Author of the publication

Applications of Linearised and Sub-linearised Polynomials to Information Security.

. ACISP, volume 1438 of Lecture Notes in Computer Science, page 227-237. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On a conjecture on planar polynomials of the form X(Trn(X)-uX)., and . Finite Fields Their Appl., (2013)Formalizing certificate management systems., , , and . ICON, page 340-348. IEEE, (1999)Planar polynomials for commutative semifields with specified nuclei., , and . Des. Codes Cryptogr., 44 (1-3): 275-286 (2007)Applications of Linearised and Sub-linearised Polynomials to Information Security.. ACISP, volume 1438 of Lecture Notes in Computer Science, page 227-237. Springer, (1998)Applications of Trusted Review to Information Security., and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 305-319. Springer, (2001)Towards Certificate Verification in a Certificate Management System., , , and . ACSC, page 150-157. IEEE Computer Society, (2000)Planning Security Services for IT Systems., and . CoRR, (2014)The PKI Specification Dilemma: A Formal Solution., , , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 206-219. Springer, (2000)Modelling Trust Structures for Public Key Infrastructures., , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 56-70. Springer, (2002)A class of functions and their application in constructing semi-biplanes and association schemes., and . Discret. Math., 202 (1-3): 21-31 (1999)