1994-2004 REFEREED PUBLICATIONS
1994 PUBLICATIONS
JOURNAL ARTICLES
- Claude Carlet, Jennifer Seberry and Xian-Mo Zhang
Comments on "Generating and
Counting Binary Bent Sequences",
IEEE Trans Inf Thyeory 40, (1994), 600-600.
- W. de Launey and Jennifer Seberry, The strong Kronecker
product, J. Combinatorial Theory, Ser. A, 66,
(1994), 192-213.
- Genet M'gan Edmonson, Jennifer Seberry and Malcolm
Anderson, On the existence of Turyn sequences of length less
than 43, Mathematics of Computation, 62,
(1994), 351-362.
- Marc Gysin and Jennifer Seberry, New results with near-
Yang sequences, Utilitas Math., 45, (1994), 85-89.
- Christos Koukouvinos, Stratis Kounias, Jennifer Seberry,
C. H. Yang, Joel Yang, Multiplication of sequences with zero
autocorrelation, Australas J. Combin., 10,
(1994), 5-15.
- Christos Koukouvinos, Stratis Kounias, Jennifer Seberry,
C. H. Yang, Joel Yang, On sequences with zero autocorrelations,
Designs, Codes and Cryptography, 4, (1994), 327-340.
- Thomas Kunkle and Jennifer Seberry, A few more small defining
sets for SBIBD(4t-1, 2t-1, t-1), Bull.
Inst. Comb. and Appl., 12, (1994), 61-64.
- Dinesh Sarvate and Jennifer Seberry, A note on small defining
sets for some SBIBD(4t-1, 2t-1, t-1), Bull.
Inst. Comb. and Appl., 10, (1994), 26-32.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Improving the strict avalanche
characteristics of cryptographic
functions, Information Processing Letters, 50,
(1994), 37-41.
- Jennifer Seberry and Xian-Mo Zhang,
Constructions of bent
functions from two known bent functions, Australas. J. Comb.,
9, (1994), 21-35.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Cryptographic boolean functions
via group Hadamard matrices ,
Australas. J. Combin., 10, (1994), 131-145.
REFEREED CONFERENCE PROCEEDINGS
- Thomas Hardjono and Jennifer Seberry, Authentication via
multi-service tickets in the Kuperee server, 1994 European
Symposium on Computer Security (ESORICS'94), ed. D.Gollmann,
875, Lecture Notes in Computer Science, Springer-Verlag,
Berlin, 1994, pp 143-160.
- Azad Jiwa, Jennifer Seberry and Yuliang Zheng,
Beacon based authentication, 1994 European Symposium on
Computer Security (ESORICS'94), ed. D.Gollmann,
875, Lecture Notes in Computer Science,
Springer-Verlag, Berlin, 1994, pp 125-142.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
On construction and non-linearity of correlation immune
functions, ed. Tor Helleseth, Eurocrypt'93 - Advances
in Cryptography, 765, Lecture Notes in Computer
Science, Springer-Verlag, (1994), 181-199.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Nonlinearity and propagation characteristics of boolean
functions, ed. D.R.Stinson, Crypto'93 - Advances in
Cryptography, 773, Lecture Notes in Computer
Science, Springer-Verlag, Berlin, (1994), 49-60.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Highly nonlinear balanced boolean functions and their
Propagation characteristics ed. D.R.Stinson, Crypto'93 -
Advances in Cryptography, 773, Lecture Notes in
Computer Science, Springer-Verlag, Berlin, 1994, 145-155.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Pitfalls in designing
substitution boxes, ed. Y. Desmedt,
Crypto'94 - Advances in Cryptography, 839,
Lecture Notes in Computer Science, Springer-Verlag,
(1994), 383-396.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Structures of highly nonlinear cryptographic functions,
Proceedings of the 1994 International Symposium on
Information Theory and its Application (ISITA'94),
The Institute of Engineers, Australia, 1 (1994),
229-234.
-
J. Seberry, Xian-Mo Zhan and Y. Zheng,
New Construction of
Correction Immune Functions ,
In Advances in Cryptography - EUROCRYPT'93, Lecture Notes in Computer
Science, 765, Springer - Verlag, Berlin, Heidelbeg, New York, 1994,
181-199.
REFEREED CONFERENCE PRESENTATIONS
- Thomas Hardjono, Yuliang Zheng and Jennifer Seberry,
Anonymous verifiable databases: towards a practical solution,
Tenth International Information Processing Conference
-Security'94, (IFIP)-SEC'94, Curacao, Netherlands
Antilles, 23-27 May 1994.
- Thomas Hardjono and Jennifer Seberry, Authentication via
multi-service tickets in the Kuperee server, Proceedings of
1994 European Symposium on Computer Security (ESORICS'94)
Brighton UK, Nov, 1994.
- Thomas Hardjono, Yuliang Zheng and Jennifer Seberry,
Kuperee: An approach to Kerberos-type authentication using public
keys, Proceedings of the ULPAA'94 International Conference on
Upper Layer Protocols, Architectures and Applications,
Eds. M. Medina and N. Borenstein, June, 1994, Barcelona,
Spain, pp.61-72.
- Azad Jiwa, Jennifer Seberry and Yuliang Zheng,
Network Security featuring beacon based authentication,
Fifth Australasian Conference on Information Systems
(ACIS'94), Melbourne, September 1994.
- Azad Jiwa, Jennifer Seberry and Yuliang Zheng, Beacon based
authentication, Proceedings of 1994 European Symposium on
Computer Security (ESORICS'94) Brighton UK, Nov, 1994.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
GAC -- the criterion for global avalanche characteristics of
cryptographic functions, The Second ACM Conference on
Computer and Communications Security, Fairfax, Nov, 1994.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Relationships among nonlinearity characteristics of quadratic
substitution boxes, Eurocrypto'94 - Advances in
Cryptography, Conference held in Perugia, Italy, May, 1994.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Pitfalls in designing substitution boxes,
Advances in Cryptography, Conference held in Santa
Barbara, USA, August, 1994.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Structures of highly nonlinear cryptographic functions,
1994 International Symposium on Information Theory and its
Applications, (ISITA'94), Sydney, Nov, 1994.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Structures of cryptographic functions with strong avalanche
characteristics, Advances in Cryptography, ASIACRYPT'94,
Conference held in Wollongong, Nov 28 - Dec 1, 1994.
1995 PUBLICATIONS
JOURNAL ARTICLES
-
Diane Donovan, Joan Cooper, D.J.Nott and Jennifer Seberry,
Latin squares: critical sets and their lower bounds,
Ars Combinatoria, 39, (1995), 33-48.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Nonlinearity and
Propagation Characteristics of Balanced Functions
, Information and Computation, Vol. 119, No. 1 (1995), 1-13.
-
Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
The relationship between propagation characteristic
and nonlinearity of cryptographic functions,
Journal of Universal Computer Science, 1, No. 2 (1995), 136-150.
-
Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
GAC-The Criterion for Global Avalanche characteristics of
cryptographic functions,
Journal for Universal Computer Science, Vol. 1, No. 5, (1995), 316-333.
REFEREED CONFERENCE PROCEEDINGS
-
Thomas Hardjono and Jennifer Seberry, Information
security issues in mobile computing, Information Security
- the Next Decade,
eds Jan H P Eloff and Sebastiaan H von Solms,
Eleventh International
Information Processing Conference -Security'95, (IFIP)-SEC'95,
Capetown, South Africa, Chapman and Hall, London-Melbourne, (1995),
143-151.
-
Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Structures of cryptographic functions with strong avalanche
characteristics, Advances in Cryptography, ASIACRYPT'94,
eds Josef Pieprzyk and Reihaneh Safavi-Naini, Vol 917,
Lecture Notes in Computer Science, Springer-Verlag, (1995), 119-132.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
Relationship among Nonlinearity Criteria
In Advances in Cryptography - EUROCRYPT'94, Lecture Notes in
Computer Science, Vol 950, Springer-Verlag, Berlin, Heidelberg,
New York, (1995), 376-388.
- Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng,
On Nonlinear Resilient Functions
In Advances in Cryptography - EUROCRYPTO'95, Lecture Notes in Computer
Science, 921, Springer - Verlag, Berlin, Heidelbeg, New York, 1995,
274-288.
REFEREED CONFERENCE PRESENTATIONS
-
Marc Gysin and Jennifer Seberry, New normal sequences
of length 25, ACSC'95 - Australian Computer Science Conference,
Glenelg, January, 1995.
-
Thomas Hardjono and Jennifer Seberry,
Information security in mobile databases, Sixth Australasian
Database Conference, Glenelg, South Australia, February, 1995.
CONFERENCE PRESENTATIONS
-
Ghulam Chaudhry and Jennifer Seberry, Critical sets in Room squares,
Conference on Combinatorial Mathematics and Combinatorial Computing,
Deakin, July, 1995.
-
Marc Gysin and Jennifer Seberry,
Multiplication of ternary complementary pairs,
Conference on Combinatorial Mathematics and Combinatorial
Computing, Deakin, July, 1995.
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
On the Smith normal form of weighing matrices,
CANT'95 - The Third Computational Algebra and Number Theory
Conference, Macquarie University, April, 1995.
-
Jennifer Seberry,
On Bose's method of mixed differences and Bhaskar Rao designs,
presented at R. C. Bose Memorial Conference on Statistical Design
and Related Combinatorics, Colorado Springs, 7-11 June, 1995.
