n in 2n variables do not exist for nge3 (2004) (31)
- New Solutions to the Problem of Access Control in a Hierarchy (1993) (30)
- Generalized Bhaskar Rao designs (1984) (30)
- Construction of Williamson type matrices (1975) (30)
- On the Design of Permutation P in DES Type Cryptosystems (1990) (28)
- Homogeneous bent functions (2000) (28)
- On the products of Hadamard matrices, Williamson matrices and other orthogonal matrices using M-structures (1990) (27)
- Construction of bent functions from two known bent functions (1994) (27)
- Orthogonal (0,1,-1) matrices (1972) (27)
- On inequivalent weighing matrices (1986) (27)
- Relative Compromise of Statistical Databases (1990) (27)
- Some remarks on generalised Hadamard matrices and theorems of Rajkundlia on SBIBDs (1979) (27)
- Latin squares: critical sets and their lower bounds (1995) (26)
- On sequences with zero autocorrelation (1994) (26)
- Modeling dual polarization wireless fading channels using quaternions (2006) (25)
- Error-correcting codes for authentication and subliminal channels (1991) (25)
- A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Wireless Channels (2005) (24)
- Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations (2011) (24)
- Generalized Bhaskar Rao designs of block size three (1985) (24)
- An algorithm to find formulae and values of minors for Hadamard matrices: II (2001) (24)
- Improving the Strict Avalanche Characteristics of Cryptographic Functions (1994) (24)
- Orthogonal designs III: Weighing matrices (1974) (24)
- On the Symmetric Property of Homogeneous Boolean Functions (1999) (24)
- Product of Four Hadamard Matrices (1992) (23)
- Multiplication of sequences with zero autocorrelation (1994) (23)
- Higher dimensional orthogonal designs and applications (1981) (23)
- An experimental search and new combinatorial designs via a generalisation of cyclotomy (1998) (22)
- Bhaskar Rao designs over small groups (1988) (22)
- A New and Efficient Fail-stop Signature Scheme (2000) (21)
- A remark on the excess of Hadamard matrices and orthogonal designs (1978) (21)
- Secret Sharing Schemes Based on Room Squares (1996) (21)
- A survey of base sequences, disjoint complementary sequences and OD(4t; t, t, t, t) (1989) (21)
- Families of weighing matrices (1974) (20)
- Perfect Secret Sharing Schemes from Room Squares (1998) (20)
- Novel Constructions of Improved Square Complex Orthogonal Designs for Eight Transmit Antennas (2009) (20)
- Encryption methods based on combinatorial designs (1986) (20)
- A construction technique for generalized complex orthogonal designs and applications to wireless communications (2005) (20)
- Combinatorial Structures for Design of Wireless Sensor Networks (2006) (20)
- On the Security of NOEKEON against Side Channel Cube Attacks (2010) (20)
- A skew-Hadamard matrix of order 92 (1971) (20)
- A multistage protocol for aggregated queries in distributed cloud databases with privacy protection (2019) (19)
- Bounds on the maximum determinant for (1,-1) matrices (2000) (19)
- Two complex orthogonal space-time codes for eight transmit antennas (2004) (18)
- Weighing Matrices and String Sorting (2009) (18)
- On supplementary difference sets (1972) (18)
- On Bhaskar Rao designs of block size four (1984) (18)
- The Maximal Determinant and Subdeterminants of ±1 Matrices (2003) (18)
- Circulant weighing designs (1996) (18)
- On A Use Of Golay Sequences For Asynchronous DS CDMA Applications (2002) (18)
- Orthogonal Designs IV: Existence Questions (1975) (18)
- Some families of partially balanced incomplete block designs (1982) (17)
- On G-matrices (1993) (17)
- Security Analysis of Michael: The IEEE 802.11i Message Integrity Code (2005) (17)
- Shared cryptographic bits via quantized quadrature phase amplitudes of light (1996) (17)
- Addendum to further results on base sequences, disjoint complementary sequences, OD(4t; t, t, t, t) and the excess of Hadamard matrices (1991) (17)
- Hadamard ideals and Hadamard matrices with circulant core (2003) (17)
- Information security issues in mobile computing (1995) (16)
- Cyclotomy, Hadamard arrays and supplementary difference sets (1972) (16)
- Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks (2009) (16)
- Some matrices of Williamson type (1973) (16)
- Pitfalls in Designing Substitution Boxes (Extended Abstract) (1994) (15)
- A cubic RSA code equivalent to factorization (1992) (15)
- Applications of Hadamard matrices (2003) (15)
- A note on orthogonal Graeco-Latin designs (1979) (14)
- Generalized Bhaskar Rao Designs with Block Size 3 over Finite Abelian Groups (2007) (14)
- Remarks on extremal and maximum determinant matrices with moduli of real entries ≤ 1 (2014) (14)
- A Cryptographic Solution for General Access Control (2005) (14)
- Maximal ternary codes and Plotkin's bound (1984) (14)
- Optimal designs, supplementary difference sets and multipliers (1997) (14)
- Growth in Gaussian elimination for weighing matrices W(n,n-1) (2000) (14)
- SBIBD(4k2, 2k2 +k,k2 +k) and Hadamard matrices of order 4k2 with maximal excess are equivalent (1989) (14)
- New skew-Hadamard matrices of order 4cdot59 and new D-optimal designs of order 2cdot59 (2004) (14)
- On ternary complementary pairs (2001) (13)
- How to prevent cheating in Pinch's scheme (1997) (13)
- The Analysis of Zheng-Seberry Scheme (2002) (13)
- Regular Hadamard Matrices, Maximum Excess and SBIBD (2003) (13)
- A generalized algorithm for the generation of correlated Rayleigh fading envelopes in radio channels (2005) (12)
- Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract) (1994) (12)
- Generalized Bhaskar Rao Designs with Block Size 4 Signed over Elementary Abelian Groups (2003) (12)
- Group divisible designs, GBRDSDS and generalized weighing matrices (1998) (12)
- Orthogonal designs V: Orders divisible by eight (1976) (12)
- On orthogonal matrices with constant diagonal (1982) (12)
- On the Internal Structure of Alpha-MAC (2006) (12)
- Efficient Semi-static Secure Broadcast Encryption Scheme (2013) (12)
- A Simple Orthogonal Space-Time-Polarization Block Code (2007) (12)
- Two new complex orthogonal space time codes for 8 transmit antennas (2003) (12)
- Strongbox secured secret sharing schemes (2000) (11)
- The excess of complex Hadamard matrices (1993) (11)
- Codes Identifying Bad Signature in Batches (2000) (11)
- On the (v,5,λ)-Family of Bhaskar Rao Designs (2002) (11)
- A Search for Hadamard Matrices constructed from Williamson Matrices (2002) (11)
- Ordered Partitions and Codes Generated by Circulant Matrices (1979) (11)
- The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions (1995) (11)
- Existence of SBIBD(4k2, 2k2±k, k2±k) and Hadamard matrices with maximal excess (1991) (11)
- Two infinite families of symmetric hadamard matrices (2017) (11)
- A new construction for Williamson-type matrices (1986) (11)
- Generalized Williamson and Wallis-Whiteman constructions for improved square order-8 CO STBCs (2005) (10)
- Williamson-Hadamard spreading sequences for DS-CDMA applications (2003) (10)
- Amicable orthogonal designs of order 8 for complex space-time block codes (2006) (10)
- A note on amicable Hadamard matrices (1973) (10)
- A note on supplementary difference sets (1974) (10)
- New Complex Orthogonal Space-Time Block Codes of Order Eight (2005) (10)
- On sufficient conditions for some orthogonal designs and sequences with zero autocorrelation function (1996) (10)
- Some orthogonal designs and complex Hadamard matrices by using two Hadamard matrices (1991) (10)
- The skew - weighing matrix conjecture (1982) (9)
- On skew Hadamard matrices (1978) (9)
- Fault Analysis of the KATAN Family of Block Ciphers (2012) (9)
- An infinite family of Goethals-Seidel arrays (2005) (9)
- Further Observations on the Structure of the AES Algorithm (2003) (9)
- On weighing matrices (1993) (9)
- Necessary and sufficient conditions for some two variable orthogonal designs in order 36 (1996) (9)
- Some orthogonal matrices constructed by strong Kronecker multiplication (1993) (8)
- Efficient Trapdoor-Based Client Puzzle Against DoS Attacks (2010) (8)
- Higher dimensional orthogonal designs and hadamard matrices (1980) (8)
- A New Method for Constructing Williamson Matrices (2005) (8)
- Database authentication revisited (1994) (8)
