Spyros S. Magliveras

According to our database1, Spyros S. Magliveras authored at least 49 papers between 1981 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
The classification of Steiner triple systems on 27 points with 3-rank 24.
Des. Codes Cryptogr., 2019

2017
On Classifying Steiner Triple Systems by Their 3-Rank.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2017

2013
Foreword.
J. Math. Cryptol., 2013

On large sets of projective planes of orders 3 and 4.
Discret. Math., 2013

2012
Preface: geometry, combinatorial designs and cryptology.
Des. Codes Cryptogr., 2012

Related decompositions and new constructions of the Higman-Sims and Hall-Janko graphs.
Australas. J Comb., 2012

2011
Generating rooted trees of m nodes uniformly at random.
Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011

On Jacobsthal Binary Sequences.
Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011

Crypto applications of combinatorial group theory.
Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011

Cryptanalysis of the Tillich-Zémor Hash Function.
J. Cryptol., 2011

2010
Minimal logarithmic signatures for finite groups of Lie type.
Des. Codes Cryptogr., 2010

2009
A Public Key Cryptosystem Based on Non-abelian Finite Groups.
J. Cryptol., 2009

Compression Independent Reversible Encryption for Privacy in Video Surveillance.
EURASIP J. Inf. Secur., 2009

Discrete logarithms for finite groups.
Computing, 2009

2008
Primitive sets in a lattice.
Australas. J Comb., 2008

Compression independent object encryption for ensuring privacy in video surveillance.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Notes on the CRTDH Group Key Agreement Protocol.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
New approaches to encryption and steganography for digital videos.
Multim. Syst., 2007

Secure and efficient key management in mobile ad hoc networks.
J. Netw. Comput. Appl., 2007

Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations.
EURASIP J. Inf. Secur., 2007

2006
A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006

2005
On public-key cryptosystems based on combinatorial group theory.
IACR Cryptol. ePrint Arch., 2005

Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Secure and Efficient Key Management in Mobile Ad Hoc Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

2004
A GCD attack resistant CRTHACS for secure group communications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2002
New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups.
J. Cryptol., 2002

Efficient Key Management for Secure Group Communications with Bursty Behavior.
Proceedings of the IASTED International Conference on Communications, 2002

2001
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Symmetric Block Ciphers Based on Group Bases.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

1999
Semiregular Large Sets.
Des. Codes Cryptogr., 1999

1998
The number of classes of choice functions under permutation equivalence.
Australas. J Comb., 1998

1997
Lexical Permutation Sorting Algorithm.
Comput. J., 1997

Block Sorting and Compression.
Proceedings of the 7th Data Compression Conference (DCC '97), 1997

1996
Enumeration of certain binary vectors.
Australas. J Comb., 1996

1995
Lossless Image Compression with a Codebook of Block Scans.
IEEE J. Sel. Areas Commun., 1995

1994
Lossless compression of multispectral image data.
IEEE Trans. Geosci. Remote. Sens., 1994

A Parallel Permutation Multiplier for a PGM Crypto-chip.
Proceedings of the Advances in Cryptology, 1994

1993
Simple method for enhancing the performance of lossy plus lossless image compression schemes.
J. Electronic Imaging, 1993

Some new large sets of t-designs.
Australas. J Comb., 1993

1992
Algebraic Properties of Cryptosystem PGM.
J. Cryptol., 1992

1991
Some perpendicular arrays for arbitrarily large t.
Discret. Math., 1991

Some small large sets of t-designs.
Australas. J Comb., 1991

Prediction Trees and Lossless Image Compression: An Extended Abstract.
Proceedings of the IEEE Data Compression Conference, 1991

1989
The Steiner systems S(2, 4, 25) with nontrivial automorphism group.
Discret. Math., 1989

Random Permutations from Logarithmic Signatures.
Proceedings of the Computing in the 90's, 1989

Properties of Cryptosystem PGM.
Proceedings of the Advances in Cryptology, 1989

1988
The Number of Tilings of a Block with Blocks.
Eur. J. Comb., 1988

1987
New infinite families of simple 5-designs.
J. Comb. Theory, Ser. A, 1987

1981
t-Designs from the large Mathieu groups.
Discret. Math., 1981


  Loading...