Search

Your search keyword '"Blackburn, Simon R."' showing total 294 results

Search Constraints

Start Over You searched for: Author "Blackburn, Simon R." Remove constraint Author: "Blackburn, Simon R."
294 results on '"Blackburn, Simon R."'

Search Results

1. Tredoku Patterns

2. Exponent-Critical Groups

3. Subsets of free groups with distinct differences

4. Permutations that separate close elements, and rectangle packings in the torus

5. Constructions and bounds for codes with restricted overlaps

6. The capacity of a finite field matrix channel

7. Permutations that separate close elements

8. The enumeration of finite rings

9. Block-avoiding point sequencings

11. Inglenook Shunting Puzzles

12. The minimum Manhattan distance and minimum jump of permutations

13. PIR schemes with small download complexity and low storage requirements

14. PIR Array Codes with Optimal PIR Rates

15. On the security of the Algebraic Eraser tag authentication protocol

16. Finite field matrix channels for network coding

17. A Practical Cryptanalysis of the Algebraic Eraser

18. Maximum likelihood decoding for multilevel channels with gain and offset mismatch

19. Pearson codes

20. Probabilistic existence results for separable codes

21. Counting Additive Decompositions of Quadratic Residues in Finite Fields

22. Non-overlapping codes

23. Practical Attacks Against the Walnut Digital Signature Scheme

25. Enumerating finite racks, quandles and kei

26. Triangulations of the sphere, bitrades and abelian groups

27. The asymptotic behavior of Grassmannian codes

28. The probability that a pair of elements of a finite group are conjugate

29. Cryptanalysis of three matrix-based key establishment protocols

30. On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves

31. The existence of k-radius sequences

32. Constructing k-radius sequences

33. Honeycomb arrays

34. Putting Dots in Triangles

35. Group theory in cryptography

36. Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks

37. Two-Dimensional Patterns with Distinct Differences -- Constructions, Bounds, and Maximal Anticodes

38. Connectivity of the Uniform Random Intersection Graph

39. A Practical Cryptanalysis of the Algebraic Eraser

40. Constructions and Bounds for Codes With Restricted Overlaps

42. Group enumeration

44. Efficient Key Predistribution for Grid-Based Wireless Sensor Networks

45. Key Refreshing in Wireless Sensor Networks

46. Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan

47. Predicting the Inversive Generator

Catalog

Books, media, physical & digital resources