 | ftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-9.ps.Z, 19931130 Improving the Strict Avalanche Characteristics of Cryptographic Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-5.ps.Z, 19931130 On Constructions and Nonlinearity of Correlation Immune Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au November 2, |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-13.ps, 19931130 HAVAL | A One-Way Hashing Algorithm with Variable Length of Output 1 Yuliang Zheng Josef Pieprzyk Jennifer Seberry Centre for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2522, Australia E-mail: fyuliang, josef, jennieg@cs.uow.edu.au November 2, 1993 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-4.ps.Z, 19931130 Nonlinearity and Propagation Characteristics of Balanced Boolean Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: jennie,xianmo,yuliang@cs.uow.edu.au November 2, 1993 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-14.ps.Z, 19931130 Systematic Generation of Cryptographically Robust S-boxes Jennifer Seberry Xian-Mo Zhang Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au November 2, 1993 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-1.ps.Z, 19931130 Highly Nonlinear Balanced Boolean Functions Satisfying High Degree Propagation Criterion Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au Phone: +61 42 21 4327 Fax: +61 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-17.ps.Z, 19931130 Amending Leighton and Micali's Key Distribution Protocol Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA yuliang@cs.uow.edu.au November 2, 1993 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1992/tr-92-2.ps.Z, 19931208 Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks1 Yuliang Zheng Jennifer Seberry 2 Centre for Computer Security Research Department of Computer Science University of Wollongong Northfields Avenue, Wollongong, NSW 2522 AUSTRALIA E-mail: fyuliang,jennieg@cs.uow.edu.au 21 September |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-2.ps.Z, 19940203 Relationships Among Nonlinearity Criteria Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au February 3, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-4.ps.Z, 19940309 Pitfalls in Designing Substitution Boxes Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au March 8, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/YZheng-PhDThesis.ps.Z, 19940412 Principles for Designing Secure Block Ciphers and One-Way Hash Functions by Yuliang Zheng B.S., Computer Science, July 1982 Southeastern University, China M.E., Electrical and Computer Engineering, March 1988 Yokohama National University Submitted to The Division of Electrical and Computer Engineering |
 | ftp://ftp.cs.uow.edu.au/pub/papers/PARSE/tr2b.ps, 19940510 ______________________________________________________________________ Technical Report PARSE-TR-2b Definition of the PARSE Process Graph Notation, version 2 (PGN/2) Jonathan Gray 7 March 1994 reprinted with corrections, 22 March 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/sectalk.ps.Z, 19940513 Talking Securely Mark Arnold Anthony Boyd Susan Dalton Flora Lo Adam Millard Shalini Shah November 1993 Revised February 94 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-6.ps.Z, 19940513 Submission for Designs, Codes and Cryptography Quantum Conference Key Distribution Systems Key Words Quantum cryptography Conference key distribution Information theory Correlation 1 Quantum Conference Key Distribution Systems Yi Mu and Yuliang Zheng Center for Computer Security Research, Department of |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-5.ps.Z, 19940513 A Quantum Cryptosystem Secure Against Beamsplitting Attacks Yi Mu, Yuliang Zheng, and Jennifer Seberry Center for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia and Yan-Xia Lin Department of Applied Statistics, University of |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-11.ps.Z, 19940601 Linear Approximation Versus Nonlinearity Josef Pieprzyk Chris Charnes Jennifer Seberry Center for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2500, AUSTRALIA e-mail: josef@cs.uow.edu.au charnes@cs.uow.edu.au jennie@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-9.ps.Z, 19940601 Further Comments on the Soviet Encryption Algorithm C. Charnes, L. O'Connory J. Pieprzyk z, R. Safavi-Naini, Y. Zhengx June 1, 1994 1 Introduction The details of the formerly Soviet (now Russian) encryption algorithm were published in GOST 28147-89 . The aim of the designers was to provide an |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-10.ps.Z, 19940601 Soviet Encryption Algorithm from Russian translated by Josef Pieprzyk Leonid Tombak Department of Computer Science University of Wollongong Wollongong, NSW 2500 