- Generalised Cycling Attacks on RSA and Strong RSA Primes (1999) (8)
- On F-squares and their critical sets (1999) (8)
- On the existence of Turyn sequences of length less than 43 (1994) (8)
- On circulant best matrices and their applications (2001) (8)
- New orthogonal designs and sequences with two and three variables in order 28 (1999) (8)
- On the Smith normal form of D-optimal designs (1996) (8)
- Minimal Critical Set of a Room Square of order 7 (1997) (8)
- A multilevel encryption scheme for database security (1989) (8)
- On the growth problem for skew and symmetric conference matrices (2005) (8)
- Public-Key Cryptosystems (2003) (8)
- On the weighing matrices of order 4n and weight 4n-2 and 2n-1 (1995) (8)
- Some Results on Configurations (1971) (8)
- Further results on strongbox secured secret sharing schemes (2004) (8)
- On New Families of Supplementary Difference Sets over Rings with Short Orbits (1998) (8)
- Constructions of balanced ternary designs based on generalized Bhaskar Rao designs (1993) (7)
- On small defining sets for some SBIBD(4t-1, 2t-1, t-1) (1992) (7)
- Some results on the excesses of Hadamard matrices (1988) (7)
- Authentication without secrecy (1986) (7)
- New D-optimal designs of order 110 (2001) (7)
- Orthogonal Designs with Quaternion Elements (2005) (7)
- Regular Hadamard matrix, maximum excess and SBIBD (2003) (7)
- Multiplications of ternary complementary pairs (1996) (7)
- On circulant and two-circulant weighing matrices (2010) (7)
- Williamson matrices of even order (1974) (7)
- New constructing of regular Hadamard matrices (2006) (7)
- Generalized Hadamard matrices and colourable designs in the construction of regular GDDs with two and three association classes (1986) (7)
- Quaternion orthogonal designs from complex companion designs (2008) (7)
- Highly nonlinear balanced Boolean functions satisfying high degree propagation criterion (1993) (6)
- Computer Viruses An Introduction (1997) (6)
- The Propus Construction for Symmetric Hadamard Matrices (2015) (6)
- Comments on 'Generating and counting binary Bent sequences' (1994) (6)
- A note on BIBDS (1973) (6)
- Key Establishment Protocols (2003) (6)
- Orthogonal Designs in powers of two (1977) (6)
- A class of group divisible designs (1978) (6)
- Cryptographic Boolean functions via group Hadamard matrices (1994) (6)
- Strongboxes for electronic commerce (1996) (6)
- Construction of cubic homogeneous boolean bent functions (2000) (6)
- The directed packing numbersDD(t, v, v), t≧4 (1984) (6)
- Hadamard matrices of order =8 (mod 16) with maximal excess (1991) (6)
- Complex Orthogonal Spreading Sequences using Mutually Orthogonal Complementary Sets (2006) (6)
- On amicable orthogonal designs of order 8 (2006) (6)
- On the distribution of the permanent of cyclic (0,1) matrices (1979) (6)
- A new method for constructing T-matrices (2005) (6)
- Applications of smartcards for anonymous and verifiable databases (1995) (6)
- Covert Distributed Computing Using Java Through Web Spoofing (1998) (6)
- Back circulant Latin squares and the influence of a set (1999) (5)
- Observations on the Message Integrity Code in IEEE802.11Wireless LANs (2004) (5)
- On the Complete Pivoting Conjecture for Hadamard Matrices of Small Orders (2001) (5)
- Access Policy Sheet for Access Control in Fine-Grained XML (2005) (5)
- Application of nega-cyclic matrices to generate spreading sequences (2003) (5)
- Generalised Bhaskar Rao designs of block size 3 over the group Z4 (1985) (5)
- On the pivot structure for the weighing matrix W(12,11) (2007) (5)
- ICT professionals’ perceptions of responsibility for breaches of computer security (2006) (5)
- A class of codes generated by circulant weighing matrices (1978) (5)
- Jacket matrices constructed from Hadamard matrices and generalized Hadamard matrices (2006) (5)
- A note on using sequences to construct orthogonal designs (1976) (5)
- Practical Proven Secure Authentication with Arbitration (1992) (5)
- On orthogonal designs in order 48 (2005) (5)
- Constructing Hadamard matrices from orthogonal designs (1992) (5)
- Some remarks on Hadamard matrices (2010) (5)
