default search action
Jennifer Seberry
Person information
- affiliation: University of Wollongong, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j104]Leanne Rylands, Jennifer Seberry, Xun Yi, Andrei Kelarev, Joe Ryan, Yuqing Lin:
Collusion-resistant protocols for private processing of aggregated queries in distributed databases. Distributed Parallel Databases 39(1): 97-127 (2021)
2010 – 2019
- 2019
- [j103]Andrei Kelarev, Xun Yi, Shahriar Badsha, Xuechao Yang, Leanne Rylands, Jennifer Seberry:
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection. Future Gener. Comput. Syst. 90: 368-380 (2019) - 2018
- [j102]Andrei Kelarev, Joe Ryan, Leanne Rylands, Jennifer Seberry, Xun Yi:
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller. J. Discrete Algorithms 52-53: 112-121 (2018) - 2017
- [c66]Nikolay A. Balonin, Jennifer Seberry:
A Construction for 0, 1, -1 Orthogonal Matrices Visualized. IWOCA 2017: 47-57 - [c65]Andrei Kelarev, Jennifer Seberry, Leanne Rylands, Xun Yi:
Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller. IWOCA 2017: 383-394 - 2015
- [j101]Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry:
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. IEEE Trans. Inf. Forensics Secur. 10(3): 679-693 (2015) - 2014
- [j100]Jennifer Seberry, Yi Mu, Fuchun Guo, Tim Wellsmore:
Efficient authentication and integrity protection for the border gateway protocol. Int. J. Secur. Networks 9(4): 234-243 (2014) - 2013
- [j99]Jennifer Seberry:
Strongly amicable orthogonal designs and amicable Hadamard matrices. Australas. J Comb. 55: 5-14 (2013) - [j98]Tianbing Xia, Jennifer Seberry, Mingyuan Xia, Shangli Zhang:
Some new constructions of orthogonal designs. Australas. J Comb. 55: 121-130 (2013) - [c64]Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry:
Efficient Semi-static Secure Broadcast Encryption Scheme. Pairing 2013: 62-76 - [p3]Jennifer Seberry:
The Impact of Number Theory and Computer-Aided Mathematics on Solving the Hadamard Matrix Conjecture. Number Theory and Related Fields 2013: 313-320 - 2012
- [j97]Chun Li, Jennifer Seberry:
On crystal sets. Australas. J Comb. 52: 89-110 (2012) - [j96]Jennifer Seberry, Dongvu Tonien:
Some Constructions of Mutually Orthogonal Latin Squares and Superimposed Codes. Discret. Math. Algorithms Appl. 4(3) (2012) - [j95]Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry:
New weighing matrices constructed from two circulant submatrices. Optim. Lett. 6(1): 211-217 (2012) - [c63]Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
Fault Analysis of the KATAN Family of Block Ciphers. ISPEC 2012: 319-336 - [e9]Willy Susilo, Yi Mu, Jennifer Seberry:
Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings. Lecture Notes in Computer Science 7372, Springer 2012, ISBN 978-3-642-31447-6 [contents] - [i3]Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
Fault Analysis of the KATAN Family of Block Ciphers. IACR Cryptol. ePrint Arch. 2012: 30 (2012) - 2011
- [j94]Jennifer Seberry, Sarah Spence Adams:
The amicable-Kronecker construction of quaternion orthogonal designs. Australas. J Comb. 50: 243-258 (2011) - [j93]Jennifer Seberry, Vinhbuu To, Dongvu Tonien:
A new generic digital signature algorithm. Groups Complex. Cryptol. 3(2): 221-237 (2011) - [c62]Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. AsiaCCS 2011: 296-305 - [c61]Jianyong Huang, Willy Susilo, Jennifer Seberry:
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules. TrustCom 2011: 525-532 - 2010
