Jennifer Seberry
Jennifer Seberry
Professor, Centre for Computer and Information Security Research, University of Wollongong
Verified email at - Homepage
Cited by
Cited by
Orthogonal design, quadratic forms and hadamard matrices
AV Geramita
Lecture notes in pure and applied mathematics 43, 1979
Hadamard matrices, sequences, and block designs
J Seberry, M Yamada
Fundamentals of computer security
J Pieprzyk, T Hardjono, J Seberry
Springer Science & Business Media, 2013
Cryptography: an introduction to computer security
J Seberry, J Pieprzyk
Prentice-Hall, Inc., 1989
HAVAL—a one-way hashing algorithm with variable length of output
Y Zheng, J Pieprzyk, J Seberry
Advances in Cryptology—AUSCRYPT'92: Workshop on the Theory and Application …, 1993
LOKI—a cryptographic primitive for authentication and secrecy applications
L Brown, J Pieprzyk, J Seberry
Advances in Cryptology—AUSCRYPT'90: International Conference on Cryptology …, 1990
On constructions and nonlinearity of correlation immune functions
J Seberry, XM Zhang, Y Zheng
Workshop on the Theory and Application of of Cryptographic Techniques, 181-199, 1993
Nonlinearly balanced Boolean functions and their propagation characteristics
J Seberry, XM Zhang, Y Zheng
Annual International Cryptology Conference, 49-60, 1993
Nonlinearity and propagation characteristics of balanced boolean functions
J Seberry, XM Zhang, YL Zheng
Information and Computation 119 (1), 1-13, 1995
Hadamard matrices, Part IV of WD Wallis, Anne Penfold Street, and Jennifer Seberry Wallis
JS Wallis
Combinatorics: Room Squares, Sum-Free Sets and Hadamard Matrices. LNM …, 1972
Improving resistance to differential cryptanalysis and the redesign of LOKI
L Brown, M Kwan, J Pieprzyk, J Seberry
Advances in Cryptology—ASIACRYPT'91: International Conference on the Theory …, 1993
On some applications of Hadamard matrices
J Seberry, B JWysocki, T AWysocki
Metrika 62 (2), 221-239, 2005
Systematic generation of cryptographically robust S-boxes
J Seberry, XM Zhang, Y Zheng
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
Identity-based proxy signature from pairings
W Wu, Y Mu, W Susilo, J Seberry, X Huang
Autonomic and Trusted Computing: 4th International Conference, ATC 2007 …, 2007
The theory of quaternion orthogonal designs
J Seberry, K Finlayson, SS Adams, TA Wysocki, T Xia, BJ Wysocki
IEEE Transactions on Signal Processing 56 (1), 256-265, 2007
Orthogonal designs
J Seberry, R Craigen
Handbook of Combinatorial Designs, 400-406, 1996
Secret sharing schemes arising from Latin squares
J Cooper, D Donovan, J Seberry
Immunizing public key cryptosystems against chosen ciphertext attacks
Y Zheng, J Seberry
IEEE journal on selected areas in communications 11 (5), 715-724, 1993
Application of the discrete Fourier transform to the search for generalised Legendre pairs and Hadamard matrices
RJ Fletcher, M Gysin, J Seberry
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
J Kim, W Susilo, MH Au, J Seberry
IEEE Transactions on Information Forensics and Security 10 (3), 679-693, 2015
The system can't perform the operation now. Try again later.
Articles 1–20