Cryptographers' World
 

Jennifer Seberry


Author's Web Page Link

25 papers and 1 book in database with 824 citations StarStar

Editor of 2 conference proceedings books

H-number: 13

Books

 
1. Josef PieprzykThomas HardjonoJennifer SeberryFundamentals of Computer Security. Springer, 2003. ISBN 978-3-540-43101-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 101 times Red StarRed Star]


Conference Proceedings

 
1. Jennifer SeberryYuliang Zheng, editors, Advances in Cryptology - ASIACRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings. Springer, 1993. ISBN 3-540-57220-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Jennifer SeberryJosef Pieprzyk, editors, Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings. Springer, 1990. ISBN 3-540-53000-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. John H. Loxton,  David S. P. Khoo,  Gregory J. Bird,  Jennifer Seberry,  A Cubic RSA Code Equivalent to Factorization, Journal of Cryptology, Volume 5(2), pp. 139 - 150, Springer, 1992.

[Cited 25 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Jianyong Huang,  Jennifer Seberry,  Willy Susilo,  On the Internal Structure of Alpha-MAC, pp. 271 - 285, VIETCRYPT 2006.

[Electronic Edition][Cited 6 times ]

2. Dibyendu Chakrabarti,  Jennifer Seberry,  Combinatorial Structures for Design of Wireless Sensor Networks, pp. 365 - 374, ACNS 2006.

[Electronic Edition][Cited 1 times ]

3. Xiang Li,  Jennifer Seberry,  Forensic Computing, pp. 18 - 35, INDOCRYPT 2003.

[Electronic Edition][Cited 5 times ]

4. Beomsik Song,  Jennifer Seberry,  Further Observations on the Structure of the AES Algorithm, pp. 223 - 234, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

5. Yvo Desmedt,  Mike Burmester,  Jennifer Seberry,  Equitability in Retroactive Data Confiscation versus Proactive Key Escrow, pp. 277 - 286, PKC 2001.

[Electronic Edition][Cited 2 times ]

6. Jaroslaw Pastuszak,  Josef Pieprzyk,  Jennifer Seberry,  Codes Identifying Bad Signatures in Batches, pp. 143 - 154, INDOCRYPT 2000.

[Electronic Edition][Cited 2 times ]

7. Jaroslaw Pastuszak,  Dariusz Michatek,  Josef Pieprzyk,  Jennifer Seberry,  Identification of Bad Signatures in Batches, pp. 28 - 45, PKC 2000.

[Electronic Edition][Cited 27 times ]

8. Mike Burmester,  Yvo Desmedt,  Jennifer Seberry,  Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically), pp. 380 - 391, ASIACRYPT 1998.

[Electronic Edition][Cited 28 times ]

9. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract), pp. 119 - 132, ASIACRYPT 1994.

[Electronic Edition][Cited 11 times ]

10. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Pitfalls in Designing Substitution Boxes (Extended Abstract), pp. 383 - 396, CRYPTO 1994.

[Electronic Edition][Cited 13 times ]

11. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Relationships Among Nonlinear Criteria (Extended Abstract), pp. 376 - 388, EUROCRYPT 1994.

[Electronic Edition][No citation]

12. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract), pp. 49 - 60, CRYPTO 1993.

[Electronic Edition][No citation]

13. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract), pp. 181 - 199, EUROCRYPT 1993.

[Electronic Edition][Cited 104 times Red StarRed Star]

14. Yuliang Zheng,  Josef Pieprzyk,  Jennifer Seberry,  HAVAL - A One-Way Hashing Algorithm with Variable Length of Output, pp. 83 - 104, ASIACRYPT 1992.

[Electronic Edition][Cited 161 times Red StarRed Star]

15. Yvo Desmedt,  Jennifer Seberry,  Practical Proven Secure Authentication with Arbitration, pp. 27 - 32, ASIACRYPT 1992.

[Electronic Edition][Cited 2 times ]

16. Jennifer Seberry,  Xian-Mo Zhang,  Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion, pp. 145 - 155, ASIACRYPT 1992.

[Electronic Edition][Cited 43 times ]

17. Yuliang Zheng,  Jennifer Seberry,  Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract), pp. 292 - 304, CRYPTO 1992.

[Electronic Edition][Cited 52 times Red Star]

18. Lawrence Brown,  Matthew Kwan,  Josef Pieprzyk,  Jennifer Seberry,  Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI, pp. 36 - 50, ASIACRYPT 1991.

[Electronic Edition][Cited 73 times Red Star]

19. Lawrence Brown,  Jennifer Seberry,  Key Scheduling In Des Type Cryptosystems, pp. 221 - 228, ASIACRYPT 1990.

[Electronic Edition][Cited 21 times ]

20. Martin Anthony,  Keith M. Martin,  Jennifer Seberry,  Peter R. Wild,  Some Remarks on Authentication Systems, pp. 122 - 139, ASIACRYPT 1990.

[Electronic Edition][Cited 4 times ]

21. Lawrence Brown,  Josef Pieprzyk,  Jennifer Seberry,  LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications, pp. 229 - 236, ASIACRYPT 1990.

[Electronic Edition][Cited 115 times Red StarRed Star]

22. Lawrence Brown,  Jennifer Seberry,  On the Design of Permutation P in DES Type Cryptosystems, pp. 696 - 705, EUROCRYPT 1989.

[Electronic Edition][Cited 21 times ]

23. Ralph Gyoery,  Jennifer Seberry,  Electronic Funds Transfer Point of Sale in Australia, pp. 347 - 377, CRYPTO 1986.

[Electronic Edition][No citation]

24. David S. P. Khoo,  Gregory J. Bird,  Jennifer Seberry,  Encryption Exponent 3 and the Security of RSA, pp. 55 - 55, EUROCRYPT 1986.

[Electronic Edition][Cited 1 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...