- [j92]Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry, Dimitris E. Simos:
New classes of orthogonal designs constructed from complementary sequences with given spread. Australas. J Comb. 46: 67-78 (2010) - [j91]K. T. Arasu, Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry:
On circulant and two-circulant weighing matrices. Australas. J Comb. 48: 43-52 (2010) - [j90]Jennifer Seberry, Marilena Mitrouli:
Some remarks on Hadamard matrices. Cryptogr. Commun. 2(2): 293-306 (2010) - [c60]Lei Wang, Tianbing Xia, Jennifer Seberry:
Inter-Domain Routing Validator Based Spoofing Defence System. ISI 2010: 153-155 - [c59]Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
On the Security of NOEKEON against Side Channel Cube Attacks. ISPEC 2010: 45-55 - [c58]Jianyong Huang, Willy Susilo, Jennifer Seberry:
Differential Fault Analysis of LEX. SCN 2010: 55-72
2000 – 2009
- 2009
- [j89]Ying Zhao, Jennifer Seberry, Tianbing Xia, Beata J. Wysocki, Tadeusz A. Wysocki:
Construction of amicable orthogonal design. Australas. J Comb. 44: 19-36 (2009) - [j88]Jianyong Huang, Jennifer Seberry, Willy Susilo:
A five-round algebraic property of AES and its application to the ALPHA-MAC. Int. J. Appl. Cryptogr. 1(4): 264-289 (2009) - [j87]Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins, Sarah Spence Adams:
Novel constructions of improved square complex orthogonal designs for eight transmit antennas. IEEE Trans. Inf. Theory 55(10): 4439-4448 (2009) - [c57]Sushmita Ruj, Jennifer Seberry, Bimal K. Roy:
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. CSE (2) 2009: 873-878 - 2008
- [j86]Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry:
New orthogonal designs from weighing matrices. Australas. J Comb. 40: 99-104 (2008) - [j85]Jennifer Seberry, Kenneth Finlayson, Sarah Spence Adams, Tadeusz A. Wysocki, Tianbing Xia, Beata J. Wysocki:
The Theory of Quaternion Orthogonal Designs. IEEE Trans. Signal Process. 56(1): 256-265 (2008) - [c56]Eli Biham, Jennifer Seberry:
A New Very Fast Stream Cipher : Tpy. AISC 2008: 5 - [c55]Jianyong Huang, Jennifer Seberry, Willy Susilo:
A Five-Round Algebraic Property of the Advanced Encryption Standard. ISC 2008: 316-330 - [e8]Yi Mu, Willy Susilo, Jennifer Seberry:
Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings. Lecture Notes in Computer Science 5107, Springer 2008, ISBN 978-3-540-69971-2 [contents] - 2007
- [j84]Tianbing Xia, Mingyuan Xia, Jennifer Seberry:
Some new results of regular Hadamard matrices and SBIBD II. Australas. J Comb. 37: 117-126 (2007) - [j83]Gennian Ge, Malcolm Greig, Jennifer Seberry, Ralph Seberry:
Generalized Bhaskar Rao Designs with Block Size 3 over Finite Abelian Groups. Graphs Comb. 23(3): 271-290 (2007) - [c54]Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang:
Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 - [c53]Beata J. Wysocki, Tadeusz A. Wysocki, Jennifer Seberry, Sarah Spence Adams, Hamid Sharif:
A Simple Orthogonal Space-Time-Polarization Block Code. VTC Fall 2007: 754-757 - 2006
- [j82]Tianbing Xia, Mingyuan Xia, Jennifer Seberry, Jing Wu:
Hadamard matrices constructed by circulant and negacyclic matrices. Australas. J Comb. 34: 105-116 (2006) - [j81]Ying Zhao, Jennifer Seberry, Tianbing Xia, Yejing Wang, Beata J. Wysocki, Tadeusz A. Wysocki, Le Chung Tran:
Amicable orthogonal designs of order 8 for complex space-time block codes. Australas. J Comb. 34: 137-144 (2006) - [j80]Ying Zhao, Yejing Wang, Jennifer Seberry:
On amicable orthogonal designs of order 8. Australas. J Comb. 34: 321-330 (2006) - [j79]Kenneth Finlayson, Moon Ho Lee, Jennifer Seberry, Mieko Yamada:
Jacket matrices constructed from Hadamard matrices and generalized Hadamard matrices. Australas. J Comb. 35: 83-88 (2006) - [j78]Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry:
Hadamard ideals and Hadamard matrices with two circulant cores. Eur. J. Comb. 27(5): 658-668 (2006) - [c52]Dibyendu Chakrabarti, Jennifer Seberry:
Combinatorial Structures for Design of Wireless Sensor Networks. ACNS 2006: 365-374 - [c51]Jianyong Huang, Jennifer Seberry, Willy Susilo:
On the Internal Structure of Alpha-MAC. VIETCRYPT 2006: 271-285 - 2005
- [j77]Mingyuan Xia, Tianbing Xia, Jennifer Seberry, Guoxin Zuo:
A new method for constructing T-matrices. Australas. J Comb. 32: 61-78 (2005) - [j76]Rita SahaRay, Avishek Adhikari, Jennifer Seberry:
Critical sets in orthogonal arrays with 7 and 9 levels. Australas. J Comb. 33: 109-124 (2005) - [j75]Yejing Wang, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, Le Chung Tran, Ying Zhao, Tianbing Xia:
An exposure property of block designs. Australas. J Comb. 33: 147-156 (2005) - [j74]Mingyuan Xia, Tianbing Xia, Jennifer Seberry, Jing Wu:
An infinite family of Goethals-Seidel arrays. Discret. Appl. Math. 145(3): 498-504 (2005) - [j73]Mingyuan Xia, Tianbing Xia, Jennifer Seberry:
A New Method for Constructing Williamson Matrices. Des. Codes Cryptogr. 35(2): 191-209 (2005) - [j72]Le Chung Tran, Tadeusz A. Wysocki, Alfred Mertins, Jennifer Seberry:
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Wireless Channels. EURASIP J. Wirel. Commun. Netw. 2005(5): 801-815 (2005) - [c50]Christos Kravvaritis, Marilena Mitrouli, Jennifer Seberry:
Counting Techniques Specifying the Existence of Submatrices in Weighing Matrices. CASC 2005: 294-305 - [c49]Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder:
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. EUC Workshops 2005: 423-432 - [c48]Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan:
Access Policy Sheet for Access Control in Fine-Grained XML. EUC Workshops 2005: 1273-1282 - [c47]Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan:
Delegatable Access Control for Fine-Grained XML. ICPADS (2) 2005: 270-274 - [c46]Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins:
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Radio Channels. IPDPS 2005 - [c45]Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu:
A Cryptographic Solution for General Access Control. ISC 2005: 461-473 - [c44]Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins, Sarah Spence Adams:
Generalized Williamson and Wallis-Whiteman constructions for improved square order-8 CO STBCs. PIMRC 2005: 1155-1159 - [c43]Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins:
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes. WOWMOM 2005: 213-218 - [i2]Eli Biham, Jennifer Seberry:
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays. IACR Cryptol. ePrint Arch. 2005: 155 (2005) - 2004
- [j71]Kenneth Finlayson, Jennifer Seberry:
Orthogonal designs from negacyclic matrices. Australas. J Comb. 30: 319- (2004) - [j70]Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry:
Generalized orthogonal designs. Ars Comb. 71 (2004) - [j69]Christos Koukouvinos, Jennifer Seberry:
Orthogonal Designs of Kharaghani Type: II. Ars Comb. 72 (2004) - [j68]Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes:
Homogeneous bent functions of degree n in 2n variables do not exist for nge3. Discret. Appl. Math. 142(1-3): 127-132 (2004) - [j67]Roderick J. Fletcher, Christos Koukouvinos, Jennifer Seberry:
New skew-Hadamard matrices of order 4cdot59 and new D-optimal designs of order 2cdot59. Discret. Math. 286(3): 251-253 (2004) - [c42]Jing Wu, Jennifer Seberry, Tianbing Xia:
Secure IP Multicast for DMS. Security and Management 2004: 163-167 - [c41]Tianbing Xia, Jennifer Seberry, Jing Wu:
Boolean Functions with Good Properties. Security and Management 2004: 294-299 - [c40]Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins:
On multi-modulation schemes to increase the rate of space-time block codes. EUSIPCO 2004: 1841-1844 - [c39]Yibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry:
A Generalized Policy Support System and Its Hierarchy Semantics. WOSIS 2004: 136-145 - 2003
- [b2]Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry:
Fundamentals of computer security. Springer 2003, ISBN 978-3-540-43101-5, pp. I-XX, 1-677 - [j66]Tianbing Xia, Mingyuan Xia, Jennifer Seberry:
Regular Hadamard matrix, maximum excess and SBIBD. Australas. J Comb. 27: 263-276 (2003) - [j65]Christos Koukouvinos, Jennifer Seberry:
Orthogonal Designs of Kharaghani Type: I. Ars Comb. 67 (2003) - [j64]Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry:
Some results on self-orthogonal and self-dual codes. Ars Comb. 68 (2003) - [j63]Rita SahaRay, Jennifer Seberry:
Critical Sets in Orthogonal Arrays. Electron. Notes Discret. Math. 15: 160 (2003) - [j62]Yejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara:
A Note on the Exposure Property of SBIBD. Electron. Notes Discret. Math. 15: 225-227 (2003) - [j61]Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry:
Values of Minors of an Infinite Family of D-Optimal Designs and Their Application to the Growth Problem: II. SIAM J. Matrix Anal. Appl. 24(3): 715-727 (2003) - [j60]Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki:
Williamson-Hadamard spreading sequences for DS-CDMA applications. Wirel. Commun. Mob. Comput. 3(5): 597-607 (2003) - [c38]Jing Wu, Tianbing Xia, Jennifer Seberry:
Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2). Security and Management 2003: 241-247 - [c37]Willy Susilo, Jianyong Huang, Jennifer Seberry:
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674 - [c36]Beomsik Song, Jennifer Seberry:
Further Observations on the Structure of the AES Algorithm. FSE 2003: 223-234 - [c35]Xiang Li, Jennifer Seberry:
Forensic Computing. INDOCRYPT 2003: 18-35 - [e7]Reihaneh Safavi-Naini, Jennifer Seberry:
Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Lecture Notes in Computer Science 2727, Springer 2003, ISBN 3-540-40515-1 [contents] - 2002
- [j59]Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry:
On Full Orthogonal Designs in Order 56. Ars Comb. 65 (2002) - [c34]David Soldera, Jennifer Seberry, Chengxin Qu:
The Analysis of Zheng-Seberry Scheme. ACISP 2002: 159-168 - [c33]Beomsik Song, Jennifer Seberry:
Consistent Differential Patterns of Rijndael. ICISC 2002: 149-163 - [e6]Lynn Margaret Batten, Jennifer Seberry:
Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings. Lecture Notes in Computer Science 2384, Springer 2002, ISBN 3-540-43861-0 [contents] - 2001
- [j58]Christos Koukouvinos, E. Lappas, Marilena Mitrouli, Jennifer Seberry:
On the Complete Pivoting Conjecture for Hadamard Matrices of Small Orders. J. Res. Pract. Inf. Technol. 33(4): 298-309 (2001) - [j57]Roderick J. Fletcher, Jennifer Seberry:
New D-optimal designs of order 110. Australas. J Comb. 23: 49-52 (2001) - [j56]Roderick J. Fletcher, Marc Gysin, Jennifer Seberry:
Application of the discrete Fourier transform to the search for generalised Legendre pairs and Hadamard matrices. Australas. J Comb. 23: 75-86 (2001) - [j55]Marc Gysin, Jennifer Seberry:
On ternary complementary pairs. Australas. J Comb. 23: 153-170 (2001) - [j54]Marc Gysin, Jennifer Seberry:
On infinite families of sequences with one and two valued autocorrelation and two valued crosscorrelation function. Australas. J Comb. 23: 197-210 (2001) - [j53]Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry:
Values of Minors of (1, -1) Incidence Matrices of SBIBDs and Their Application to the Growth Problem. Des. Codes Cryptogr. 23(3): 267-282 (2001) - [j52]Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry:
Values of Minors of an Infinite Family of D-Optimal Designs and Their Application to the Growth Problem. SIAM J. Matrix Anal. Appl. 23(1): 1-14 (2001) - [c32]Beomsik Song, Huaxiong Wang, Jennifer Seberry:
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. ICISC 2001: 18-31 - [c31]Yvo Desmedt, Mike Burmester, Jennifer Seberry:
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Public Key Cryptography 2001: 277-286 - 2000
- [j51]L. F. Fitina, Jennifer Seberry:
On the spectrum of an F-square. Australas. J Comb. 22: 81-90 (2000) - [j50]Jennifer Seberry, Tianbing Xia, Josef Pieprzyk:
Construction of cubic homogeneous boolean bent functions. Australas. J Comb. 22: 233-246 (2000) - [j49]Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry:
A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000) - [j48]Chengxin Qu, Jennifer Seberry, Josef Pieprzyk:
Homogeneous bent functions. Discret. Appl. Math. 102(1-2): 133-139 (2000) - [c30]Jaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry:
Codes Identifying Bad Signature in Batches. INDOCRYPT 2000: 143-154 - [c29]Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry:
Identification of Bad Signatures in Batches. Public Key Cryptography 2000: 28-45 - [e5]Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry:
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings. Lecture Notes in Computer Science 1975, Springer 2000, ISBN 3-540-41416-9 [contents]
1990 – 1999
- 1999
- [j47]L. F. Fitina, Jennifer Seberry, Dinesh G. Sarvate:
On F-squares and their critical sets. Australas. J Comb. 19: 209-230 (1999) - [j46]L. F. Fitina, Jennifer Seberry, Ghulam Rasool Chaudhry:
Back circulant Latin squares and the influence of a set. Australas. J Comb. 20: 163-180 (1999) - [j45]Christos Koukouvinos, Jennifer Seberry:
New orthogonal designs and sequences with two and three variables in order 28. Ars Comb. 54 (1999) - [c28]Chengxin Qu, Jennifer Seberry, Josef Pieprzyk:
On the Symmetric Property of Homogeneous Boolean Functions. ACISP 1999: 26-35 - [c27]Marc Gysin, Jennifer Seberry:
Generalised Cycling Attacks on RSA and Strong RSA Primes. ACISP 1999: 149-163 - [c26]Jeffrey Horton, Jennifer Seberry:
Companion Viruses and the Macintosh: Threats and Countermeasures. ACISP 1999: 202-212 - [p2]Jennifer Seberry, Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini:
Crypto Topics and Applications I. Algorithms and Theory of Computation Handbook 1999 - [p1]Jennifer Seberry, Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini:
Crypto Topics and Applications II. Algorithms and Theory of Computation Handbook 1999 - [e4]Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry:
Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings. Lecture Notes in Computer Science 1587, Springer 1999, ISBN 3-540-65756-8 [contents] - 1998
- [j44]K. T. Arasu, Jennifer Seberry:
On circulant weighing matrices. Australas. J Comb. 17: 21-38 (1998) - [c25]Jeffrey Horton, Jennifer Seberry:
Covert Distributed Computing Using Java Through Web Spoofing. ACISP 1998: 48-57 - [c24]Mike Burmester, Yvo Desmedt, Jennifer Seberry:
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). ASIACRYPT 1998: 380-391 - 1996
- [j43]Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry, P. Karabelas:
On sufficient conditions for some orthogonal designs and sequences with zero autocorrelation function. Australas. J Comb. 13: 197-216 (1996) - [j42]Marc Gysin, Jennifer Seberry:
Multiplications of ternary complementary pairs. Australas. J Comb. 14: 165-180 (1996) - [j41]Azad Jiwa, Thomas Hardjono, Jennifer Seberry:
Beacons for Authentication in Distributed Systems. J. Comput. Secur. 4(1): 81-96 (1996) - [c23]Thomas Hardjono, Jennifer Seberry:
Replicating the Kuperee authentication server for increased security and reliability. ACISP 1996: 14-26 - [c22]Ghulam Rasool Chaudhry, Jennifer Seberry:
Secret Sharing Schemes Based on Room Squares. DMTCS 1996: 158-167 - [e3]Josef Pieprzyk, Jennifer Seberry:
Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings. Lecture Notes in Computer Science 1172, Springer 1996, ISBN 3-540-61991-7 [contents] - 1995
- [j40]Marc Gysin, Jennifer Seberry:
On the weighing matrices of order 4n and weight 4n-2 and 2n-1. Australas. J Comb. 12: 157-174 (1995) - [j39]Thomas Hardjono, Jennifer Seberry:
Applications of smartcards for anonymous and verifiable databases. Comput. Secur. 14(5): 465-472 (1995) - [j38]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Nonlinearity and Propagation Characteristics of Balanced Boolean Functions. Inf. Comput. 119(1): 1-13 (1995) - [j37]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. J. Univers. Comput. Sci. 1(2): 136-150 (1995) - [c21]Thomas Hardjono, Jennifer Seberry:
Information Security in Mobile Databases. Australasian Database Conference 1995 - 1994
- [j36]Jennifer Seberry, Xian-Mo Zhang:
Construction of bent functions from two known bent functions. Australas. J Comb. 9: 21-36 (1994) - [j35]Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Joel Yang:
Multiplication of sequences with zero autocorrelation. Australas. J Comb. 10: 5-16 (1994) - [j34]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Cryptographic Boolean functions via group Hadamard matrices. Australas. J Comb. 10: 131-146 (1994) - [j33]Yuliang Zheng, Thomas Hardjono, Jennifer Seberry:
Reusing Shares in Secret Sharing Schemes. Comput. J. 37(3): 199-205 (1994) - [j32]Thomas Hardjono, Yuliang Zheng, Jennifer Seberry:
Database authentication revisited. Comput. Secur. 13(7): 573-580 (1994) - [j31]Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Y. Yang:
On Sequences with Zero Autocorrelation. Des. Codes Cryptogr. 4(4): 327-340 (1994) - [j30]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Improving the Strict Avalanche Characteristics of Cryptographic Functions. Inf. Process. Lett. 50(1): 37-41 (1994) - [j29]Warwick de Launey, Jennifer Seberry:
The Strong Kronecker Product. J. Comb. Theory A 66(2): 192-213 (1994) - [j28]Claude Carlet, Jennifer Seberry, Xian-Mo Zhang:
Comments on 'Generating and counting binary Bent sequences'. IEEE Trans. Inf. Theory 40(2): 600- (1994) - [c20]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). ASIACRYPT 1994: 119-132 - [c19]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Pitfalls in Designing Substitution Boxes (Extended Abstract). CRYPTO 1994: 383-396 - [c18]Azad Jiwa, Jennifer Seberry, Yuliang Zheng:
Beacon Based Authentication. ESORICS 1994: 125-141 - [c17]Thomas Hardjono, Jennifer Seberry:
Authentication via Multi-Service Tickets in the Kuperee Server. ESORICS 1994: 143-160 - [c16]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Relationships Among Nonlinear Criteria (Extended Abstract). EUROCRYPT 1994: 376-388 - [c15]Thomas Hardjono, Yuliang Zheng, Jennifer Seberry:
Kuperee: An Approach to Authentication using Public Keys. ULPAA 1994: 65-76 - 1993
- [j27]Jennifer Seberry, Xian-Mo Zhang:
Some orthogonal matrices constructed by strong Kronecker multiplication. Australas. J Comb. 7: 213-224 (1993) - [j26]Christos Koukouvinos, Jennifer Seberry:
Some new weighing matrices using sequences with zero autocorrelation function. Australas. J Comb. 8: 143-152 (1993) - [j25]Hadi Kharaghani, Jennifer Seberry:
The excess of complex Hadamard matrices. Graphs Comb. 9(1): 47-56 (1993) - [j24]Jennifer Seberry, Xian-Mo Zhang:
Regular sets of matrices and applications. Graphs Comb. 9(2-4): 185-195 (1993) - [j23]Yuliang Zheng, Jennifer Seberry:
Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. IEEE J. Sel. Areas Commun. 11(5): 715-724 (1993) - [c14]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Systematic Generation of Cryptographically Robust S-Boxes. CCS 1993: 171-182 - [c13]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). CRYPTO 1993: 49-60 - [c12]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). EUROCRYPT 1993: 181-199 - [e2]Jennifer Seberry, Yuliang Zheng:
Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings. Lecture Notes in Computer Science 718, Springer 1993, ISBN 3-540-57220-1 [contents] - 1992
- [j22]Christos Koukouvinos, Jennifer Seberry:
Constructing Hadamard matrices from orthogonal designs. Australas. J Comb. 6: 267-278 (1992) - [j21]Robert Craigen, Jennifer Seberry, Xian-Mo Zhang:
Product of Four Hadamard Matrices. J. Comb. Theory A 59(2): 318-320 (1992) - [j20]John H. Loxton, David S. P. Khoo, Gregory J. Bird, Jennifer Seberry:
A Cubic RSA Code Equivalent to Factorization. J. Cryptol. 5(2): 139-150 (1992) - [c11]Yvo Desmedt, Jennifer Seberry:
Practical Proven Secure Authentication with Arbitration. AUSCRYPT 1992: 27-32 - [c10]Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry:
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. AUSCRYPT 1992: 83-104 - [c9]Jennifer Seberry, Xian-Mo Zhang:
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. AUSCRYPT 1992: 145-155 - [c8]Yuliang Zheng, Jennifer Seberry:
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). CRYPTO 1992: 292-304 - 1991
- [b1]Jennifer Seberry, Josef Pieprzyk:
Cryptography - an introduction to computer security. Advances in computer science series, Prentice Hall 1991, ISBN 978-0-13-194986-7, pp. I-VII, 1-375 - [j19]Andrew Bowler, Kathleen A. S. Quinn, Jennifer Seberry:
Generalised Bhaskar Rao designs with elements from cyclic groups of even order. Australas. J Comb. 3: 5-14 (1991) - [j18]Jennifer Seberry:
Existence of SBIBD(4k2, 2k2±k, k2±k) and Hadamard matrices with maximal excess. Australas. J Comb. 4: 87-92 (1991) - [j17]Jennifer Seberry, Xian-Mo Zhang:
Some orthogonal designs and complex Hadamard matrices by using two Hadamard matrices. Australas. J Comb. 4: 93-102 (1991) - [j16]Joan Cooper, Diane M. Donovan, Jennifer Seberry:
