Sean Murphy

According to our database1, Sean Murphy authored at least 45 papers between 1990 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




Discretisation and Product Distributions in Ring-LWE.
IACR Cryptology ePrint Archive, 2019

A Central Limit Framework for Ring-LWE Decryption.
IACR Cryptology ePrint Archive, 2019

Oculus Rift Versus HTC Vive: Usability Assessment from a Teleportation Task.
Proceedings of the Virtual, Augmented and Mixed Reality. Multimodal Interaction, 2019

\delta -subgaussian Random Variables in Cryptography.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Analysing and exploiting the Mantin biases in RC4.
Des. Codes Cryptogr., 2018

Realizing Edge Computing Connectivity with Open Virtual Networking.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

Noise Distributions in Homomorphic Ring-LWE.
IACR Cryptology ePrint Archive, 2017

Algorithms for the Approximate Common Divisor Problem.
IACR Cryptology ePrint Archive, 2016

Analysing and Exploiting the Mantin Biases in RC4.
IACR Cryptology ePrint Archive, 2016

Putting Feelings into Words: Cross-Linguistic Markers of the Referential Process.
Proceedings of the 2nd Workshop on Computational Linguistics and Clinical Psychology: From Linguistic Signal to Clinical Reality, 2015

A Computer Program for Tracking the Evolution of a Psychotherapy Treatment.
Proceedings of the 2nd Workshop on Computational Linguistics and Clinical Psychology: From Linguistic Signal to Clinical Reality, 2015

Anatomical Landmark Detection in CT Data by Learned Atlas Location Autocontext.
Proceedings of the Medical Image Understanding and Analysis, 2015

Development and Validation of a Multilevel Model for Predicting Workload Under Routine and Nonroutine Conditions in an Air Traffic Management Center.
Human Factors, 2014

Fast, Simple, Accurate Multi-atlas Segmentation of the Brain.
Proceedings of the Biomedical Image Registration - 6th International Workshop, 2014

Detection and location of 127 anatomical landmarks in diverse CT datasets.
Proceedings of the Medical Imaging 2014: Image Processing, 2014

Architecture of a Self Configuration Framework for 802.11-based multi-radio Mesh Networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

The effectiveness of the linear hull effect.
J. Mathematical Cryptology, 2012

Multi-compartment heart segmentation in CT angiography using a spatially varying gaussian classifier.
Int. J. Comput. Assist. Radiol. Surg., 2012

Vehicular mesh networks for infotainment content delivery: The Carmesh perspective.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2012

The Return of the Cryptographic Boomerang.
IEEE Trans. Information Theory, 2011

A Comparison of Four Unsupervised Clustering Algorithms for Segmenting Brain Tissue in Multi-spectral MR Data.
Proceedings of the BIOSIGNALS 2010, 2010

IEEE802.11k enabled adaptive physical carrier sense mechanism for wireless networks (K-APCS).
Proceedings of the 4th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 2009

Geometric Ideas for Cryptographic Equation Solving in Even Characteristic.
Proceedings of the Cryptography and Coding, 2009

Automatic labelling of coronary arteries.
Proceedings of the 17th European Signal Processing Conference, 2009

A geometric view of cryptographic equation solving.
J. Mathematical Cryptology, 2008

Novel computational methods for increasing PCR primer design effectiveness in directed sequencing.
BMC Bioinformatics, 2008

Algebraic aspects of the advanced encryption standard.
Springer, ISBN: 978-0-387-24363-4, 2006

An Algebraic Framework for Cipher Embeddings.
Proceedings of the Cryptography and Coding, 2005

Small Scale Variants of the AES.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Key-Dependent S-Boxes and Differential Cryptanalysis.
Des. Codes Cryptogr., 2002

Essential Algebraic Structure within the AES.
Proceedings of the Advances in Cryptology, 2002

The Advanced Encryption Standard (AES).
Inf. Sec. Techn. Report, 1999

An Analysis of SAFER.
J. Cryptology, 1998

Comments on "Theory and Applications of Cellular Automata in Cryptography".
IEEE Trans. Computers, 1997

The difficulty of attacking cryptosystems.
Inf. Sec. Techn. Report, 1997

An Approximate Distribution for the Maximum Order Complexity.
Des. Codes Cryptogr., 1997

Corporate Metamorphosis: The Effects of the New Media.
First Monday, 1996

Pairs and Triplets of DES S-Boxes.
J. Cryptology, 1995

The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings.
J. Cryptology, 1995

A Weak Cipher that Generates the Symmetric Group.
J. Cryptology, 1994

Partnering with EDA Vendors: Tips, Techniques, and the Role of Standards.
Proceedings of the 31st Conference on Design Automation, 1994

Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups.
Proceedings of the Advances in Cryptology, 1993

Markov Ciphers and Differential Cryptanalysis.
Proceedings of the Advances in Cryptology, 1991

The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts.
J. Cryptology, 1990