- Golay Sequences for DS CDMA Applications (2002) (5)
- New weighing matrices of order 2n and weight 2n-9 (2010) (5)
- Beacon Based Authentication (1994) (5)
- Complex orthogonal sequences from amicable Hadamard matrices (2004) (5)
- Some Remarks on Authentication Systems (1990) (4)
- Some new weighing matrices using sequences with zero autocorrelation function (1993) (4)
- Necessary and sufficient conditions for three and four variable orthogonal designs in order 36 (2002) (4)
- Generalized orthogonal designs (2004) (4)
- Two-level Cretan matrices constructed using SBIBD (2015) (4)
- Proceedings of the 7th Australian Conference on Information Security and Privacy (2002) (4)
- Experience of using a type signature password system for user authentication in a heavily used computing environment (1989) (4)
- Delegatable Access Control for Fine-Grained XML (2005) (4)
- A note on orthogonal designs (1987) (4)
- Repeated Differential Properties of the AES-128 and AES-256 Key Schedules (2011) (4)
- A few more small defining sets for SBIBD(4t-1, 2t-1, t-1) (1994) (4)
- Authentication via Multi-Service Tickets in the Kuperee Server (1994) (4)
- Cretan(4t+1) Matrices (2015) (4)
- Minimal and Maximal Critical Sets in Room Squares (1996) (4)
- User unique identification (1989) (4)
- A computer listing of hadamard matrices (1978) (4)
- Proceedings of the Second International Workshop on Information Security (1997) (4)
- On the structure and existence of some amicable orthogonal designs (1978) (4)
- Inter-Domain Routing Validator Based Spoofing Defence System (2010) (4)
- A subliminal channel in codes for authentication without secrecy (1985) (3)
- New weighing matrices constructed from two circulant submatrices (2012) (3)
- Replicating the Kuperee authentication server for increased security and reliability (1996) (3)
- Generalised Bhaskar Rao designs with elements from cyclic groups of even order (1991) (3)
- Using cyclotomy to construct orthogonal designs (1976) (3)
- On the Smith normal form of weighing matrices (1997) (3)
- Recent advances in the construction of Hadamard matrices (1973) (3)
- Values of Minors of (1, −1) Incidence Matrices of SBIBDs and Their Application to the Growth Problem (2001) (3)
- Values of Minors of an Infinite Family of D-Optimal Designs and Their Application to the Growth Problem: II (2002) (3)
- Resolvable designs applicable to cryptographic authentication schemes (1992) (3)
- Structures of Highly Nonlinear Cryptographic Functions (1994) (3)
- Some new results of regular Hadamard matrices and SBIBD II (2007) (3)
- Multiple-Input Multiple-Output Systems with Space-Time Codes (2006) (3)
- Short Amicable Sets (2002) (3)
- TWO LEVEL CRETAN MATRICES CONSTRUCTED VIA SINGER DIFFERENCE SETS (2014) (3)
- On Hadamard Matrices (2020) (3)
- Amicable Hadamard matrices and amicable orthogonal designs (1991) (3)
- A Five-Round Algebraic Property of the Advanced Encryption Standard (2008) (3)
- Information security and privacy : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings (2003) (3)
- On Full Orthogonal Designs in Order 56 (2002) (3)
- Kuperee: An Approach to Authentication using Public Keys (1994) (3)
- Relationships Among Nonlinear Criteria (Extended Abstract) (1994) (3)
- An eigenvalue approach evaluating minors for weighing matrices W(n,n − 1) (2012) (3)
- Hadamard matrices, orthogonal designs and clifford-gastineau-hills algebras (2018) (3)
- Pitfalls in Designing Substitution (1994) (3)
- A survey of orthogonal designs (1974) (3)
- Pseudo-random sequence generators using structured noise (1991) (2)
- Pitfalls in designing substitution boxes (2020) (2)
- New classes of orthogonal designs constructed from complementary sequences with given spread (2010) (2)
- Coloured designs, new group divisible designs and pairwise balanced designs (1986) (2)
- Some remarks on the permanents of circulant (0,1) matrices (1982) (2)
- A generalised testbed for analysing block and stream ciphers (1991) (2)
- Equitability in Retroactive Data Confiscation versus Proactive Key Escrow (2001) (2)
- Semi Williamson type matrices and the W(2n, n) conjecture (1992) (2)
- Gastineau-Hills Schemes: Product Designs and Repeat Designs (2017) (2)
- Some asymptotic results for orthogonal designs: II (1976) (2)
- Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller (2018) (2)
- Constructions for Orthogonal Designs via Plug in and Plug into Matrices (2017) (2)
- Consistent Differential Patterns of Rijndael (2002) (2)
- Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings (1993) (2)
- Systematic Generation of Cryptographically Robust S-boxes ( Extended Abstract ) * (2017) (2)
- Vizualizing Hadamard Matrices : the Propus Construction (2014) (2)
- Necessary and sufficient conditions for two variable orthogonal designs in order 44: Addendum (2000) (2)
- Construction of amicable orthogonal designs of quaternions (2009) (2)
- A note on asymptotic existence results for orthogonal designs (1977) (2)
- Circles on lattices and Hadamard matrices (2019) (2)
- Encryption Exponent 3 and the Security of RSA (1986) (2)
- A new generic digital signature algorithm (2011) (2)
- When the necessary conditions are not sufficient: sequences with zero autocorrelation function (1999) (2)
- A five-round algebraic property of AES and its application to the ALPHA-MAC (2009) (2)
- New results with near- Yang sequences (1994) (2)
- Three-level Cretan matrices constructed via conference matrices (2015) (2)
- Some infinite classes of Hadamard matrices (1980) (2)
- Complex weighing matrices and orthogonal designs (1980) (2)
- Orthogonal Designs of Kharaghani Type: II (2004) (2)
- On weighing matrices with square weights (1988) (2)
- The cryptographic significance of the knapsack problem (1988) (2)
- Crypto Topics and Applications II (1999) (2)
- A New Family of Amicable Hadamard Matrices (2013) (2)
- Performance comparison of sequences designed from the Hall Difference Set and Orthogonal Gold Sequences of Length 32 (2005) (2)
- A new algorithm for computer searches for orthogonal designs (2001) (2)
- World's toughest encryption scheme is 'vulnerable' ...so what about you? (2011) (2)
- Some remarks on amicable orthogonal designs (1980) (2)
- The effect of imperfect carrier recovery on the performance of the diversity antenna selection technique in wireless channels utilizing DSTM (2004) (2)
- A Life's Work on Hadamard Matrices, Statistical Designs, Bent Functions and Their Application to Computer and Information Security in Networks and Telecommunications (2007) (2)
- Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology (1992) (2)
- Bose's Method of Differences Applied to Construct Bhaskar Rao Designs (1998) (2)
- Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2) (2003) (2)
- Hadamard matrices constructed by circulant and negacyclic matrices (2006) (2)
- Search Key Substitution in the Encipherment of B-Trees (1990) (2)
- Regular sets of matrices and applications (1993) (2)
- On Good Matrices and Skew Hadamard Matrices (2015) (2)
- Beacons for Authentication in Distributed Systems (1996) (2)
- The power and influence in some Youden squares and secret sharing (2007) (1)
- Design and security issues in strongbox systems for the internet (1996) (1)
- Generation of a frequency square orthogonal to a 10×10 latin square (1978) (1)
- Using digital tickets to protect personal privacy (2005) (1)
- Reduction of angular momentum expressions by matrix arithmetic (1976) (1)
- A Generalized Policy Support System and Its Hierarchy Semantics (2004) (1)
- On 4-NPAF(1,2w) sequences (1997) (1)
- Information Security in Mobile Databases (1995) (1)
- On Generalized Hadamard Matrices and Difference Matrices: $Z_6$ (2015) (1)
- Companion Viruses and the Macintosh: Threats and Countermeasures (1999) (1)
- Vanstone's construction applied to Bhaskar Rao designs (1987) (1)
- Combinatorial Constructions of 3- and 4-Secure Codes (2003) (1)
- Space-Time-Polarization Block Codes from Quaternionic Orthogonal Designs (2007) (1)
- Equivalence of the Existence of Hadamard Matrices and Cretan$(4t-1,2)$-Mersenne Matrices (2015) (1)
- On Constructions and Nonlinearity of Correlation Immune Functions (cid:0) (2009) (1)
- TWO-VARIABLE ORTHOGONAL MATRICES FROM SBIBD (2015) (1)
- Weighing Matrices and Self-Orthogonal Quaternary Codes (2003) (1)
