Spyros S. Magliveras

According to our database1, Spyros S. Magliveras authored at least 49 papers between 1981 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.



In proceedings 
PhD thesis 


On csauthors.net:


The classification of Steiner triple systems on 27 points with 3-rank 24.
Des. Codes Cryptogr., 2019

On Classifying Steiner Triple Systems by Their 3-Rank.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2017

J. Math. Cryptol., 2013

On large sets of projective planes of orders 3 and 4.
Discret. Math., 2013

Preface: geometry, combinatorial designs and cryptology.
Des. Codes Cryptogr., 2012

Related decompositions and new constructions of the Higman-Sims and Hall-Janko graphs.
Australas. J Comb., 2012

Generating rooted trees of m nodes uniformly at random.
Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011

On Jacobsthal Binary Sequences.
Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011

Crypto applications of combinatorial group theory.
Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011

Cryptanalysis of the Tillich-Zémor Hash Function.
J. Cryptol., 2011

Minimal logarithmic signatures for finite groups of Lie type.
Des. Codes Cryptogr., 2010

A Public Key Cryptosystem Based on Non-abelian Finite Groups.
J. Cryptol., 2009

Compression Independent Reversible Encryption for Privacy in Video Surveillance.
EURASIP J. Inf. Secur., 2009

Discrete logarithms for finite groups.
Computing, 2009

Primitive sets in a lattice.
Australas. J Comb., 2008

Compression independent object encryption for ensuring privacy in video surveillance.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Notes on the CRTDH Group Key Agreement Protocol.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

New approaches to encryption and steganography for digital videos.
Multim. Syst., 2007

Secure and efficient key management in mobile ad hoc networks.
J. Netw. Comput. Appl., 2007

Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations.
EURASIP J. Inf. Secur., 2007

A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006

On public-key cryptosystems based on combinatorial group theory.
IACR Cryptol. ePrint Arch., 2005

Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Secure and Efficient Key Management in Mobile Ad Hoc Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A GCD attack resistant CRTHACS for secure group communications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups.
J. Cryptol., 2002

Efficient Key Management for Secure Group Communications with Bursty Behavior.
Proceedings of the IASTED International Conference on Communications, 2002

Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Symmetric Block Ciphers Based on Group Bases.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Semiregular Large Sets.
Des. Codes Cryptogr., 1999

The number of classes of choice functions under permutation equivalence.
Australas. J Comb., 1998

Lexical Permutation Sorting Algorithm.
Comput. J., 1997

Block Sorting and Compression.
Proceedings of the 7th Data Compression Conference (DCC '97), 1997

Enumeration of certain binary vectors.
Australas. J Comb., 1996

Lossless Image Compression with a Codebook of Block Scans.
IEEE J. Sel. Areas Commun., 1995

Lossless compression of multispectral image data.
IEEE Trans. Geosci. Remote. Sens., 1994

A Parallel Permutation Multiplier for a PGM Crypto-chip.
Proceedings of the Advances in Cryptology, 1994

Simple method for enhancing the performance of lossy plus lossless image compression schemes.
J. Electronic Imaging, 1993

Some new large sets of t-designs.
Australas. J Comb., 1993

Algebraic Properties of Cryptosystem PGM.
J. Cryptol., 1992

Some perpendicular arrays for arbitrarily large t.
Discret. Math., 1991

Some small large sets of t-designs.
Australas. J Comb., 1991

Prediction Trees and Lossless Image Compression: An Extended Abstract.
Proceedings of the IEEE Data Compression Conference, 1991

The Steiner systems S(2, 4, 25) with nontrivial automorphism group.
Discret. Math., 1989

Random Permutations from Logarithmic Signatures.
Proceedings of the Computing in the 90's, 1989

Properties of Cryptosystem PGM.
Proceedings of the Advances in Cryptology, 1989

The Number of Tilings of a Block with Blocks.
Eur. J. Comb., 1988

New infinite families of simple 5-designs.
J. Comb. Theory, Ser. A, 1987

t-Designs from the large Mathieu groups.
Discret. Math., 1981