-
Jennifer Seberry and Xian-mo Zhang,
Hadamard matrices, bent functions and cryptography,
Conference on Combinatorial Mathematics and Combinatorial Computing,
Deakin, July, 1995,
1996 PUBLICATIONS
BOOK (Edited)
-
Pieprzyk J and Seberry J (Eds), Advances in Cryptology ACISP'96,
Vol 1172, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1996.
CHAPTERS IN BOOKS
-
Seberry J and Craigen R,
Orthogonal Designs, in The CRC Handbook of Combinatorial
Designs, (eds Charles J Colbourn and Jeffrey H Dinitz), CRC Press, Boca Raton,
Fla., (1996), 400-405.
JOURNAL ARTICLES
-
Arasu K T and Seberry J,
`Circulant weighing matrices', Journal of Combinatorial Designs, 4 (1996),
439-447.
-
Hardjono T and Seberry J, Security issues in mobile computing networks,
IEICE Transactions on Fundamentals of Electronics, Communications and
Computer Sciences, E79-A, July 1996, 1021-1026.
-
Jiwa A, Hardjono T and Seberry J,
`Beacons for authentication in distributed systems',
J Computer Security, 4, (1996) 81-96.
-
Koukouvinos C, Mitrouli M, Seberry J and Karabelas P,
`On sufficient conditions for some orthogonal
designs and sequences with zero autocorrelation function',
Australas J. Combin., 13, (1996), 197-216.
-
Koukouvinos C, and Seberry J,
`New weighing matrices',
Synkhya, Ser. B, 58 (1996), 221-230.
-
Koukouvinos C and Seberry J,
`Necessary and sufficient conditions for some two variable
orthogonal designs in order 36' Congressus Numerantium, 114 (1996),
129-140.
-
Koukouvinos C, Mitrouli M and Seberry J,
`On the Smith normal form of D-optimal designs',
J. Linear and Multilinear Algebra,, 247 (1996) 277-295.
-
Gysin M and Seberry J,
`Multiplication of ternary complementary pairs',
Australasian J Combinatorics, 14 (1996), 165-180.
-
Mu Y, Seberry J and Zheng Y, `Shared cryptographic bits via quantized
quandrature phase amplitudes of light', Optics Communications,
123, (1996) 344-352.
REFEREED CONFERENCE PAPERS
-
Chaudhry, G R, and Seberry, J, `Minimal and Maximal Critical Sets in
Room Squares', Proceedings of 7th Australasian Workshop on Combinatorial Algorithms
(AWOCA'96), Magnetic Island, Australia, July 15-19, (1996), 75-86.
-
Chaudhry G R, and Seberry J, `Secret Sharing schemes based on Room
squares',Proceedings of DMTCS'96, December , 1996, Auckland,
New Zealand, Combinatorics, Complexity and Logic,
Springer-Verlag Singapore 1996, 158-167.
-
Hardjono T and Seberry J,
`Replication the Kuperee authentication server for increased security
and reliability', ACISP'96, LNCS 1172, Springer-Verlag, Berlin, 1996
14-26.
- Hardjono T and Seberry J,
`Design and security issues in strongbox systems for the internet,
Proceedings of the 1996 International Conference on Cryptology and
Information Security, Kaohsiung, Tiawan, 19-21 December, 1996,
99-103.
-
Hardjono T and Seberry J, Strong boxes for electronic commerce,
Proceedings of the 1996 USENIX Workshop on Electronic Commerce.
Oakland, California, USA, November, 1996 135-145.
1997 PUBLICATIONS
JOURNAL ARTICLES
-
Chaudhry G R and Seberry J,`Minimal Critical Set of a
Room Square of order 7', Bull. Inst. of Combin. and its Applications
20(1997), 90.
-
Gysin M and Seberry J,
`On $4-NPAF(1,2w)$ sequences',Bull. Inst. of Combin. and its Applications
20(1997), 6-12.
-
Golomb S, Harris T and Seberry J,
"Albert Leon Whiteman (1915-1995)",
Notices of the American Mathematical Society, 44, 2 (1997) 217-219.
-
Hossein G, Pieprzyk J, Chaudhry G and Seberry J,
"How to prevent cheating in Pinch's scheme",
Electronics letters, 33, 17 (1997) pp. 1453-54.
-
Koukouvinos C, Mitrouli M and Seberry J,
`On the Smith normal form of weighing matrices',
Bulletin Inst. Comb. and Applic., 19 (1997) 57-69.
-
Seberry J , `Firewalls: Defending information technology', Security
Australia, 17(2) 1997, 28-29 and 38.