- New weighing matrices (1996) (1)
- Some results on self-orthogonal and self-dual codes (2003) (1)
- Efficient authentication and integrity protection for the border gateway protocol (2014) (1)
- Combinatorial Mathematics: Proceedings of the International Conference on Combinatorial Theory, Canberra, August 16-27, 1977 (1978) (1)
- Orthogonal designs from negacyclic matrices (2004) (1)
- Transmitter diversity antenna selection techniques for wireless channels utilizing differential space-time block codes (2006) (1)
- On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?) (2003) (1)
- An Infinite Family of Hadamard Matrices with Fourth Last Pivot n /2 (2002) (1)
- Information Security and Privacy (2002) (1)
- SBIBD ( 4 k 2 , 2 k 2 + k , k 2 + k ) and Hadamard matrices of order 4 k 2 with maximal excess are equivalent (2020) (1)
- Some necessary and sufficient conditions for two variable orthogonal designs in order 44 (1998) (1)
- Construction of amicable orthogonal designs (1975) (1)
- Differential Fault Analysis of LEX (2010) (1)
- An algorithm for orthogonal designs (1975) (1)
- Critical sets in orthogonal arrays with 7 and 9 levels (2005) (1)
- Electronic Funds Transfer Point of Sale in Australia (1986) (1)
- Role-based Privacy Control for Health Information Systems (2003) (1)
- On multi-modulation schemes to increase the rate of space-time block codes (2004) (1)
- Selected Papers in Combinatorics: A Volume Dedicated to R.G. Stanton (1992) (1)
- A Construction for 0, 1, -1 Orthogonal Matrices Visualized (2017) (1)
- Influence of entries in critical sets of Room squares (2000) (1)
- A construction for orthogonal designs with three variables (1987) (1)
- Counting Techniques Specifying the Existence of Submatrices in Weighing Matrices (2005) (1)
- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances (2001) (1)
- Remarks on extremal and maximum determinant matrices with moduli of real entries less than or equal to 1 (2014) (1)
- The Construction of Regular Hadamard Matrices by Cyclotomic Classes (2020) (1)
- Short Amicable sets and Kharaghani type orthogonal designs (2001) (1)
- Infinite families of orthogonal designs : I (2001) (1)
- How to Recycle Shares in Secret Sharing Schemes 1 (2006) (1)
- Multi-modulation schemes to increase the rate space-time block codes in Rayleigh fading channels (2004) (1)
- The Impact of Number Theory and Computer-Aided Mathematics on Solving the Hadamard Matrix Conjecture (2013) (1)
- Critical sets for a pair of mutually orthogonal cyclic latin squares of odd order greater than 9 (2005) (1)
- A Search for Hadamard Matrices constructed from (2002) (1)
- A note on orthogonal designs in order eighty (1976) (1)
- Bounds on the Maximum Determinant for (2000) (1)
- Forensic Computing (2003) (1)
- Numerical algorithms for the computation of the Smith normal form of integral matrices (1998) (1)
- A list of balanced incomplete block designs for r < 30 (1973) (1)
- Design and Implementation of Personal Firewalls for Handheld Devices (2003) (1)
- SOME GOOD ORTHOGONAL BIPOLAR SPREADING SEQUENCES OF LENGTHS 12 AND 20 (2002) (1)
- North-Holland 49 Supplementary difference sets and optimal designs (2014) (1)
- On the multiplication theorems of Hadamard matrices of generalized quaternion type using M- structures (1993) (1)
- Circles on lattices and maximum determinant matrices (2020) (1)
- Higher-dimensional orthogonal designs and Hadamard matrices II (2014) (1)
- Some Constructions of Mutually Orthogonal Latin Squares and Superimposed Codes (2012) (1)
- Secure Computations on Handheld Devices with the Help of an Untrusted Server (2003) (1)
- Some results on Kharaghani type orthogonal designs (2003) (1)
- On the (10,5,$\lambda$)-family of Bhaskar Rao designs (1998) (1)
- Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings (2008) (1)
- On the spectrum of an F-square (2000) (1)
- Robinson’s Theorem (2017) (0)
- The Truth on TPy (2008) (0)
- Amicable Orthogonal Designs (2017) (0)
- Boolean Functions with Good Properties (2004) (0)
- New weighing matrices constructed from two circulant submatrices (2010) (0)
