# Jennifer Seberry

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

1999

1999

- ACISP
- 1999

Boolean Function Design Using Hill Climbing Methods William Millan, Andrew Clark, and Ed Dawsonâ€¦Â (More)

Is this relevant?

1997

1997

- 1997

Cyclotomy can be used to construct a variety of combinatorial designs, for example, supplementary difference sets, weighingâ€¦Â (More)

Is this relevant?

1996

1996

- 1996

This paper presents and discusses some design and security issues surrounding electronic strongboxes as an electronic counterpartâ€¦Â (More)

Is this relevant?

1994

1994

- 1994

An important question in designing cryptographic functions including substitution boxes (S-boxes) is the relationships among theâ€¦Â (More)

Is this relevant?

1994

1994

- Computers & Security
- 1994

Database authentication via cryptographic checksums represents an important approach to achieving an affordable safeguard of theâ€¦Â (More)

Is this relevant?

1994

1994

- Australasian J. Combinatorics
- 1994

Near normal sequences of new lengths n = 4m + 1 = 49,53,57 are constructed. The relation between a special set of near normalâ€¦Â (More)

Is this relevant?

1993

1993

- ACM Conference on Computer and Communicationsâ€¦
- 1993

Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addresses problems with previousâ€¦Â (More)

Is this relevant?

1991

1991

- Australasian J. Combinatorics
- 1991

This paper discusses critical sets for latin squares. We give the cardinality of the minimal critical set for a family of latinâ€¦Â (More)

Is this relevant?

1991

1991

- IEEE Trans. Information Theory
- 1991

The application of coding theory to security scenarios is studied. Authentication systems are introduced that are based onâ€¦Â (More)

Is this relevant?

1986

1986

- 1986

We explore the use of some combinatorial designs for possible use as secret codes. We are motivated to use designs as (1â€¦Â (More)

Is this relevant?