REFEREED CONFERENCE PAPERS
-
Horton J and Seberry J,
`Computer Viruses: an Introduction',
Proceedings of the Twentieth Australasian Computer Science Conference (ACSC'97), Feb. 1997, - Aust. Computer Science
Communications, Vol. 19, No. 1 (ed. M. Patel), (1997), 122-131.
-
Hardjono T and Seberry J.
Secure Access to Electronic Strongboxes in Electronic Commerce.
Proc. of 2nd International Small Systems Security Conference (IFIP WG 11.2),
Copenhagen, Denmark, May 1997, pp. 1-13.
-
Peddada S V M Raju, Seberry J and Chaudhry G R,
`Near Critical Sets in Latin Squares with Maximum Numbers of Subsquares',
International Conference on Combinatorics, Information Theory
and Statistics , University of Southern Maine, Portland, Maine, USA, July 18-20, 1997.
1998 PUBLICATIONS
BOOK CHAPTERS
-
Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R,
Crypto and Applications I,
in The CRC Handbook of Algorithms and Theory of Computation,
ed Mikhail J Atallah, CRC Press, Boca Raton, Fla, 1999, 40.1--40.30.
-
Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R,
Crypto and Applications II,
in The CRC Handbook of Algorithms and Theory of Computation,
ed Mikhail J Atallah, CRC Press, Boca Raton, Fla, 1999, 41.1--41.30.
JOURNAL ARTICLES
-
Arasu K T and Seberry J,
"On circulant weighing matrices",
Australas. Journal of Combinatorics,
17, (1998), 21-37.
-
Chaudhry G and Seberry, Jennifer
"On the (10,5,$\lambda$)-family of Bhaskar Rao designs,"
Bull. Inst. Comb. and Its Applications,
23, (1998), 83-87.
-
Ghulam Chaudhry, Hossein Ghodosi and Jennifer Seberry,
"Perfect secret sharing schemes from
Room squares",
JCMCC, 28, (1998), 55-61.
-
Gysin M and Seberry J,
"On new families of supplementary difference sets over rings with short orbits",
JCMCC, 28, (1998), 161-186.
-
Marc Gysin and Jennifer Seberry,
An experimental search and new combinatorial designs via a
generalisation of cyclotomy,
JCMCC, 27, (1998), 143-160.
-
Koukouvinos C, Mitrouli M and Seberry J,
"Some necessary and sufficient conditions for
two variable orthogonal designs in order 44,"
JCMCC, 28, (1998), 267-287.
-
Jennifer Seberry,
On Bose's method of mixed differences and Bhaskar Rao designs,
J. Statist. Plan. and Inf., 73, (1998), 215-224.
Presented at R. C. Bose Memorial Conference on Statistical Design
and Related Combinatorics, Colorado Springs, 7-11 June, 1995.
-
Dinesh Sarvate and Jennifer Seberry,
Group divisible designs, GBRDSDS and generalized weighing matrices,
Utilitas Math., 54, (1998), 157-174.
-
Jennifer Seberry,
Infinite families of generalized Bhaskar Rao designs,
Special Issue of JCISS in honor of Professor J.N. Srivastava,
Journal of Combinatorics, Information and Statistics,
23, Nos 1-4, (1998), 455-464.
REFEREED CONFERENCE PAPERS
-
Horton J and Seberry J,
"Covert distributed
computing using Java through Web spoofing" is © Springer-Verlag.
Information Security and Privacy, ACISP '98.,
Lecture Notes in Computer Science, Vol 1438, (1998), 48-57.
Please see the
Springer-Verlag LNCS series Homepage for more information.
-
Burmester M, Desmedt Y and Seberry J,
"Equitable Key Escrow with Limited
Time Span
(or, How to Enforce Time Expiration Cryptographically)
" is © Springer-Verlag.
eds K. Ohta and D. Pei,
ASIACRYPT '98., LNCS, Vol, 1514, (1998), 380--391.
Please see the
Springer-Verlag LNCS series Homepage for more information.
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
Numerical algorithms for the computation of the Smith normal form of
integral matrices,
Congressus Num,, 133 (1998), 127-162.
1999 PUBLICATIONS
BOOK (Edited)
-
Pieprzyk J, Safavi-Naini R, and Seberry J (Eds), Advances in Cryptology ACISP'99,
Vol 1587, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1999.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302-9743, ISBN 3-540-65756-8
REFEREED JOURNAL ARTICLES
-
Lakoa Fitina, Jennifer Seberry and Dinesh Sarvate,
On $F$-squares and their critical sets,
Australasian J Combin.,
19, (1999), 209-230.
ISSN1034-4942.
-
L F Fitina, Jennifer Seberry and Ghulam R Chaudhry,
Back circulant Latin squares and the influence
of a set, Australasian J Combin.,
20, (1999), 163-180.
ISSN1034-4942.
-
Christos Koukouvinos and Jennifer Seberry,
New weighing matrices constructed using two
sequences with zero autocorrelation function - a review,
J. Stat. Planning and Inf.,
81 (1999), 153-182.
ISSN 0378-3758/99.
-
Jeffrey Horton and Jennifer Seberry,
When the necessary conditions are not sufficient: sequences with zero
autocorrelation function,
Bull ICA,,
27, (1999), 51-61.
ISSN 1183-1278.
REFEREED CONFERENCE PAPERS
-
Jeffrey Horton and Jennifer Seberry,
"Companion viruses and the Macintosh:
threats and countermeasures,
" is © Springer-Verlag.
Information Security and Privacy, ACISP '99.,
ACISP99, Lecture Notes In Computer Science, Vol 1587,
Springer-Verlag, Berlin-Heidelberg-New York, 1999, 202-212.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302-9743, ISBN 3-540-65756-8.
-
Marc Gysin and Jennifer Seberry,
"Generalised cycling attacks on RSA and strong RSA primes,
Information Security and Privacy, ACISP '99.,
ACISP99, Lecture Notes In Computer Science, Vol 1587,
Springer-Verlag, Berlin-Heidelberg-New York, 1999, 149-163.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302-9743, ISBN 3-540-65756-8
-
Chengxin Qu, Jennifer Seberry and Josef Pieprzyk,
"On the symmetric property of homogeneous boolean functions,
Information Security and Privacy, ACISP '99.,
ACISP, Lecture Notes In Computer Science, Vol 1587,
Springer-Verlag, Berlin-Heidelberg-New York, 1999, 26-35.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302-9743, ISBN 3-540-65756-8
2000 PUBLICATIONS
BOOK (Edited)
-
Josef Pieprzyk,
Eiji Okamoto and
Jennifer Seberry, (Eds),
Information Security, ISW'2000, Lecture Notes in Computer Science,
Vol. 1975,
Springer-Verlag, Berlin, 2000.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302 9743 ISBN 3 540 41416 9
REFEREED JOURNAL ARTICLES
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
Growth in Gaussian elimination for weighing matrices $W(n,n-1)$,
Linear and Multilinear Algebra, 306 (2000), 189-202.
-
Ghulam Chaudhry and Jennifer Seberry,
On the influence of entries in critical sets of Room squares,
Bull ICA, 28 (2000), 67-74.
ISSN 1183-1278.
-
C. Koukouvinos and Jennifer Seberry,
New orthogonal designs and sequences with
two and three variables in order 28,
Ars Combinatoria, 54, (2000), 97-108.
ISSN 0381 7032.
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
Bounds on the maximum determinant for $(1,-1)$ matrices.
Bull. ICA, 29, (2000), 39-48.
ISSN 1183-1278.
-
Jennifer Seberry and Anne Penfold Street,
Strongbox secured secret sharing schemes,
Utilitas Mathematica, 57, (2000), 147--163.
ISSN 0315 3681.
-
Chengxin Qu, Jennifer Seberry and Josef Pieprzyk,
Homogeneous bent functions,
Discrete Applied Mathematics ,
Volume 102, Numbers 1-2, (2000) 133-139.
ISSN 0166-218X.
-
S. Georgiou,
C. Koukouvinos,
M. Mitrouli and
Jennifer Seberry,
Necessary and sufficient conditions for
two variable orthogonal designs in order 44: Addendum,
JCMCC,,
34 (2000), 59-64.
-
Lakoa Fitina and Jennifer Seberry,
On the spectrum of an F-square,
Australas. J. Comb. 22 (2000) 81-90.
-
Tianbing Xia, Jennifer Seberry, Josef Pieprzyk,
Construction of cubic homogeneous Boolean bent functions,
Australas. J. Comb. 22 (2000) 233-246.
-
W. Susilo, R. Safavi-Naini, M. Gysin, and J. Seberry,
An almost optimal fail-stop signature scheme,
The Computer Journal, 43, 5, (2000), 430-437.
REFEREED CONFERENCE PAPERS
-
Jarosaw Pastuszak, Dariusz Michaek, Josef Pieprzyk, Jennifer Seberry,
Identification of bad signatures in
batches,
Workshop on Practice and Theory in Public Key Cryptosystems, PKC2000,,
Melbourne, Victoria, Australia.
Lecture Notes in Computer Science,
Vol. 1751, H. Imai and Y. Zheng (Eds),
Springer-Verlag, Berlin, 2000, pp. 28--45
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302 9743 ISBN 3 540 66967 1
-
Chengxin Qu, Jennifer Seberry and Josef Pieprzyk,
Relationships between boolean functions and symmetric groups,
International Computer
Symposium 2000, ISC2000, Chiayi, Taiwan, December 2000, 1-7.
-
Jaroslaw Pastuszak,
Dariusz Michalek,
Josef Pieprzyk,
Jennifer Seberry,
Codes identifying bad signatures in batches,
INDOCRYPT'2000, Lecture Notes in Computer Science,
Vol. 1977,
B. Roy and C Ding,
Springer-Verlag, Berlin, 2000, 143-154.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302 9743 ISBN 3 540 41452 5
2001 PUBLICATIONS
REFEREED JOURNAL ARTICLES
-
Roderick J Fletcher and Jennifer Seberry,
New D-optimal designs of order 110,
AJC 23 (2001) 49-52.
-
Roderick J Fletcher, Marc Gysin and Jennifer Seberry,
Application of the discrete Fourier
transform to the search for
generalised Legendre pairs and Hadamard matrices,
AJC 23 (2001) 75-86.
-
Marc Gysin and Jennifer Seberry,
On ternary complementary pairs,
197-209.
AJC 23 (2001) 153-170.
-
Marc Gysin and Jennifer Seberry,
On infinite families of sequences with one and
two valued autocorrelation and two valued crosscorrelation function,
AJC 23 (2001) 197-209.
-
S. Georgiou, C. Koukouvinos and Jennifer Seberry,
On circulant best matrices and their applications,
Linear and Multilinear Algebra,
48 (2001), 263-274.
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
Values of minors of $(1,-1)$ incidence matrices
of SBIBDs
and their application to the growth problem,
Designs, Codes, Cryptography,
23 (2001), 267-281.
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
Values of minors of an infinite family of $D$-optimal designs
and their application to the growth problem,
SIAM Journal on Matrix Analysis and Applications.
23, No. 1, (2001), 1-14.
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
An algorithm to find formulae
and values of minors for Hadamard matrices,
Linear Algebra and its Applications,
330 (2001), 129-147.
-
Christos Koukouvinos and Jennifer Seberry,
Infinite families of orthogonal designs : I,
Bull. ICA, 33 (2001) 35-41.
ISSN 1183-1278.
-
Christos Koukouvinos and Jennifer Seberry,
Short amicable sets and Kharaghani type orthogonal designs,
Bull. Austral. Math. Soc. , 64 (2001) 495-504.
-
C. Koukouvinos, E. Lappas, M. Mitrouli and Jennifer Seberry,
On the complete pivoting conjecture for Hadamard matrices of
small orders, Journal of Research and Practice in Information
Technology , Vol 33, (2001) 294-296.
-
S. Georgiou, C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
A new algorithm for computer searches for orthogonal designs,
JCMCC, 39 (2001), 49-63.
REFEREED CONFERENCE PAPERS
-
M Burmester, Y Desmedt and Jennifer Seberry,
Equitability in retroactive key confiscation versus proactive key
escrow,
PKC'2001,
ed. Kwangjo Kim,
Public Key Cryptography, 4th International
Workshop on Practice and Theory in Public Key Cryptography, PKC2001
Cheju Is, Korea, February, 2001, Vol 1992,
Lecture Notes in Computer Science,
Springer-Verlag, Berlin, 2001, 277-286.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN ISBN
-
Beomsik Song, Huaxiong Wang and Jennifer Seberry,
A new cryptanalysis method using the
distribution
characteristics of substitution distance,
Information Security and Cryptology-
ICISC'2001, 6-7 December 2001, Seoul,Korea, 2001.
Lecture Notes in Computer Science, Vol 2288,
Springer-Verlag, Berlin, 2001, 277-286.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN ISBN 3-540-43319-8.
2002 PUBLICATIONS
EDITED BOOK
- Lynn Batten and Jennifer Seberry, (Eds),
Australasian Conference on Information Security and Privacy,
ACISP'02,
Lecture Notes in Computer Science,
Vol. 2384,
Springer-Verlag, Berlin, 2002.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302-9743 ISBN 3-540-43861-0
REFEREED BOOK CHAPTER
- J.R.Seberry, B.J.Wysocki, and T.A.Wysocki,
On a use of Golay sequences for asynchronous DS CDMA applications,
in T.A.Wysocki, M.Darnell and B.Honary,
Advanced Digital Signal Processing for Communication Systems,
Kluwer Academic Publishers, Boston/Dordrecht/London, 2002, pp.182-196.
-
David Soldera, Jennifer Seberry and Chengxin Qu,
The analysis of the
Zheng-Seberry algorithm, in Australasian
Conference on Information Security and Privacy, ACISP'02, Lynn Batten and Jennifer Seberry, (Eds), Lecture Notes
in Computer Science, Vol. 2384, Springer-Verlag, Berlin, 2002. 159-168.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
-
S. Georgiou, C. Koukouvinos and Jennifer Seberry,
Hadamard matrices, orthogonal designs and construction
algorithms, Designs 2002: Further Combinatorial and
Constructive Design Theory, ed. W.D.Wallis, Kluwer
Academic Publishers, Norwell, Massachusetts, 2002, 133-205.
REFEREED JOURNAL ARTICLES
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
An infinite family of Hadamard
matrices with fourth last pivot $\frac{n}{2}$,
Linear and Multilinear Algebra,
50, (2002), 167-173.
-
Christos Koukouvinos and Jennifer Seberry,
Orthogonal designs constructed
from circulant weighing matrices,
International Journal of Applied Mathematics,
8 (2002), 255-265.
-
S. Georgiou, Christos Koukouvinos and Jennifer Seberry,
Short amicable sets,
International Journal of Applied Mathematics,
9 (2002), 161-187.
-
Jeffrey Horton, Christos Koukouvinos and Jennifer Seberry,
A search for Hadamard matrices constructed from Williamson matrices,
Bull. ICA, 35, (2002) 75-88. ISSN 1183-1278.
-
S. Georgiou, C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
Necessary and sufficient conditions for three and four variable
orthogonal designs in order 36,
JSPI, 106 (2002), 329-352.
-
Ghulam R Chaudhry, Malcolm Greig and Jennifer Seberry,
On the ($v,5, \lambda$)-family of
Bhaskar Rao
designs, JSPI, 106 (2002) 303-327.
-
S. Georgiou, C. Koukouvinos and Jennifer Seberry,
On full orthogonal designs in order 56,
Ars Combin. 65 (2002), 79-89.
- Jennifer Seberry and Ken Finlayson, New infinite families of
skew-Hadamard matrices, JCMCC, 43 (2002), 119-121.
REFEREED CONFERENCE PAPERS
-
J. Seberry, B.J.Wysocki and T.A.Wysocki,
Golay sequences for DS CDMA Applications,
DSPCS'02, (Sixth International Symposium on DSP for Communications
Systems), Manly, 28-31 January, 2002,
TITR, Wollongong, 103-108. ISBN 0 86418 791 2
2003 PUBLICATIONS
BOOK
- J. Pieprzyk, T. Hardjono and J. Seberry,
Fundamentals of Computer Security,
Springer-Verlag, Berlin, 2003.
ISBN 3-540-43101-2
EDITED BOOK
- Rei Safavi-Naini and Jennifer Seberry, (Eds),
Australasian Conference on Information Security and Privacy,
ACISP'03,
Lecture Notes in Computer Science,
Vol. 2727,
Springer-Verlag, Berlin, 2003.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302-9743 ISBN 3-540-40515-1
REFEREED BOOK CHAPTER
-
Beomsik Song and Jennifer Seberry,
Further observations on the structure of the AES algorithm,
FSE,
Lecture Notes in Computer Science,
ed Thomas Johansson, Vol. ,
Springer-Verlag, Berlin, 2003, p223-233.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
ISSN 0302-9743 ISBN 3-540-20449-0.
-
J. Wu, T. Xia and J. Seberry,
Construction of Highly non-linear cubic
homogeneous Boolean functions on GF(2)^{2n+1},
Proceedings of the
International Conference on Security and Management (SAM'03), Vol. I
(2003), pp. 241-247.
-
Xiang Li and Jennifer Seberry,
Forensic Computing,
INDOCRYPT'03,
Lecture Notes in Computer Science,
Vol. 2904,
Springer-Verlag, Berlin, 2003, pp 18-35.
" is © Springer-Verlag.
Please see the
Springer-Verlag LNCS series Homepage for more information.
REFEREED JOURNAL ARTICLES
-
C. Koukouvinos, M. Mitrouli and Jennifer Seberry,
Values of minors of an infinite family of $D$-optimal designs
and their application to the growth problem: II,
SIAM Journal on Matrix Analysis and Applications.
24 (2003), 715-727.
-
Tianbing Xia, Mingyuan Xia and Jennifer Seberry,
Regular Hadamard matrix, maximum excess and SBIBD,
AJC, 27(2003), 263-275.
-
H. Evangelaras, C. Koukouvinos and Jennifer Seberry,
Applications of Hadamard matrices
Journal of Telecommunications and Information Technology,
2 (2003), 2-10.
-
Chris Charnes and Jennifer Seberry,
Weighing matrices and self-orthogonal quaternary codes,
JCMCC, 44 (2003) 85-95.
-
S. Georgiou, C. Koukouvinos and Jennifer Seberry,
On full orthogonal designs in order 72,
JCMCC, 44 (2003), 11-21.
-
Christos Koukouvinos and Jennifer Seberry,
Othogonal designs of Kharaghani type: I,
Ars Combinatoria.,
67 (2003), 89-96.
-
S. Georgiou, C. Koukouvinos and Jennifer Seberry,
Some results on Kharaghani
type orthogonal designs, Utilitas Mathematica, 63 (2003),
43-52.
-
C. Koukouvinos, E. Lappas, M. Mitrouli and Jennifer Seberry,
An algorithm
to find formulae and values of minors for Hadamard matrices: II
Linear Algebra and Applications, 371 (2003), 111-124.
-
Jennifer Seberry, T. Xia, C. Koukouvinos and M. Mitrouli,
The maximal determinant and subdeterminants of $\pm 1$ matrices,
LAA, 373 (2003), 297-310.
-
S. Georgiou, C. Koukouvinos and Jennifer Seberry,
Some results on self-orthogonal
and self-dual codes,
Ars Combinatoria , 68 (2003), 97-104.
-
Jennifer Seberry, Beata J. Wysocki and Tadeusz A. Wysocki
Williamson-Hadamard Spreading Sequences for DS-CDMA Applications,
Special Issue on "Coding and Its
Applications in CDMA Wireless Systems", Journal of Wireless
Communications and Mobile Computing. 3 (2003), 597-607.
-
Gennian Ge, Malcolm Greig and Jennifer Seberry,
Generalized Bhaskar Rao designs with block size 4 signed over
elementary abelian groups,
JCMCC, 46 (2003), 3-45.
-
Ken Finlayson and Jennifer Seberry,
New infinite families of skew-Hadamard matrices,
JCMCC , 43 (2003) 119-121.
CONFERENCE PAPERS PUBLISHED ELECTRONICALLY
-
R. SahaRay and J. Seberry,
Critical sets in orthogonal arrays,
Electronic Notes in Discrete Mathematics, 15 (2003).
-
Y. Wang, J. Seberry, R. Safavi-Naini and R. Fuji-Hara,
A note on the exposure property of SBIBD,
Electronic Notes in Discrete Mathematics, 15 (2003).
REFEREED CONFERENCE PAPERS IN PRINT
-
Y. Wang, J.Seberry, B.J.Wysocki, T.A.Wysocki, W.Susilo, T.Xia, Y.Zhao,
and L.C.Tran,
Combinatorial constructions of 3-Secure and 4-secure codes,,
DSPCS'03/WITSP'03, Coolangatta, Gold Coast, 8-11 December 2003, pp. 549-552
-
Jianyong Huang, Jennifer Seberry and Willy Susilo,
Secure Computations on
Handheld devices with the help of an untrusted server,
7th World
Multiconference on Systemics, Cybernetics and Informatics
(SCI 2003) eds. N. Callaos, M. Morgenstern, J Zhang, O Castillo, E E Doberkat,
Conference held Orlando, USA, July 27-30, 2003,
International Institute of Informatics and Systemics, pp507-512.
ISBN 980-6560-01-9.
-
Jianyong Huang, Jennifer Seberry and Willy Susilo,
Design and implementation of personal firewalls
for handheld devices,,
7th World
Multiconference on Systemics, Cybernetics and Informatics
(SCI 2003) eds. N. Callaos, M. Morgenstern, J Zhang, O Castillo, E E Doberkat,
Conference held Orlando, USA, July 27-30, 2003,
International Institute of Informatics and Systemics, pp 458-463.
ISBN 980-6560-01-9.
-
Jianyong Huang, Jennifer Seberry and Willy Susilo,
On using fast exponentiation algorithm in PDA (or: How secure is the discrete logarithm problem on PDA?),
The 2003 International Conference on Security and management (SAM'03),
2003 eds. H R Arabnia, Youngsong Mun, Selim Aissi,
Conference held Las Vegas, USA, June 23-26, 2003,
CSREA Press, pp 668-674.
ISBN 1-932415-18-1.
-
R Ang, J Seberry, B J Wysocki, T A Wysocki,
Application of nega-cyclic matrices to generate spreading sequences,
ISCTA'2003, Ambleside, UK, July 2003.
2004 PUBLICATIONS
REFEREED JOURNAL ARTICLES
-
Chung Le Tran, Jennifer Seberry, Yejing Wang, Beata J Wysocki, Tad A Wysocki, Tianbing Xia and Ying Zhao,
Two new complex orthogonal space-time block codes for 8 transmit
antennas,
Electronics Letters, 55, (2004) 55-56.
-
S. Georgiou, C. Koukouvinos and Jennifer Seberry,
Generalized orthogonal designs,
Ars Combinatoria , 71 (2004) 33-48.
REFEREED CONFERENCE PAPERS IN PRINT
-
Chung Le Tran, Jennifer Seberry, Beata J Wysocki, Tad A Wysocki, Tianbing Xia, Yejing Wang and Ying Zhao,
Complex orthogonal sequences from amicable Hadamard matrices,
IEEE VTC'2004-Spring, Milan, Italy, May 2004. CDROM.