Orthogonal design, quadratic forms and hadamard matrices AV Geramita Lecture notes in pure and applied mathematics 43, 1979 | 846* | 1979 |
Hadamard matrices, sequences, and block designs J Seberry, M Yamada | 487 | 1992 |
Fundamentals of computer security J Pieprzyk, T Hardjono, J Seberry Springer Science & Business Media, 2013 | 438 | 2013 |
Cryptography: an introduction to computer security J Seberry, J Pieprzyk Prentice-Hall, Inc., 1989 | 356 | 1989 |
HAVAL—a one-way hashing algorithm with variable length of output Y Zheng, J Pieprzyk, J Seberry Advances in Cryptology—AUSCRYPT'92: Workshop on the Theory and Application …, 1993 | 352 | 1993 |
LOKI—a cryptographic primitive for authentication and secrecy applications L Brown, J Pieprzyk, J Seberry Advances in Cryptology—AUSCRYPT'90: International Conference on Cryptology …, 1990 | 189 | 1990 |
On constructions and nonlinearity of correlation immune functions J Seberry, XM Zhang, Y Zheng Workshop on the Theory and Application of of Cryptographic Techniques, 181-199, 1993 | 173 | 1993 |
Nonlinearly balanced Boolean functions and their propagation characteristics J Seberry, XM Zhang, Y Zheng Annual International Cryptology Conference, 49-60, 1993 | 152 | 1993 |
Nonlinearity and propagation characteristics of balanced boolean functions J Seberry, XM Zhang, YL Zheng Information and Computation 119 (1), 1-13, 1995 | 148 | 1995 |
Hadamard matrices, Part IV of WD Wallis, Anne Penfold Street, and Jennifer Seberry Wallis JS Wallis Combinatorics: Room Squares, Sum-Free Sets and Hadamard Matrices. LNM …, 1972 | 131* | 1972 |
Improving resistance to differential cryptanalysis and the redesign of LOKI L Brown, M Kwan, J Pieprzyk, J Seberry Advances in Cryptology—ASIACRYPT'91: International Conference on the Theory …, 1993 | 128 | 1993 |
On some applications of Hadamard matrices J Seberry, B JWysocki, T AWysocki Metrika 62 (2), 221-239, 2005 | 127 | 2005 |
Systematic generation of cryptographically robust S-boxes J Seberry, XM Zhang, Y Zheng Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 104 | 1993 |
Identity-based proxy signature from pairings W Wu, Y Mu, W Susilo, J Seberry, X Huang Autonomic and Trusted Computing: 4th International Conference, ATC 2007 …, 2007 | 101 | 2007 |
The theory of quaternion orthogonal designs J Seberry, K Finlayson, SS Adams, TA Wysocki, T Xia, BJ Wysocki IEEE Transactions on Signal Processing 56 (1), 256-265, 2007 | 98 | 2007 |
Orthogonal designs J Seberry, R Craigen Handbook of Combinatorial Designs, 400-406, 1996 | 96* | 1996 |
Secret sharing schemes arising from Latin squares J Cooper, D Donovan, J Seberry | 95 | 1994 |
Immunizing public key cryptosystems against chosen ciphertext attacks Y Zheng, J Seberry IEEE journal on selected areas in communications 11 (5), 715-724, 1993 | 90 | 1993 |
Application of the discrete Fourier transform to the search for generalised Legendre pairs and Hadamard matrices RJ Fletcher, M Gysin, J Seberry | 85 | 2001 |
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext J Kim, W Susilo, MH Au, J Seberry IEEE Transactions on Information Forensics and Security 10 (3), 679-693, 2015 | 80 | 2015 |