default search action
Peter R. Wild
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Chris J. Mitchell, Peter R. Wild:
Orientable and negative orientable sequences. CoRR abs/2409.00672 (2024) - 2023
- [j30]Susan G. Barwick, Wen-Ai Jackson, Peter R. Wild:
A characterisation of Fq-conics of PG(2,q3). Discret. Math. 346(4): 113282 (2023) - 2022
- [j29]Chris J. Mitchell, Peter R. Wild:
Constructing Orientable Sequences. IEEE Trans. Inf. Theory 68(7): 4782-4789 (2022) - 2021
- [j28]Susan G. Barwick, Wen-Ai Jackson, Peter R. Wild:
The Bose representation of PG(2, q3) in PG(8, q). Australas. J Comb. 79: 31-54 (2021)
2010 – 2019
- 2016
- [j27]Dieter Jungnickel, Jennifer D. Key, Chris J. Mitchell, Ronald C. Mullin, Peter R. Wild:
Editorial for the 25th anniversary issue. Des. Codes Cryptogr. 78(1): 1-3 (2016) - 2014
- [j26]Colin Wilmott, Peter R. Wild:
Towards an optimal swap gate. Quantum Inf. Process. 13(6): 1467-1482 (2014) - 2011
- [j25]Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild:
On "the Power of Verification Queries" in Unconditionally Secure Message Authentication. Discret. Math. Algorithms Appl. 3(3): 287-304 (2011)
2000 – 2009
- 2009
- [j24]Thomas Martin, Keith M. Martin, Peter R. Wild:
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. Des. Codes Cryptogr. 51(3): 315-334 (2009) - 2008
- [j23]Reihaneh Safavi-Naini, Peter R. Wild:
Information Theoretic Bounds on Authentication Systems in Query Model. IEEE Trans. Inf. Theory 54(6): 2426-2436 (2008) - 2007
- [j22]Chris J. Mitchell, Fred Piper, Peter R. Wild:
ID-based cryptography using symmetric primitives. Des. Codes Cryptogr. 44(1-3): 249-262 (2007) - [j21]Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild:
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group. J. Math. Cryptol. 1(4): 351-358 (2007) - [c8]Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild:
Combinatorial characterizations of authentication codes in verification oracle model. AsiaCCS 2007: 183-193 - 2006
- [c7]Jason Crampton, Keith M. Martin, Peter R. Wild:
On Key Assignment for Hierarchical Access Control. CSFW 2006: 98-111 - [i3]Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild:
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group. IACR Cryptol. ePrint Arch. 2006: 357 (2006) - [i2]Reihaneh Safavi-Naini, Peter R. Wild:
Information Theoretic Bounds on Authentication Systems in Query Model. IACR Cryptol. ePrint Arch. 2006: 433 (2006) - 2005
- [j20]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptogr. 36(3): 263-287 (2005) - [c6]Reihaneh Safavi-Naini, Peter R. Wild:
Bounds on authentication systems in query model. ICITS 2005: 85-91 - 2004
- [j19]Chester W. J. Liu, Peter R. Wild:
Embeddings of Steiner Quadruple Systems using Extensions of Linear Spaces. Ars Comb. 73 (2004) - 2003
- [i1]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher. IACR Cryptol. ePrint Arch. 2003: 5 (2003) - 2002
- [j18]Chester W. J. Liu, Peter R. Wild:
Embeddings of Steiner Quadruple Systems. Ars Comb. 65 (2002) - [c5]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild:
Size of Broadcast in Threshold Schemes with Disenrollment. ACISP 2002: 71-88 - [c4]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Threshold MACs. ICISC 2002: 237-252 - 2001
- [j17]Siaw-Lynn Ng, Peter R. Wild:
On k-arcs Covering a Line in Finite Projective Planes. Ars Comb. 58 (2001) - 2000
- [j16]Siaw-Lynn Ng, Peter R. Wild:
A New Family of Extended Generalized Quadrangles of Order (q + 1, q - 1). Eur. J. Comb. 21(3): 395-406 (2000)
1990 – 1999
- 1998
- [j15]L. Rey A. Casse, Keith M. Martin, Peter R. Wild:
Bounds and Characterizations of Authentication/Secrecy Schemes. Des. Codes Cryptogr. 13(2): 107-129 (1998) - [j14]Simon R. Blackburn, Peter R. Wild:
Optimal Linear Perfect Hash Families. J. Comb. Theory A 83(2): 233-250 (1998) - 1997
- [j13]Wen-Ai Jackson, Peter R. Wild:
On GMW Designs and Cyclic Hadamard Designs. Des. Codes Cryptogr. 10(2): 185-191 (1997) - [c3]Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild:
Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193 - 1996
- [j12]Wen-Ai Jackson, Kathleen A. S. Quinn, Peter R. Wild:
Quadrics and difference sets. Ars Comb. 42 (1996) - [j11]Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptogr. 7(1-2): 101-110 (1996) - [c2]Simon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild:
Efficient Multiplicative Sharing Schemes. EUROCRYPT 1996: 107-118 - 1995
- [j10]Peter R. Wild:
Some families of semibiplanes. Discret. Math. 138(1-3): 397-403 (1995) - 1994
- [j9]Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild:
Perfect binary arrays and difference sets. Discret. Math. 125(1-3): 241-254 (1994) - [j8]Sean Murphy, Kenneth G. Paterson, Peter R. Wild:
A Weak Cipher that Generates the Symmetric Group. J. Cryptol. 7(1): 61-65 (1994) - [j7]Chris J. Mitchell, Michael Walker, Peter R. Wild:
The Combinatorics of Perfect Authentication Schemes. SIAM J. Discret. Math. 7(1): 102-107 (1994) - 1992
- [j6]Wen-Ai Jackson, Peter R. Wild:
Relations between Two Perfect Ternary Sequence Constructions. Des. Codes Cryptogr. 2(4): 325-332 (1992) - [j5]Fred Piper, Peter R. Wild:
Incidence structures applied to cryptography. Discret. Math. 106-107: 383-389 (1992) - 1991
- [j4]Wen-Ai Jackson, Fred Piper, Peter R. Wild:
Non-embedding of non prime- power unitals with point-regular group. Discret. Math. 98(1): 23-28 (1991) - 1990
- [c1]Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild:
Some Remarks on Authentication Systems. AUSCRYPT 1990: 122-139
1980 – 1989
- 1989
- [j3]Chris J. Mitchell, Peter R. Wild:
One-stage one-sided rearrangeable switching networks. IEEE Trans. Commun. 37(1): 52-56 (1989) - 1987
- [j2]Peter R. Wild:
Difference basis systems. Discret. Math. 63(1): 81-90 (1987) - 1983
- [j1]Peter R. Wild:
Incidence graphs and subdesigns of semisymmetric designs. Discret. Math. 44(2): 201-216 (1983)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint