| 2009 |
| 29 | EE | Thomas Martin,
Keith M. Martin,
Peter R. Wild:
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme.
Des. Codes Cryptography 51(3): 315-334 (2009) |
| 2008 |
| 28 | EE | Reihaneh Safavi-Naini,
Peter R. Wild:
Information Theoretic Bounds on Authentication Systems in Query Model.
IEEE Transactions on Information Theory 54(6): 2426-2436 (2008) |
| 2007 |
| 27 | EE | Dongvu Tonien,
Reihaneh Safavi-Naini,
Peter R. Wild:
Combinatorial characterizations of authentication codes in verification oracle model.
ASIACCS 2007: 183-193 |
| 26 | EE | Chris J. Mitchell,
Fred Piper,
Peter R. Wild:
ID-based cryptography using symmetric primitives.
Des. Codes Cryptography 44(1-3): 249-262 (2007) |
| 2006 |
| 25 | EE | Jason Crampton,
Keith M. Martin,
Peter R. Wild:
On Key Assignment for Hierarchical Access Control.
CSFW 2006: 98-111 |
| 2005 |
| 24 | EE | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptography 36(3): 263-287 (2005) |
| 2004 |
| 23 | | Chester W. J. Liu,
Peter R. Wild:
Embeddings of Steiner Quadruple Systems using Extensions of Linear Spaces.
Ars Comb. 73: (2004) |
| 2002 |
| 22 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin,
Peter R. Wild:
Size of Broadcast in Threshold Schemes with Disenrollment.
ACISP 2002: 71-88 |
| 21 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Threshold MACs.
ICISC 2002: 237-252 |
| 20 | | Chester W. J. Liu,
Peter R. Wild:
Embeddings of Steiner Quadruple Systems.
Ars Comb. 65: (2002) |
| 2001 |
| 19 | | Siaw-Lynn Ng,
Peter R. Wild:
On k-arcs Covering a Line in Finite Projective Planes.
Ars Comb. 58: (2001) |
| 2000 |
| 18 | EE | Siaw-Lynn Ng,
Peter R. Wild:
A New Family of Extended Generalized Quadrangles of Order (q + 1, q - 1).
Eur. J. Comb. 21(3): 395-406 (2000) |
| 1998 |
| 17 | | L. R. A. Casse,
Keith M. Martin,
Peter R. Wild:
Bounds and Characterizations of Authentication/Secrecy Schemes.
Des. Codes Cryptography 13(2): 107-129 (1998) |
| 16 | EE | Simon R. Blackburn,
Peter R. Wild:
Optimal Linear Perfect Hash Families.
J. Comb. Theory, Ser. A 83(2): 233-250 (1998) |
| 1997 |
| 15 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell,
Peter R. Wild:
Secret Sharing with Reusable Polynomials.
ACISP 1997: 183-193 |
| 14 | | Wen-Ai Jackson,
Peter R. Wild:
On GMW Designs and Cyclic Hadamard Designs.
Des. Codes Cryptography 10(2): 185-191 (1997) |
| 1996 |
| 13 | EE | Simon R. Blackburn,
Mike Burmester,
Yvo Desmedt,
Peter R. Wild:
Efficient Multiplicative Sharing Schemes.
EUROCRYPT 1996: 107-118 |
| 12 | | Wen-Ai Jackson,
Kathleen A. S. Quinn,
Peter R. Wild:
Quadrics and difference sets.
Ars Comb. 42: (1996) |
| 11 | | Chris J. Mitchell,
Fred Piper,
Michael Walker,
Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptography 7(1-2): 101-110 (1996) |
| 1995 |
| 10 | EE | Peter R. Wild:
Some families of semibiplanes.
Discrete Mathematics 138(1-3): 397-403 (1995) |
| 1994 |
| 9 | EE | Jonathan Jedwab,
Chris J. Mitchell,
Fred Piper,
Peter R. Wild:
Perfect binary arrays and difference sets.
Discrete Mathematics 125(1-3): 241-254 (1994) |
| 8 | | Sean Murphy,
Kenneth G. Paterson,
Peter R. Wild:
A Weak Cipher that Generates the Symmetric Group.
J. Cryptology 7(1): 61-65 (1994) |
| 7 | EE | Chris J. Mitchell,
Michael Walker,
Peter R. Wild:
The Combinatorics of Perfect Authentication Schemes.
SIAM J. Discrete Math. 7(1): 102-107 (1994) |
| 1992 |
| 6 | | Wen-Ai Jackson,
Peter R. Wild:
Relations between Two Perfect Ternary Sequence Constructions.
Des. Codes Cryptography 2(4): 325-332 (1992) |
| 5 | EE | Fred Piper,
Peter R. Wild:
Incidence structures applied to cryptography.
Discrete Mathematics 106-107: 383-389 (1992) |
| 1991 |
| 4 | EE | Wen-Ai Jackson,
Fred Piper,
Peter R. Wild:
Non-embedding of non prime- power unitals with point-regular group.
Discrete Mathematics 98(1): 23-28 (1991) |
| 1990 |
| 3 | | Martin Anthony,
Keith M. Martin,
Jennifer Seberry,
Peter R. Wild:
Some Remarks on Authentication Systems.
AUSCRYPT 1990: 122-139 |
| 1987 |
| 2 | EE | Peter R. Wild:
Difference basis systems.
Discrete Mathematics 63(1): 81-90 (1987) |
| 1983 |
| 1 | EE | Peter R. Wild:
Incidence graphs and subdesigns of semisymmetric designs.
Discrete Mathematics 44(2): 201-216 (1983) |