Jennifer Seberry
Affiliations:- University of Wollongong, Australia
According to our database1,
Jennifer Seberry
authored at least 177 papers
between 1975 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
-
on uow.edu.au
-
on isni.org
On csauthors.net:
Bibliography
2021
Collusion-resistant protocols for private processing of aggregated queries in distributed databases.
Distributed Parallel Databases, 2021
2019
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection.
Future Gener. Comput. Syst., 2019
2018
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller.
J. Discrete Algorithms, 2018
2017
Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller.
Proceedings of the Combinatorial Algorithms - 28th International Workshop, 2017
Proceedings of the Combinatorial Algorithms - 28th International Workshop, 2017
2015
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
IEEE Trans. Inf. Forensics Secur., 2015
2014
Int. J. Secur. Networks, 2014
2013
Australas. J Comb., 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
The Impact of Number Theory and Computer-Aided Mathematics on Solving the Hadamard Matrix Conjecture.
Proceedings of the Number Theory and Related Fields, In Memory of Alf van der Poorten, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Discret. Math. Algorithms Appl., 2012
2011
Australas. J Comb., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
New classes of orthogonal designs constructed from complementary sequences with given spread.
Australas. J Comb., 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Information Security, 2010
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010
2009
Novel constructions of improved square complex orthogonal designs for eight transmit antennas.
IEEE Trans. Inf. Theory, 2009
Int. J. Appl. Cryptogr., 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the Information Security, 11th International Conference, 2008
A New Very Fast Stream Cipher : Tpy.
Proceedings of the Sixth Australasian Information Security Conference, 2008
2007
Graphs Comb., 2007
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Australas. J Comb., 2006
Jacket matrices constructed from Hadamard matrices and generalized Hadamard matrices.
Australas. J Comb., 2006
Australas. J Comb., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Wireless Channels.
EURASIP J. Wirel. Commun. Netw., 2005
Proceedings of the 2005 International Conference on a World of Wireless, 2005
Generalized Williamson and Wallis-Whiteman constructions for improved square order-8 CO STBCs.
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Proceedings of the Information Security, 8th International Conference, 2005
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Radio Channels.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Computer Algebra in Scientific Computing, 8th International Workshop, 2005
2004
New skew-Hadamard matrices of order 4cdot59 and new D-optimal designs of order 2cdot59.
Discret. Math., 2004
Homogeneous bent functions of degree <i>n</i> in <i>2n</i> variables do not exist for <i>n</i>ge3.
Discret. Appl. Math., 2004
Orthogonal Designs of Kharaghani Type: II.
Ars Comb., 2004
Generalized orthogonal designs.
Ars Comb., 2004
A Generalized Policy Support System and Its Hierarchy Semantics.
Proceedings of the Security In Information Systems, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
Boolean Functions with Good Properties.
Proceedings of the International Conference on Security and Management, 2004
Secure IP Multicast for DMS.
Proceedings of the International Conference on Security and Management, 2004
2003
Wirel. Commun. Mob. Comput., 2003
Values of Minors of an Infinite Family of <i>D</i>-Optimal Designs and Their Application to the Growth Problem: II.
SIAM J. Matrix Anal. Appl., 2003
Orthogonal Designs of Kharaghani Type: I.
Ars Comb., 2003
Some results on self-orthogonal and self-dual codes.
Ars Comb., 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF<sup>2n+1</sup>(2).
Proceedings of the International Conference on Security and Management, 2003
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?).
Proceedings of the International Conference on Security and Management, 2003
2002
On Full Orthogonal Designs in Order 56.
Ars Comb., 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Values of Minors of an Infinite Family of <i>D</i>-Optimal Designs and Their Application to the Growth Problem.
SIAM J. Matrix Anal. Appl., 2001
Values of Minors of (1, -1) Incidence Matrices of SBIBDs and Their Application to the Growth Problem.
Des. Codes Cryptogr., 2001
On infinite families of sequences with one and two valued autocorrelation and two valued crosscorrelation function.
Australas. J Comb., 2001
Application of the discrete Fourier transform to the search for generalised Legendre pairs and Hadamard matrices.
Australas. J Comb., 2001
On the Complete Pivoting Conjecture for Hadamard Matrices of Small Orders.
J. Res. Pract. Inf. Technol., 2001
Proceedings of the Public Key Cryptography, 2001
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
Proceedings of the Information Security and Cryptology, 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Progress in Cryptology, 2000
1999
New orthogonal designs and sequences with two and three variables in order 28.
Ars Comb., 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Algorithms and Theory of Computation Handbook., 1999
Proceedings of the Algorithms and Theory of Computation Handbook., 1999
1998
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically).
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1996
On sufficient conditions for some orthogonal designs and sequences with zero autocorrelation function.
Australas. J Comb., 1996
Secret Sharing Schemes Based on Room Squares.
Proceedings of the First Conference of the Centre for Discrete Mathematics and Theoretical Computer Science, 1996
Replicating the Kuperee authentication server for increased security and reliability.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Inf. Comput., May, 1995
The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions.
J. Univers. Comput. Sci., 1995
Comput. Secur., 1995
Australas. J Comb., 1995
Information Security in Mobile Databases.
Proceedings of the Sixth Australasian Database Conference, 1995
1994
IEEE Trans. Inf. Theory, 1994
The Strong Kronecker Product.
J. Comb. Theory A, 1994
Inf. Process. Lett., 1994
Australas. J Comb., 1994
Australas. J Comb., 1994
Kuperee: An Approach to Authentication using Public Keys.
Proceedings of the Upper Layer Protocols, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Computer Security, 1994
Proceedings of the Advances in Cryptology, 1994
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
IEEE J. Sel. Areas Commun., 1993
Australas. J Comb., 1993
Australas. J Comb., 1993
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1992
Product of Four Hadamard Matrices.
J. Comb. Theory A, 1992
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion.
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
IEEE Trans. Inf. Theory, 1991
Ralph Gordon Stanton.
Discret. Math., 1991
Some orthogonal designs and complex Hadamard matrices by using two Hadamard matrices.
Australas. J Comb., 1991
Existence of SBIBD(4k<sup>2</sup>, 2k<sup>2</sup>±k, k<sup>2</sup>±k) and Hadamard matrices with maximal excess.
Australas. J Comb., 1991
Australas. J Comb., 1991
Proceedings of the Advances in Cryptology, 1991
Cryptography - an introduction to computer security.
Advances in computer science series, Prentice Hall, ISBN: 978-0-13-194986-7, 1991
1990
Proceedings of the 16th International Conference on Very Large Data Bases, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
<i>SBIBD</i>(4<i>k</i><sup>2</sup>, 2<i>k</i><sup>2</sup> +<i>k</i>, <i>k</i><sup>2</sup> +<i>k</i>) and Hadamard matrices of order 4<i>k</i><sup>2</sup> with maximal excess are equivalent.
Graphs Comb., 1989
Relative Compromise of Statistical Databases.
Aust. Comput. J., 1989
Proceedings of the Advances in Cryptology, 1989
1988
Graphs Comb., 1988
1986
Encryption Exponent 3 and the Security of RSA.
EUROCRYPT, 1986
Proceedings of the Advances in Cryptology, 1986
1984
1981
IEEE Trans. Inf. Theory, 1981
1980
1979
J. Comb. Theory A, 1979
1976
1975