What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jennifer Seberry
Google Scholar
37
publications in security and cryptology related venues
Year
Venue
Title
2015
journals/tifs
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
Jongkil Kim
Willy Susilo
Man Ho Au
Jennifer Seberry
2011
conf/ccs
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations.
Shekh Faisal Abdul-Latip
Reza Reyhanitabar
Willy Susilo
Jennifer Seberry
2006
conf/acns
Combinatorial Structures for Design of Wireless Sensor Networks.
Dibyendu Chakrabarti
Jennifer Seberry
2003
conf/fse
Further Observations on the Structure of the AES Algorithm.
Beomsik Song
Jennifer Seberry
2002
conf/acisp
The Analysis of Zheng-Seberry Scheme.
David Soldera
Jennifer Seberry
Chengxin Qu
2002
conf/icisc
Consistent Differential Patterns of Rijndael.
Beomsik Song
Jennifer Seberry
2001
conf/icisc
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
Beomsik Song
Huaxiong Wang
Jennifer Seberry
2001
conf/pkc
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow.
Yvo Desmedt
Mike Burmester
Jennifer Seberry
2000
conf/pkc
Identification of Bad Signatures in Batches.
Jaroslaw Pastuszak
Dariusz Michatek
Josef Pieprzyk
Jennifer Seberry
1999
conf/acisp
Generalised Cycling Attacks on RSA and Strong RSA Primes.
Marc Gysin
Jennifer Seberry
1999
conf/acisp
On the Symmetric Property of Homogeneous Boolean Functions.
Chengxin Qu
Jennifer Seberry
Josef Pieprzyk
1999
conf/acisp
Companion Viruses and the Macintosh: Threats and Countermeasures.
Jeffrey Horton
Jennifer Seberry
1998
conf/acisp
Covert Distributed Computing Using Java Through Web Spoofing.
Jeffrey Horton
Jennifer Seberry
1998
conf/asiacrypt
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically).
Mike Burmester
Yvo Desmedt
Jennifer Seberry
1996
conf/acisp
Replicating the Kuperee authentication server for increased security and reliability.
Thomas Hardjono
Jennifer Seberry
1995
journals/compsec
Applications of smartcards for anonymous and verifiable databases.
Thomas Hardjono
Jennifer Seberry
1994
journals/compsec
Database authentication revisited.
Thomas Hardjono
Yuliang Zheng
Jennifer Seberry
1994
conf/crypto
Pitfalls in Designing Substitution Boxes (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1994
conf/esorics
Beacon Based Authentication.
Azad Jiwa
Jennifer Seberry
Yuliang Zheng
1994
conf/esorics
Authentication via Multi-Service Tickets in the Kuperee Server.
Thomas Hardjono
Jennifer Seberry
1994
conf/eurocrypt
Relationships Among Nonlinear Criteria (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1994
conf/asiacrypt
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/ccs
Systematic Generation of Cryptographically Robust S-Boxes.
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/crypto
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/eurocrypt
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1992
journals/joc
A Cubic RSA Code Equivalent to Factorization.
John H. Loxton
David S. P. Khoo
Gregory J. Bird
Jennifer Seberry
1992
conf/crypto
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract).
Yuliang Zheng
Jennifer Seberry
1992
conf/asiacrypt
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output.
Yuliang Zheng
Josef Pieprzyk
Jennifer Seberry
1992
conf/asiacrypt
Practical Proven Secure Authentication with Arbitration.
Yvo Desmedt
Jennifer Seberry
1992
conf/asiacrypt
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion.
Jennifer Seberry
Xian-Mo Zhang
1991
conf/asiacrypt
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI.
Lawrence Brown
Matthew Kwan
Josef Pieprzyk
Jennifer Seberry
1990
conf/asiacrypt
Key Scheduling In Des Type Cryptosystems.
Lawrence Brown
Jennifer Seberry
1990
conf/asiacrypt
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications.
Lawrence Brown
Josef Pieprzyk
Jennifer Seberry
1990
conf/asiacrypt
Some Remarks on Authentication Systems.
Martin Anthony
Keith M. Martin
Jennifer Seberry
Peter R. Wild
1989
conf/eurocrypt
On the Design of Permutation P in DES Type Cryptosystems.
Lawrence Brown
Jennifer Seberry
1986
conf/crypto
Electronic Funds Transfer Point of Sale in Australia.
Ralph Gyoery
Jennifer Seberry
1986
conf/eurocrypt
Encryption Exponent 3 and the Security of RSA.
David S. P. Khoo
Gregory J. Bird
Jennifer Seberry
Coauthors
Azad Jiwa
(1)
Beomsik Song
(3)
Chengxin Qu
(2)
Dariusz Michatek
(1)
David S. P. Khoo
(2)
David Soldera
(1)
Dibyendu Chakrabarti
(1)
Gregory J. Bird
(2)
Huaxiong Wang
(1)
Jaroslaw Pastuszak
(1)
Jeffrey Horton
(2)
Jennifer Seberry
(37)
John H. Loxton
(1)
Jongkil Kim
(1)
Josef Pieprzyk
(5)
Keith M. Martin
(1)
Lawrence Brown
(4)
Man Ho Au
(1)
Marc Gysin
(1)
Martin Anthony
(1)
Matthew Kwan
(1)
Mike Burmester
(2)
Peter R. Wild
(1)
Ralph Gyoery
(1)
Reza Reyhanitabar
(1)
Shekh Faisal Abdul-Latip
(1)
Thomas Hardjono
(4)
Willy Susilo
(2)
Xian-Mo Zhang
(7)
Yuliang Zheng
(10)
Yvo Desmedt
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to