Latin squares and critical sets of minimal size. Australas. J Comb. 4: 113-120 (1991) - [j15]Christos Koukouvinos, Stratis Kounias, Jennifer Seberry:
Supplementary difference sets and optimal designs. Discret. Math. 88(1): 49-58 (1991) - [j14]Brendan D. McKay, Jennifer Seberry, Scott A. Vanstone:
Ralph Gordon Stanton. Discret. Math. 92(1-3): 1-8 (1991) - [j13]Christos Koukouvinos, Jennifer Seberry:
Hadamard matrices of order =8 (mod 16) with maximal excess. Discret. Math. 92(1-3): 173-176 (1991) - [j12]Reihaneh Safavi-Naini, Jennifer Seberry:
Error-correcting codes for authentication and subliminal channels. IEEE Trans. Inf. Theory 37(1): 13-17 (1991) - [c7]Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry:
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. ASIACRYPT 1991: 36-50 - 1990
- [c6]Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild:
Some Remarks on Authentication Systems. AUSCRYPT 1990: 122-139 - [c5]Lawrence Brown, Jennifer Seberry:
Key Scheduling In Des Type Cryptosystems. AUSCRYPT 1990: 221-228 - [c4]Lawrence Brown, Josef Pieprzyk, Jennifer Seberry:
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. AUSCRYPT 1990: 229-236 - [c3]Thomas Hardjono, Jennifer Seberry:
Search Key Substitution in the Encipherment of B-Trees. VLDB 1990: 50-58 - [e1]Jennifer Seberry, Josef Pieprzyk:
Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings. Lecture Notes in Computer Science 453, Springer 1990, ISBN 3-540-53000-2 [contents]
1980 – 1989
- 1989
- [j11]Mirka Miller, Jennifer Seberry:
Relative Compromise of Statistical Databases. Aust. Comput. J. 21(2): 56-61 (1989) - [j10]Jennifer Seberry:
SBIBD(4k2, 2k2 +k, k2 +k) and Hadamard matrices of order 4k2 with maximal excess are equivalent. Graphs Comb. 5(1): 373-383 (1989) - [c2]Lawrence Brown, Jennifer Seberry:
On the Design of Permutation P in DES Type Cryptosystems. EUROCRYPT 1989: 696-705 - 1988
- [j9]Jennifer Seberry, Albert Leon Whiteman:
New Hadamard matrices and conference matrices obtained via Mathon's construction. Graphs Comb. 4(1): 355-377 (1988) - 1986
- [j8]Jennifer Seberry:
A new construction for Williamson-type matrices. Graphs Comb. 2(1): 81-87 (1986) - [c1]Ralph Gyoery, Jennifer Seberry:
Electronic Funds Transfer Point of Sale in Australia. CRYPTO 1986: 347-377 - [i1]David S. P. Khoo, Gregory J. Bird, Jennifer Seberry:
Encryption Exponent 3 and the Security of RSA. EUROCRYPT 1986: 55 - 1984
- [j7]Jeremy E. Dawson, Jennifer Seberry, David B. Skillicorn:
The directed packing numbers DD (t, v, v), t>=;4. Comb. 4(2): 121-130 (1984) - 1981
- [j6]Joseph Hammer, Jennifer Seberry:
Higher dimensional orthogonal designs and applications. IEEE Trans. Inf. Theory 27(6): 772-779 (1981) - 1980
- [j5]Jennifer Seberry, David B. Skillicorn:
All Directed BIBDs with k = 3 Exist. J. Comb. Theory A 29(2): 244-248 (1980)
1970 – 1979
- 1979
- [j4]R. Razen, Jennifer Seberry, Karl H. Wehrhahn:
Ordered Partitions and Codes Generated by Circulant Matrices. J. Comb. Theory A 27(3): 333-341 (1979) - 1976
- [j3]Jennifer Seberry Wallis:
On the Existence of Hadamard Matrices. J. Comb. Theory A 21(2): 188-195 (1976) - 1975
- [j2]Jennifer Seberry Wallis:
On Hadamard Matrices. J. Comb. Theory A 18(2): 149-164 (1975) - [j1]Anthony V. Geramita, Jennifer Seberry Wallis:
Orthogonal Designs IV: Existence Questions. J. Comb. Theory A 19(1): 66-83 (1975)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint