Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Jennifer Seberry
Search web for home page
Program Committees
1
1994
Crypto
pc
2
1994
Asiacrypt
general chair
3
1993
Eurocrypt
pc
4
1992
Eurocrypt
pc
5
1992
Auscrypt
pc chair
6
1990
Auscrypt
general chair
Publications
year
title
booktitle
pages
1
2005
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays
eprint
online
2
2003
Further Observations on the Structure of the AES Algorithm
fse
online
3
2001
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow
pkc
277-286
4
2000
Identification of Bad Signatures in Batches
pkc
28-45
5
1998
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)
asiacrypt
380-391
6
1994
Relationships Among Nonlinear Criteria (Extended Abstract)
eurocrypt
376-388
7
1994
Pitfalls in Designing Substitution Boxes (Extended Abstract)
crypto
383-396
8
1994
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract)
asiacrypt
119-132
9
1993
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract)
eurocrypt
181-199
10
1993
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract)
crypto
49-60
11
1992
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
auscrypt
83-104
12
1992
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)
crypto
292-304
13
1992
A Cubic RSA Code Equivalent to Factorization
jofc
139-150
14
1992
Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings
auscrypt
15
1992
Practical Proven Secure Authentication with Arbitration
auscrypt
27-32
16
1992
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion
auscrypt
145-155
17
1991
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
asiacrypt
36-50
18
1990
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
auscrypt
229-236
19
1990
Key Scheduling In Des Type Cryptosystems
auscrypt
221-228
20
1990
Some Remarks on Authentication Systems
auscrypt
122-139
21
1989
On the Design of Permutation P in DES Type Cryptosystems
eurocrypt
696-705
22
1986
Electronic Funds Transfer Point of Sale in Australia
crypto
347-377
23
1986
Encryption Exponent 3 and the Security of RSA
eurocrypt
55
Coauthors of Jennifer Seberry
Martin Anthony
Eli Biham
Gregory J. Bird
Lawrence Brown
Mike Burmester
Yvo Desmedt
Ralph Gyoery
David S. P. Khoo
Matthew Kwan
John H. Loxton
Keith M. Martin
Dariusz Michatek
Jaroslaw Pastuszak
Josef Pieprzyk
Beomsik Song
Peter R. Wild
Xian-Mo Zhang
Yuliang Zheng