- A Multilevel Encryption Scheme for Database Security Abstract (2017) (0)
- On Hadamard matrices of order 2t pq:I (1987) (0)
- Electronic Elections and Digital Money (2003) (0)
- Proceedings of the 13th Australasian conference on Information Security and Privacy (2008) (0)
- Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller (2017) (0)
- Proceedings of the 4th Australasian Conference on Information Security and Privacy (1999) (0)
- Performance of Diversity Antenna Selection Techniques in Imperfect Channels (2006) (0)
- Inequivalence of Nega-cyclic ±1 Matrices (2006) (0)
- Codes Identifying Bad Signatures in Bat hesJaros (2006) (0)
- Information security and privacy : First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings (1996) (0)
- Multi-Modulation Schemes to Achieve Higher Data Rate (2006) (0)
- Strongly amicable orthogonal designs and amicable Hadamard matrices (2013) (0)
- Secure Access to Electronic Strongboxes in Electronic Commerce (1997) (0)
- Multi-modulation Schemes to Increase the Rate of Space-Time Block Codes in Rayleigh Fading C hanne 1 s (2014) (0)
- Complex Orthogonal Sequences from Amicable (2004) (0)
- Shared Cryptographic Bits Via Quantized Quadrature PhaseAmplitudes of (1996) (0)
- Construction of New Hadamard Matrices with Maximal Excess and Infinitely Many New SBIBD (4/c2, 2k 2 +k,k 2 +k) (2017) (0)
- ‘”Suggestions for presentation of a twenty-minute talk”’ (1992) (0)
- Orthogonal Designs of Kharaghani Type: I (2003) (0)
- Database Protection and Security (2003) (0)
- Anonymous and verifiable databases: towards a practical solution (1994) (0)
- Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings (1990) (0)
- On crystal sets (2012) (0)
- Cryptographic techniques (2020) (0)
- Strongboxes for Electronic Commerce ( Extended Abstract ) (2017) (0)
- Some new constructions of orthogonal designs (2013) (0)
- Integer matrices obeying generalized incidence equations (1971) (0)
- The Construction of Regular Hadamard Matrices by Cyclotomic Classes (2020) (0)
- Vanstone's construction applied to Bhaskar Rao (1987) (0)
- Existence of Hadamard Matrices and Asymptotic Existence Results for Orthogonal Designs (2017) (0)
- New normal sequences of length 25 (1995) (0)
- How to improve the SAC (1994) (0)
- An exposure property of block designs (2005) (0)
- On Ternary Complementary (2006) (0)
- Values of minors of some infinite families of matrices constructed from supplementary difference sets and their application to the growth problem (2005) (0)
- Group-Oriented Cryptography (2003) (0)
- Proceedings of the 17th Australasian conference on Information Security and Privacy (2012) (0)
- Cracking bin Laden's computer code: unlikely (2011) (0)
- On amicable sequences and orthogonal designs (2000) (0)
- Conference Matrices with Two Borders and Four Circulants (2014) (0)
- Proceedings of the international conference on cryptology on Advances in cryptology (1990) (0)
- Critical Sets in Orthogonal Arrays (2003) (0)
- Ralph Gordon Stanton (1991) (0)
- Product of four Hadamard matrices R (2017) (0)
- Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings (2012) (0)
- The amicable-Kronecker construction of quaternion orthogonal designs (2011) (0)
- Proceedings of the 8th Australasian conference on Information security and privacy (2003) (0)
- Zero-Knowledge Proof Systems (2003) (0)
- Two Novel Construction Classes for Improved, Square CO STBCs (2006) (0)
- Complex, Quaternion and Non Square Orthogonal Designs (2017) (0)
- Verifiable Databases : Towards a Practical Solution ( Extended Abstract ) (2017) (0)
- On The Complexity Structure Of Binary Sequences Of Odd Length (1991) (0)
- Evaluation of minors for weighing matrices W(n;n 1) having zeros on the diagonal (2007) (0)
- Research Online Research Online A construction for Hadamard arrays A construction for Hadamard arrays (2020) (0)
- Inner Product Vectors for Skew-Hadamard Matrices (2015) (0)
- Kerbie: Kerberos-type authentication using public-keys (1994) (0)
- Proceedings of the First Australasian Conference on Information Security and Privacy (1996) (0)
- Relationships between boolean functions and symmetric groups (2000) (0)
- Generalised Cycling Attacks on Rsa (0)
- Husain's SBIBD (2011) (0)
- Research Online Research Online (2020) (0)
- Weighing matrices and sequences (2011) (0)
- Private-Key Cryptosystems (2003) (0)
- Infinite families of generalized Bhaskar Rao designs (1998) (0)
- Zero-Free and Redundant Quaternion Orthogonal Designs (2006) (0)
- Generalized WilliamsonandWallis-Whiteman Constructions forImprovedSquareOrder-8 COISsTBC (2005) (0)
- An Infinite Family of Quasi Orthogonal Matrices with Two Levels Constructed via SBIBD (2014) (0)
- "Albert Leon Whiteman (1915-1995)" (1997) (0)
- Constructing Hadamard matrices via orthogonal designs (2014) (0)
- An almost optimal fail-stop signature scheme (2000) (0)
- Transmitter Diversity Antenna Selection Techniques for Mimo Systems (2006) (0)
- Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings (1999) (0)
- Construction of amicable orthogonal design (2009) (0)
- Collusion-resistant protocols for private processing of aggregated queries in distributed databases (2020) (0)
- 10 PSEUDO-RANDOM SEQUENCE GENERATORS USING STRUCTURED NOISE (2017) (0)
- Research Online Combinatorial matrices (2014) (0)
- On the matrices used to construct baumert-hall arrays (1975) (0)
- Women in mathematics in Australia (1979) (0)
- (v, k, lambda)-configurations and Hadamard matrices (1970) (0)
- Security issues in mobile information networks (1996) (0)
- Security Issues in Mobile Information Networks (Special Section on Multi-dimensional Mobile Information Network) (1996) (0)
- Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings (2000) (0)
- New orthogonal designs from weighing matrices (2008) (0)
- Temporal Authorizations Scheme for XML Documents (2014) (0)
- Algebraic Theory of Orthogonal Designs (2017) (0)
- Collusion-resistant protocols for private processing of aggregated queries in distributed databases (2020) (0)
- Three-LeveL CreT an Ma TriCes Cons Tr UCTed via ConferenCe Ma TriCes (2015) (0)
- Some classes of Hadamard matrices with constant (1972) (0)
- Strong boxes for electronic commerce (1996) (0)
- Temporal authorizations scheme for XML document (2006) (0)
- Families of codes from orthogonal (0,1,-1)-matrices (1973) (0)
- New Square, Complex Orthogonal Space-Time Block Codes for Eight Transmitter Antennas (2006) (0)
- 1975 Orthogonal designs (2011) (0)
- Research Online Research Online Kerbie: Kerberos-type authentication using public-keys Kerbie: Kerberos-type authentication using public-keys (2020) (0)
- A study and testbed for the Australian Standard AS7799 Compliance and Management (2006) (0)
- A Note on the Exposure Property of SBIBD (2003) (0)
- Computer construction conjecture for symmetric hadamard matrices (2018) (0)
- Secure IP Multicast for DMS (2004) (0)
- A New Very Fast Stream Cipher : Tpy (2008) (0)
- Overview of the Book (2006) (0)
- CRETAN ( 4 t + 1 ) MATRICES (2016) (0)
- CRC for smart internet technology: an overview (2001) (0)
- DASC 2011: message from the chairs (2011) (0)
- Embedding and Extension Properties of Hadamard Matrices Revisited (2018) (0)
- Some Algebraic and Combinatorial Non-existence Results (2017) (0)
- On infinite families of sequences with one and two valued autocorrelation and two valued crosscorrelation function (2001) (0)
- Crypto Topics and Applications I (1999) (0)
- Recent advances in the construction of Hadamard (1973) (0)
- Two-level Cretan Matrices Constructed Theoretically and Computationally using SBIBD (2015) (0)
- Three-LeveL CreT an Ma TriCes of order 37 (2015) (0)
- A Construction for Quaternion Orthogonal Designs (2006) (0)
- Relating Nonlinearity to Propagation Characteristics (1995) (0)
- Fast operations for certain two alphabet circulant matrices (2013) (0)
- A Minimal Critical Set of a Class of Youden Squares (2006) (0)
- Perfect Secret Sharing Schemes from Room Squares to Anne Penfold Street on Her Retirement (1998) (0)
- Construction of T-matrices of order 6m+1 (2017) (0)
This paper list is powered by the following services:
Other Resources About Jennifer Seberry
What Schools Are Affiliated With Jennifer Seberry?
Jennifer Seberry is affiliated with the following schools: