close this section of the libraryftp://ftp.cs.uow.edu.au (80)
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-9.ps.Z, 19931130
Improving the Strict Avalanche Characteristics of Cryptographic Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-5.ps.Z, 19931130
On Constructions and Nonlinearity of Correlation Immune Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au November 2,
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-13.ps, 19931130
HAVAL | A One-Way Hashing Algorithm with Variable Length of Output 1 Yuliang Zheng Josef Pieprzyk Jennifer Seberry Centre for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2522, Australia E-mail: fyuliang, josef, jennieg@cs.uow.edu.au November 2, 1993
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-4.ps.Z, 19931130
Nonlinearity and Propagation Characteristics of Balanced Boolean Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: jennie,xianmo,yuliang@cs.uow.edu.au November 2, 1993
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-14.ps.Z, 19931130
Systematic Generation of Cryptographically Robust S-boxes Jennifer Seberry Xian-Mo Zhang Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au November 2, 1993
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-1.ps.Z, 19931130
Highly Nonlinear Balanced Boolean Functions Satisfying High Degree Propagation Criterion Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au Phone: +61 42 21 4327 Fax: +61
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-17.ps.Z, 19931130
Amending Leighton and Micali's Key Distribution Protocol Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA yuliang@cs.uow.edu.au November 2, 1993
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1992/tr-92-2.ps.Z, 19931208
Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks1 Yuliang Zheng Jennifer Seberry 2 Centre for Computer Security Research Department of Computer Science University of Wollongong Northfields Avenue, Wollongong, NSW 2522 AUSTRALIA E-mail: fyuliang,jennieg@cs.uow.edu.au 21 September
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-2.ps.Z, 19940203
Relationships Among Nonlinearity Criteria Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au February 3, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-4.ps.Z, 19940309
Pitfalls in Designing Substitution Boxes Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au March 8, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/YZheng-PhDThesis.ps.Z, 19940412
Principles for Designing Secure Block Ciphers and One-Way Hash Functions by Yuliang Zheng B.S., Computer Science, July 1982 Southeastern University, China M.E., Electrical and Computer Engineering, March 1988 Yokohama National University Submitted to The Division of Electrical and Computer Engineering
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/PARSE/tr2b.ps, 19940510
______________________________________________________________________ Technical Report PARSE-TR-2b Definition of the PARSE Process Graph Notation, version 2 (PGN/2) Jonathan Gray 7 March 1994 reprinted with corrections, 22 March 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/sectalk.ps.Z, 19940513
Talking Securely Mark Arnold Anthony Boyd Susan Dalton Flora Lo Adam Millard Shalini Shah November 1993 Revised February 94
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-6.ps.Z, 19940513
Submission for Designs, Codes and Cryptography Quantum Conference Key Distribution Systems Key Words Quantum cryptography Conference key distribution Information theory Correlation 1 Quantum Conference Key Distribution Systems Yi Mu and Yuliang Zheng Center for Computer Security Research, Department of
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-5.ps.Z, 19940513
A Quantum Cryptosystem Secure Against Beamsplitting Attacks Yi Mu, Yuliang Zheng, and Jennifer Seberry Center for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia and Yan-Xia Lin Department of Applied Statistics, University of
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-11.ps.Z, 19940601
Linear Approximation Versus Nonlinearity Josef Pieprzyk Chris Charnes Jennifer Seberry Center for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2500, AUSTRALIA e-mail: josef@cs.uow.edu.au charnes@cs.uow.edu.au jennie@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-9.ps.Z, 19940601
Further Comments on the Soviet Encryption Algorithm C. Charnes, L. O'Connory J. Pieprzyk z, R. Safavi-Naini, Y. Zhengx June 1, 1994 1 Introduction The details of the formerly Soviet (now Russian) encryption algorithm were published in GOST 28147-89 . The aim of the designers was to provide an
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-10.ps.Z, 19940601
Soviet Encryption Algorithm from Russian translated by Josef Pieprzyk Leonid Tombak Department of Computer Science University of Wollongong Wollongong, NSW 2500 e-mail: josef/leo@cs.uow.edu.au June 1, 1994 1 Introduction This report describes the Soviet (now Russian) encryption algorithm. The details of
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-7.ps.Z, 19940602
The Relationship Between Propagation Characteristic and Nonlinearity of Cryptographic Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au June 2, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-8.ps.Z, 19940603
Quantum Cryptographic Key Distribution Using An Optical Coupler Yi Mu and Yuliang Zheng Center for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong, NSW 2522, AUSTRALIA Email: fyi, yuliangg@cs.uow.edu.au May 26, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-12.ps.Z, 19940629
A Review Study on Electronic Election Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini The Centre for computer Security Research Department of Computer Science University of Wollongong Wollogong, NSW, 2522, AUSTRALIA June 2, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-13.ps.Z, 19940629
A Practical Electronic Voting Protocol Using Threshold Schemes Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini The Centre for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2500, AUSTRALIA e-mail: .uow.edu.au May 27,
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-17.ps.Z, 19940708
Network Security Issues Case Study : Secure Talk Mark Arnold Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: farnold,yuliangg@cs.uow.edu.au 7 July 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-16.ps.Z, 19940714
Characterizing the Structures of Highly Nonlinear Cryptographic Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au July 15, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1993/tr-93-2.ps.Z, 19940719
New Solutions to the Problem of Access Control in a Hierarchy 1 Yuliang Zheng Thomas Hardjono Jennifer Seberry The Centre for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2522, Australia fyuliang,thomas,jennieg@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-14.ps.Z, 19940720
GAC | the Criterion for Global Avalanche Characteristics of Cryptographic Functions Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au July 20, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/PARSE/istcase1.ps, 19940724
CASE tools and design method for parallel software development J P Gray*, I E Jelly , I Gorton *Department of Computer Science, University of Wollongong, Northfields Avenue, Wollongong NSW 2522 Australia School of Computing and Management Sciences, Sheffield Hallam University, Napier Street, Sheffield
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-3.ps.Z, 19940725
Flexible Concurrency Control Granularity through Nested Encapsulation in Hermes/ST Michael Fazzolare Telecommunications Software Research Centre (TSRC) The University of Wollongong, Department of Computer Science P.O. Box 1144, Wollongong NSW 2522, Australia Tel: (+61 42) 26 8832, Fax: (+61 42) 27 3277,
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-15.ps.Z, 19940727
Some Remarks on the Logic of Gong, Needham and Yahalom A. Mathuria R. Safavi-Naini P. Nickolas Center for Computer Security Research Department of Computer Science University of Wollongong NSW 2522, Australia email: fg9312439, rei, peterg@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-18.ps.Z, 19940811
A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases Ahmad Baraani-Dastjerdi Janusz R. Getta Josef Pieprzyk Reihaneh Safavi-Naini Department of Computer Science University of Wollongong Wollongong, NSW 2522, AUSTRALIA e-mail:
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-1.ps.Z, 19940811
Improved Public Key Cryptosystems Secure against Chosen Ciphertext Attacks Yuliang Zheng The Centre for Computer Security Research Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA yuliang@cs.uow.edu.au 12 August 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-20.ps.Z, 19940822
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability Chris Charnes Josef Pieprzyk y Rei Safavi-Naini Department of Computer Science University of Wollongong PO Box 1144 Wollongong NSW 2500, Australia e-mail: charnes@cs.uow.edu.au josef@cs.uow.edu.au rei@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-19.ps.Z, 19940915
On the Automation of GNY Logic Anish Mathuria Reihaneh Safavi-Naini Peter Nickolas Centre for Computer Security Research Department of Computer Science University of Wollongong, NSW 2522 email: fg9312439, rei, peterg@cs.uow.edu.au August 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-22.ps.Z, 19941103
A Framework for Transactional Semantics R. David Ranson Telecommunications Software Research Centre (TSRC) University of Wollongong, Department of Computer Science P.O. Box 1144, Wollongong NSW 2522, Australia. Phone: +61 42 268832; Fax +61 42 273277. Email: dranson@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-21.ps.Z, 19941103
Relating Nonlinearity to Propagation Characteristics Jennifer Seberry Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fjennie,xianmo,yuliangg@cs.uow.edu.au September 15, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-24.ps.Z, 19941117
1 An Application of Hamiltonian Neurodynamics Using Pontryagin's Maximum (Minimum) PrincipleTakamasa Koshizen, Phil Broadbridge and John Fulcher Department of Computer Science, University of Wollongong Northfield Avenue Wollongong NSW 2522, Australia Abstract Hamiltonians can generate Artificial Neural
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-25.ps.Z, 19941213
On Nonlinear Resilient Functions Xian-Mo Zhang Yuliang Zheng Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fxianmo,yuliangg@cs.uow.edu.au December 13, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-02.ps.Z, 19950322
Security Issues on the Internet Josef Pieprzyk yand Andrzej Goscinski z
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-01.ps.Z, 19950322
A Cryptographic Mechanism for Object-Instance-based Authorization in Object-Oriented Database Systems Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Janusz R. Getta Department of Computer Science University of Wollongong Wollongong, NSW 2522, AUSTRALIA e-mail:
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-06.ps.Z, 19950518
Computer Intrusion Detection: A Comparative Survey M. Esmaili R. Safavi-Naini J. Pieprzyk Center for Computer Security Research University of Wollongong Wollongong, NSW 2522, Australia. fmansour,rei,josefg@cs.uow.edu.au May 17, 1995 Tech-report #95-07
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/1995/Justin_Lister.ps.Z, 19950526
INTRUSION DETECTION SYSTEMS: AN INTRODUCTION TO THE DETECTION AND PREVENTION OF COMPUTER ABUSE a thesis submitted to the department of computer science university of wollongong in partial fulfillment of the requirements for the degree of bachelor of computer science (honors) By Justin Jay Lister May
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/paper-1-95.ps.Z, 19950615
Weighing Matrices and Their Applications Christos Koukouvinos Jennifer Seberry y Department of Mathematics Department of Computer Science National Technical University of Athens and University of Wollongong Zografou 157 73 Wollongong Athens NSW 2522 Greece Australia June 15, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/paper-2-95.ps.Z, 19950623
Circulant Weighing Designs K. T. Arasu Jennifer Seberry y Department of Mathematics and Statistics Department of Computer Science Wright State University and University of Wollongong Dayton, Ohio{45435 NSW 2522 USA Australia June 15, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-08.ps.Z, 19950802
Pseudorandom Sequences obtained from Expansions of Irrational Numbers Hossein Ghodosi Chris Charnes Josef Pieprzyk Rei Safavi-Naini Department of Computer Science Center for Computer Security Research University of Wollongong Wollongong, NSW 2500, AUSTRALIA e-mail:
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-07.ps.Z, 19950802
A Model of Content-based Authorization in Object-Oriented Databases based on Object Views Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Janusz R. Getta Department of Computer Science University of Wollongong Wollongong, NSW 2522 AUSTRALIA e-mail: @cs.uow.edu.au July
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-09.ps.Z, 19950806
Cryptographic Hash Functions: A Survey S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk Centre for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-04.ps.Z, 19950806
Practical Message Authentication Schemes S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk Centre for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1994/tr-94-23.ps.Z, 19950814
Application of PVM to Linear Cryptanalysis of DES S. Bakhtiari, R. Safavi-Naini, University of Wollongong, Northfield Avenue, Wollongong, N.S.W. 2500, Australia. E-mail: shahram@cs.uow.edu.au, rei@cs.uow.edu.au July 25, 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-05.ps.Z, 19951029
Kuperee Simplified Thomas Hardjono Centre for Computer Security Research University of Wollongong, NSW 2522, Australia email: thomas@cs.uow.edu.au 19 December 1994
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-14.ps.Z, 19951106
Distributed Delegation Systems Chris Charnes Josef Pieprzyk Rei Safavi-Naini Centre for Computer Security Research Department of Computer Science University of Wollongong Wollongong, NSW 2500, AUSTRALIA e-mail: charnes/josef/rei@cs.uow.edu.au November 6, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/1994/Chenthurvasan_Duraiappan.ps.Z, 19951106
SECURITY ISSUES IN MOBILE COMMUNICATIONS A thesis submitted in partial fulfillment of the requirements for the award of the degree Master of Science (Honors) from UNIVERSITY OF WOLLONGONG by Chenthurvasan Duraiappan, B.E (Computer Eng) Department of Computer Science 1994 Acknowledgments I would like to
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/1995/Marc_Gysin.ps.Z, 19951106
Algorithms for Searching for Normal and Near-Yang Sequences A thesis submitted in fulfilment of the requirements for the award of the degree Master of Science (Honours) from UNIVERSITY OF WOLLONGONG by Marc{Michel Gysin, Engineer in Computer Science, Swiss Federal Institute of Technology Zurich
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-12.ps.Z, 19951106
Cryptosystems for Hierarchical Groups Hossein Ghodosi Josef Pieprzyk Chris Charnes Rei Safavi-Naini Center for Computer Security Research Department of Computer Science University of Wollongong NSW 2522 Australia e-mail: hossein/josef/charnes/rei@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-13.ps.Z, 19951106
Dynamic Threshold Cryptosystems (A New Scheme in Group Oriented Cryptography) Hossein Ghodosi Josef Pieprzyk Rei Safavi-Naini Center for Computer Security Research Department of Computer Science University of Wollongong NSW, 2522 Australia e-mail: hossein/josef/rei@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/1994/Shahram_Bakhtiari.ps.Z, 19951108
Linear Cryptanalysis of DES Cipher ( SHAHRAM BAKHTIARI ) 1 Linear Cryptanalysis of DES Cipher By Shahram Bakhtiari 1 ( Supervisor: Dr. R. Safavi-Naini ) The Report for Master of Computer Science Degree Wollongong University July 1, 1994 1Postgraduate student of Wollongong University, Northfield Avenue,
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-16.ps.Z, 19951117
On the Smith Normal Form of D-Optimal Designs C. Koukouvinos , M. Mitrouliy, and Jennifer Seberryz November 17, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-19.ps.Z, 19951117
Weighing Matrices and Their Applications Christos Koukouvinos Jennifer Seberry Department of Mathematics Department of Computer Science National Technical University of Athens and University of Wollongong Zografou 157 73 Wollongong Athens NSW 2522 Greece Australia November 17, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-26.ps.Z, 19951117
Bose's Method of Differences Applied to Construct Bhaskar Rao Designs Jennifer Seberry Department of Computer Science University of Wollongong Wollongong, NSW, 2500 Australia November 6, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-18.ps.Z, 19951117
New Weighing Matrices Christos Koukouvinos Jennifer Seberry Department of Mathematics Department of Computer Science National Technical University of Athens and University of Wollongong Zografou 157 73 Wollongong Athens NSW 2522 Greece Australia
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-20.ps.Z, 19951117
Optimal Designs, Supplementary Difference Sets and Multipliers C. Koukouvinos , Jennifer Seberryy, A. L. Whitemanz, and Ming-yuan Xiax.
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-25.ps.Z, 19951117
On the Smith Normal Form of Weighing Matrices C. Koukouvinos M. Mitrouli Department of Mathematics Department of Mathematics National Technical University of Athens University of Athens Zografou 15773 Panepistemiopolis 15784 Athens Athens Greece Greece Jennifer Seberryy Department of Computer Science
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-17.ps.Z, 19951117
On the Smith Normal Form of Weighing Matrices C. Koukouvinos , M. Mitrouliy, and Jennifer Seberryz November 17, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-22.ps.Z, 19951117
GROUP DIVISIBLE DESIGNS, GBRSDS AND GENERALIZED WEIGHING MATRICES Dinesh G. Sarvate Jennifer Seberry Department of Mathematics Department of Computer Science College of Charleston and University of Wollongong Charleston, S.C. 29424 Wollongong, NSW, 2500 U.S.A. Australia November 17, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-24.ps.Z, 19951120
Multiplications of Ternary Complementary Pairs Marc Gysin and Jennifer Seberry Centre for Computer Security Research, Department of Computer Science, The University of Wollongong, Wollongong, NSW 2500 Australia November 20, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-23.ps.Z, 19951122
CRITICAL SETS IN ROOM SQUARES Ghulam Rasool Chaudhry and Jennifer Seberry Department of Computer Science University of Wollongong Wollongong, NSW 2522, AUSTRALIA e-mail:@cs.uow.edu.au November 22, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1995/tr-95-27.ps.Z, 19951123
Hadamard Matrices, Bent Functions and Cryptography Jennifer Seberry and Xian-Mo Zhang Department of Computer Science The University of Wollongong Wollongong, NSW 2522, AUSTRALIA E-mail: fj.seberry,xianmog@cs.uow.edu.au November 23, 1995
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-03.ps.Z, 19960207
A Security Model for Multi-level Object-Oriented Databases Based on Views Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Department of Computer Science University of Wollongong Wollongong, NSW 2522 AUSTRALIA e-mail: @cs.uow.edu.au February 5, 1996
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-02.ps.Z, 19960207
Security In Databases: A Survey Study Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Department of Computer Science University of Wollongong Wollongong, NSW 2522 AUSTRALIA e-mail: @cs.uow.edu.au February 7, 1996
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/misc/shrobj_v1_0.ps.Z, 19960313
1 Simple Shared Object An Architectural Pattern for Simple Object Sharing Version 1.0-2 1. March 1996 Robert Ott ro04@uow.edu.au Department of Computer Science, University of Wollongong Northfields Avenue, Wollongong NSW 2522 Australia This paper is a part of research about Design Patterns for
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/1996/Dinesh_Pullat.ps.Z, 19960409
UWNIVERSITYOLLONGONGOF Network Firewalls A thesis submitted in partial fulfilment of the requirements for the award of the degree Master of Computer Science from UNIVERSITY OF WOLLONGONG by Dinesh Pullat Department of Computer Science March 1996 c Copyright 1996 by Dinesh Pullat All Rights Reserved ii
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/1996/Robert_Ott.ps.Z, 19960524
Design Patterns for Distributed Programming: Sharing Objects with Java A thesis submitted in fulfilment of the requirements for the award of the degree Master of Science (Hons) at the UNIVERSITY OF WOLLONGONG by Robert Ott Department of Computer Science June 1996 Design Patterns for Distributed
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/1996/Yi_Mu.ps.Z, 19960527
i Quantum Communication and Security A thesis submitted in fulfilment of the requirements for the award of the degree of Master of Science (Honours) from UNIVERSITY OF WOLLONGONG by Yi Mu, Ph D (1994) Department of Computer Science 1994 ACKNOWLEDGEMENTS The research work for this thesis was carried out
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-04.ps.Z, 19960619
Optimization of Query Postprocessing in Heterogeneous Distributed Multidatabase Systems S. Mohsen Sedighi Janusz R. Getta Department of Computer Science University of Wollongong Northfields Ave., Wollongong, NSW 2522 Australia E-mail: @cs.uow.edu.au June 19, 1996
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-05.ps.Z, 19960619
Query Processing Strategies in Heterogeneous and Distributed Multidatabase Systems S. Mohsen Sedighi Janusz R. Getta Department of Computer Science University of Wollongong Northfields Ave., Wollongong, NSW 2522 Australia E-mail: @cs.uow.edu.au June 11, 1996
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1996/tr-96-06.ps.Z, 19960704
CRYPTOGRAPHIC ALGORITHMS: PROPERTIES, DESIGN AND ANALYSIS Josef Pieprzyky Department of Computer Science, Centre for Computer Security Research, University of Wollongong, Wollongong, NSW 2500, AUSTRALIA, e-mail: josef@cs.uow.edu.au
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/Intro-to-Cryptography/Chapter2.ps, 19970418
i AN INTRODUCTION TO CRYPTOGRAPHY (Draft) Chapters: 1. Introduction Josef Pieprzyk 2. Backgroud theory Josef Pieprzyk - substantial revision of JS&JPP 3. Private-key cryptosystems Josef Pieprzyk - substantial revision of JS&JPP 4. S-box theory Josef Pieprzyk 5. Public-key cryptosystems Josef Pieprzyk 6.
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/Intro-to-Cryptography/Chapter5.ps, 19970418
i AN INTRODUCTION TO CRYPTOGRAPHY (Draft) Chapters: 1. Introduction Josef Pieprzyk 2. Backgroud theory Josef Pieprzyk - substantial revision of JS&JPP 3. Private-key cryptosystems Josef Pieprzyk - substantial revision of JS&JPP 4. S-box theory Josef Pieprzyk 5. Public-key cryptosystems Josef Pieprzyk 6.
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/combinatorics/Intro-to-Cryptography/Chapters-1-13.ps, 19970728
i AN INTRODUCTION TO CRYPTOGRAPHY (Draft) Chapters: 1. Introduction Josef Pieprzyk 2. Backgroud theory Josef Pieprzyk - substantial revision of JS&JPP 3. Private-key cryptosystems Josef Pieprzyk - substantial revision of JS&JPP 4. S-box theory Josef Pieprzyk 5. Public-key cryptosystems Josef Pieprzyk 6.
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/1997/tr-97-03.ps.Z, 19970924
Some New Pollard ae's and Attacks for RSA Marc Gysin Centre for Computer Security Research University of Wollongong Wollongong, NSW 2500 Australia May 1997
open this document and view contentsftp://ftp.cs.uow.edu.au/pub/papers/theses/1997/Shahram_Bakhtiari.ps.Z, 19971218
UWNIVERSITYOLLONGONGOF Analysis and Design of Message Authentication Codes A thesis submitted in fulfillment of the requirements for the award of the degree Doctor of Philosophy from UNIVERSITY OF WOLLONGONG by Shahram Bakhtiari Haft Lang, MSc School of Information Technology and Computer Science