e-mail: josef/leo@cs.uow.edu.au June 1, 1994 1 Introduction This report describes the Soviet (now Russian) encryption algorithm. The details of |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-7.ps.Z, 19940602 The Relationship Between Propagation Characteristic and Nonlinearity of Cryptographic Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au June 2, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-8.ps.Z, 19940603 Quantum Cryptographic Key Distribution Using An Optical Coupler Yi Mu and Yuliang Zheng Center for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong, NSW 2522, AUSTRALIA Email: fyi, yuliangg@cs.uow.edu.au May 26, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-12.ps.Z, 19940629 A Review Study on Electronic Election Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini The Centre for computer Security Research Department of Computer Science University of Wollongong Wollogong, NSW, 2522, AUSTRALIA June 2, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-13.ps.Z, 19940629 A Practical Electronic Voting Protocol Using Threshold Schemes Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini The Centre for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2500, AUSTRALIA e-mail: .uow.edu.au May 27, |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-17.ps.Z, 19940708 Network Security Issues Case Study : Secure Talk Mark Arnold Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: farnold,yuliangg@cs.uow.edu.au 7 July 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-16.ps.Z, 19940714 Characterizing the Structures of Highly Nonlinear Cryptographic Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au July 15, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-2.ps.Z, 19940719 New Solutions to the Problem of Access Control in a Hierarchy 1 Yuliang Zheng Thomas Hardjono Jennifer Seberry The Centre for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2522, Australia fyuliang,thomas,jennieg@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-14.ps.Z, 19940720 GAC | the Criterion for Global Avalanche Characteristics of Cryptographic Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au July 20, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/PARSE/istcase1.ps, 19940724 CASE tools and design method for parallel software development J P Gray*, I E Jelly , I Gorton *Department of Computer Science, University of Wollongong, Northfields Avenue, Wollongong NSW 2522 Australia School of Computing and Management Sciences, Sheffield Hallam University, Napier Street, Sheffield |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-3.ps.Z, 19940725 Flexible Concurrency Control Granularity through Nested Encapsulation in Hermes/ST Michael Fazzolare Telecommunications Software Research Centre (TSRC) The University of Wollongong, Department of Computer Science P.O. Box 1144, Wollongong NSW 2522, Australia Tel: (+61 42) 26 8832, Fax: (+61 42) 27 3277, |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-15.ps.Z, 19940727 Some Remarks on the Logic of Gong, Needham and Yahalom A. Mathuria R. Safavi-Naini P. Nickolas Center for Computer Security Research Department of Computer Science University of Wollongong NSW 2522, Australia email: fg9312439, rei, peterg@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-18.ps.Z, 19940811 A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases Ahmad Baraani-Dastjerdi Janusz R. Getta Josef Pieprzyk Reihaneh Safavi-Naini Department of Computer Science University of Wollongong Wollongong, NSW 2522, AUSTRALIA e-mail: |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-1.ps.Z, 19940811 Improved Public Key Cryptosystems Secure against Chosen Ciphertext Attacks Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA yuliang@cs.uow.edu.au 12 August 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-20.ps.Z, 19940822 Conditionally Secure Secret Sharing Schemes with Disenrollment Capability Chris Charnes Josef Pieprzyk y Rei Safavi-Naini Department of Computer Science University of Wollongong PO Box 1144 Wollongong NSW 2500, Australia e-mail: charnes@cs.uow.edu.au josef@cs.uow.edu.au rei@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-19.ps.Z, 19940915 On the Automation of GNY Logic Anish Mathuria Reihaneh Safavi-Naini Peter Nickolas Centre for Computer Security Research Department of Computer Science University of Wollongong, NSW 2522 email: fg9312439, rei, peterg@cs.uow.edu.au August 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-22.ps.Z, 19941103 A Framework for Transactional Semantics R. David Ranson Telecommunications Software Research Centre (TSRC) University of Wollongong, Department of Computer Science P.O. Box 1144, Wollongong NSW 2522, Australia. Phone: +61 42 268832; Fax +61 42 273277. Email: dranson@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-21.ps.Z, 19941103 Relating Nonlinearity to Propagation Characteristics Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au September 15, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-24.ps.Z, 19941117 1 An Application of Hamiltonian Neurodynamics Using Pontryagin's Maximum (Minimum) PrincipleTakamasa Koshizen, Phil Broadbridge and John Fulcher Department of Computer Science, University of Wollongong Northfield Avenue Wollongong NSW 2522, Australia Abstract Hamiltonians can generate Artificial Neural |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-25.ps.Z, 19941213 On Nonlinear Resilient Functions Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fxianmo,yuliangg@cs.uow.edu.au December 13, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-02.ps.Z, 19950322 Security Issues on the Internet Josef Pieprzyk yand Andrzej Goscinski z |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-01.ps.Z, 19950322 A Cryptographic Mechanism for Object-Instance-based Authorization in Object-Oriented Database Systems Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Janusz R. Getta Department of Computer Science University of Wollongong Wollongong, NSW 2522, AUSTRALIA e-mail: |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-06.ps.Z, 19950518 Computer Intrusion Detection: A Comparative Survey M. Esmaili R. Safavi-Naini J. Pieprzyk Center for Computer Security Research University of Wollongong Wollongong, NSW 2522, Australia. fmansour,rei,josefg@cs.uow.edu.au May 17, 1995 Tech-report #95-07 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/1995/Justin_Lister.ps.Z, 19950526 INTRUSION DETECTION SYSTEMS: AN INTRODUCTION TO THE DETECTION AND PREVENTION OF COMPUTER ABUSE a thesis submitted to the department of computer science university of wollongong in partial fulfillment of the requirements for the degree of bachelor of computer science (honors) By Justin Jay Lister May |
 | ftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/paper-1-95.ps.Z, 19950615 Weighing Matrices and Their Applications Christos Koukouvinos Jennifer Seberry y Department of Mathematics Department of Computer Science National Technical University of Athens and University of Wollongong Zografou 157 73 Wollongong Athens NSW 2522 Greece Australia June 15, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/paper-2-95.ps.Z, 19950623 Circulant Weighing Designs K. T. Arasu Jennifer Seberry y Department of Mathematics and Statistics Department of Computer Science Wright State University and University of Wollongong Dayton, Ohio{45435 NSW 2522 USA Australia June 15, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-08.ps.Z, 19950802 Pseudorandom Sequences obtained from Expansions of Irrational Numbers Hossein Ghodosi Chris Charnes Josef Pieprzyk Rei Safavi-Naini Department of Computer Science Center for Computer Security Research University of Wollongong Wollongong, NSW 2500, AUSTRALIA e-mail: |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-07.ps.Z, 19950802 A Model of Content-based Authorization in Object-Oriented Databases based on Object Views Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Janusz R. Getta Department of Computer Science University of Wollongong Wollongong, NSW 2522 AUSTRALIA e-mail: @cs.uow.edu.au July |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-09.ps.Z, 19950806 Cryptographic Hash Functions: A Survey S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk Centre for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-04.ps.Z, 19950806 Practical Message Authentication Schemes S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk Centre for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-23.ps.Z, 19950814 Application of PVM to Linear Cryptanalysis of DES S. Bakhtiari, R. Safavi-Naini, University of Wollongong, Northfield Avenue, Wollongong, N.S.W. 2500, Australia. E-mail: shahram@cs.uow.edu.au, rei@cs.uow.edu.au July 25, 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-05.ps.Z, 19951029 Kuperee Simplified Thomas Hardjono Centre for Computer Security Research University of Wollongong, NSW 2522, Australia email: thomas@cs.uow.edu.au 19 December 1994 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-14.ps.Z, 19951106 Distributed Delegation Systems Chris Charnes Josef Pieprzyk Rei Safavi-Naini Centre for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2500, AUSTRALIA e-mail: charnes/josef/rei@cs.uow.edu.au November 6, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/1994/Chenthurvasan_Duraiappan.ps.Z, 19951106 SECURITY ISSUES IN MOBILE COMMUNICATIONS A thesis submitted in partial fulfillment of the requirements for the award of the degree Master of Science (Honors) from UNIVERSITY OF WOLLONGONG by Chenthurvasan Duraiappan, B.E (Computer Eng) Department of Computer Science 1994 Acknowledgments I would like to |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/1995/Marc_Gysin.ps.Z, 19951106 Algorithms for Searching for Normal and Near-Yang Sequences A thesis submitted in fulfilment of the requirements for the award of the degree Master of Science (Honours) from UNIVERSITY OF WOLLONGONG by Marc{Michel Gysin, Engineer in Computer Science, Swiss Federal Institute of Technology Zurich |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-12.ps.Z, 19951106 Cryptosystems for Hierarchical Groups Hossein Ghodosi Josef Pieprzyk Chris Charnes Rei Safavi-Naini Center for Computer Security Research Department of Computer Science University of Wollongong NSW 2522 Australia e-mail: hossein/josef/charnes/rei@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-13.ps.Z, 19951106 Dynamic Threshold Cryptosystems (A New Scheme in Group Oriented Cryptography) Hossein Ghodosi Josef Pieprzyk Rei Safavi-Naini Center for Computer Security Research Department of Computer Science University of Wollongong NSW, 2522 Australia e-mail: hossein/josef/rei@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/1994/Shahram_Bakhtiari.ps.Z, 19951108 Linear Cryptanalysis of DES Cipher ( SHAHRAM BAKHTIARI ) 1 Linear Cryptanalysis of DES Cipher By Shahram Bakhtiari 1 ( Supervisor: Dr. R. Safavi-Naini ) The Report for Master of Computer Science Degree Wollongong University July 1, 1994 1Postgraduate student of Wollongong University, Northfield Avenue, |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-16.ps.Z, 19951117 On the Smith Normal Form of D-Optimal Designs C. Koukouvinos , M. Mitrouliy, and Jennifer Seberryz November 17, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-19.ps.Z, 19951117 Weighing Matrices and Their Applications Christos Koukouvinos Jennifer Seberry Department of Mathematics Department of Computer Science National Technical University of Athens and University of Wollongong Zografou 157 73 Wollongong Athens NSW 2522 Greece Australia November 17, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-26.ps.Z, 19951117 Bose's Method of Differences Applied to Construct Bhaskar Rao Designs Jennifer Seberry Department of Computer Science University of Wollongong Wollongong, NSW, 2500 Australia November 6, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-18.ps.Z, 19951117 New Weighing Matrices Christos Koukouvinos Jennifer Seberry Department of Mathematics Department of Computer Science National Technical University of Athens and University of Wollongong Zografou 157 73 Wollongong Athens NSW 2522 Greece Australia |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-20.ps.Z, 19951117 Optimal Designs, Supplementary Difference Sets and Multipliers C. Koukouvinos , Jennifer Seberryy, A. L. Whitemanz, and Ming-yuan Xiax. |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-25.ps.Z, 19951117 On the Smith Normal Form of Weighing Matrices C. Koukouvinos M. Mitrouli Department of Mathematics Department of Mathematics National Technical University of Athens University of Athens Zografou 15773 Panepistemiopolis 15784 Athens Athens Greece Greece Jennifer Seberryy Department of Computer Science |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-17.ps.Z, 19951117 On the Smith Normal Form of Weighing Matrices C. Koukouvinos , M. Mitrouliy, and Jennifer Seberryz November 17, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-22.ps.Z, 19951117 GROUP DIVISIBLE DESIGNS, GBRSDS AND GENERALIZED WEIGHING MATRICES Dinesh G. Sarvate Jennifer Seberry Department of Mathematics Department of Computer Science College of Charleston and University of Wollongong Charleston, S.C. 29424 Wollongong, NSW, 2500 U.S.A. Australia November 17, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-24.ps.Z, 19951120 Multiplications of Ternary Complementary Pairs Marc Gysin and Jennifer Seberry Centre for Computer Security Research, Department of Computer Science, The University of Wollongong, Wollongong, NSW 2500 Australia November 20, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-23.ps.Z, 19951122 CRITICAL SETS IN ROOM SQUARES Ghulam Rasool Chaudhry and Jennifer Seberry Department of Computer Science University of Wollongong Wollongong, NSW 2522, AUSTRALIA e-mail:@cs.uow.edu.au November 22, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-27.ps.Z, 19951123 Hadamard Matrices, Bent Functions and Cryptography Jennifer Seberry and Xian-Mo Zhang Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fj.seberry,xianmog@cs.uow.edu.au November 23, 1995 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-03.ps.Z, 19960207 A Security Model for Multi-level Object-Oriented Databases Based on Views Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Department of Computer Science University of Wollongong Wollongong, NSW 2522 AUSTRALIA e-mail: @cs.uow.edu.au February 5, 1996 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-02.ps.Z, 19960207 Security In Databases: A Survey Study Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Department of Computer Science University of Wollongong Wollongong, NSW 2522 AUSTRALIA e-mail: @cs.uow.edu.au February 7, 1996 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/misc/shrobj_v1_0.ps.Z, 19960313 1 Simple Shared Object An Architectural Pattern for Simple Object Sharing Version 1.0-2 1. March 1996 Robert Ott ro04@uow.edu.au Department of Computer Science, University of Wollongong Northfields Avenue, Wollongong NSW 2522 Australia This paper is a part of research about Design Patterns for |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/1996/Dinesh_Pullat.ps.Z, 19960409 UWNIVERSITYOLLONGONGOF Network Firewalls A thesis submitted in partial fulfilment of the requirements for the award of the degree Master of Computer Science from UNIVERSITY OF WOLLONGONG by Dinesh Pullat Department of Computer Science March 1996 c Copyright 1996 by Dinesh Pullat All Rights Reserved ii |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/1996/Robert_Ott.ps.Z, 19960524 Design Patterns for Distributed Programming: Sharing Objects with Java A thesis submitted in fulfilment of the requirements for the award of the degree Master of Science (Hons) at the UNIVERSITY OF WOLLONGONG by Robert Ott Department of Computer Science June 1996 Design Patterns for Distributed |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/1996/Yi_Mu.ps.Z, 19960527 i Quantum Communication and Security A thesis submitted in fulfilment of the requirements for the award of the degree of Master of Science (Honours) from UNIVERSITY OF WOLLONGONG by Yi Mu, Ph D (1994) Department of Computer Science 1994 ACKNOWLEDGEMENTS The research work for this thesis was carried out |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-04.ps.Z, 19960619 Optimization of Query Postprocessing in Heterogeneous Distributed Multidatabase Systems S. Mohsen Sedighi Janusz R. Getta Department of Computer Science University of Wollongong Northfields Ave., Wollongong, NSW 2522 Australia E-mail: @cs.uow.edu.au June 19, 1996 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-05.ps.Z, 19960619 Query Processing Strategies in Heterogeneous and Distributed Multidatabase Systems S. Mohsen Sedighi Janusz R. Getta Department of Computer Science University of Wollongong Northfields Ave., Wollongong, NSW 2522 Australia E-mail: @cs.uow.edu.au June 11, 1996 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-06.ps.Z, 19960704 CRYPTOGRAPHIC ALGORITHMS: PROPERTIES, DESIGN AND ANALYSIS Josef Pieprzyky Department of Computer Science, Centre for Computer Security Research, University of Wollongong, Wollongong, NSW 2500, AUSTRALIA, e-mail: josef@cs.uow.edu.au |
 | ftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/Intro-to-Cryptography/Chapter2.ps, 19970418 i AN INTRODUCTION TO CRYPTOGRAPHY (Draft) Chapters: 1. Introduction Josef Pieprzyk 2. Backgroud theory Josef Pieprzyk - substantial revision of JS&JPP 3. Private-key cryptosystems Josef Pieprzyk - substantial revision of JS&JPP 4. S-box theory Josef Pieprzyk 5. Public-key cryptosystems Josef Pieprzyk 6. |
 | ftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/Intro-to-Cryptography/Chapter5.ps, 19970418 i AN INTRODUCTION TO CRYPTOGRAPHY (Draft) Chapters: 1. Introduction Josef Pieprzyk 2. Backgroud theory Josef Pieprzyk - substantial revision of JS&JPP 3. Private-key cryptosystems Josef Pieprzyk - substantial revision of JS&JPP 4. S-box theory Josef Pieprzyk 5. Public-key cryptosystems Josef Pieprzyk 6. |
 | ftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/Intro-to-Cryptography/Chapters-1-13.ps, 19970728 i AN INTRODUCTION TO CRYPTOGRAPHY (Draft) Chapters: 1. Introduction Josef Pieprzyk 2. Backgroud theory Josef Pieprzyk - substantial revision of JS&JPP 3. Private-key cryptosystems Josef Pieprzyk - substantial revision of JS&JPP 4. S-box theory Josef Pieprzyk 5. Public-key cryptosystems Josef Pieprzyk 6. |
 | ftp://ftp.cs.uow.edu.au/pub/papers/1997/tr-97-03.ps.Z, 19970924 Some New Pollard ae's and Attacks for RSA Marc Gysin Centre for Computer Security Research University of Wollongong Wollongong, NSW 2500 Australia May 1997 |
 | ftp://ftp.cs.uow.edu.au/pub/papers/theses/1997/Shahram_Bakhtiari.ps.Z, 19971218 UWNIVERSITYOLLONGONGOF Analysis and Design of Message Authentication Codes A thesis submitted in fulfillment of the requirements for the award of the degree Doctor of Philosophy from UNIVERSITY OF WOLLONGONG by Shahram Bakhtiari Haft Lang, MSc School of Information Technology and Computer Science |