Fred Piper

1.3k total citations
58 papers, 705 citations indexed

About

Fred Piper is a scholar working on Artificial Intelligence, Electrical and Electronic Engineering and Computer Vision and Pattern Recognition. According to data from OpenAlex, Fred Piper has authored 58 papers receiving a total of 705 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Artificial Intelligence, 15 papers in Electrical and Electronic Engineering and 10 papers in Computer Vision and Pattern Recognition. Recurrent topics in Fred Piper's work include graph theory and CDMA systems (13 papers), Chaos-based Image/Signal Encryption (9 papers) and Coding theory and cryptography (8 papers). Fred Piper is often cited by papers focused on graph theory and CDMA systems (13 papers), Chaos-based Image/Signal Encryption (9 papers) and Coding theory and cryptography (8 papers). Fred Piper collaborates with scholars based in United Kingdom, United States and Australia. Fred Piper's co-authors include Chris J. Mitchell, Henry J. Beker, Michael J. Ganley, Seán Murphy, Peter F. Dembowski, Sean D. Murphy, Rüdiger Schack, Kenneth G. Paterson, Daniel Hughes and Peter Wild and has published in prestigious journals such as IEEE Transactions on Information Theory, Electronics Letters and Bulletin of the London Mathematical Society.

In The Last Decade

Fred Piper

47 papers receiving 631 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Fred Piper United Kingdom 13 294 233 193 156 136 58 705
George Havas Australia 14 283 1.0× 148 0.6× 250 1.3× 94 0.6× 44 0.3× 62 610
Adolfo Piperno Italy 8 318 1.1× 118 0.5× 76 0.4× 127 0.8× 150 1.1× 23 861
Andrew Klapper United States 16 697 2.4× 479 2.1× 129 0.7× 124 0.8× 158 1.2× 59 889
Daniel Panario Canada 14 623 2.1× 325 1.4× 157 0.8× 175 1.1× 92 0.7× 127 923
Wendy Myrvold Canada 16 129 0.4× 228 1.0× 99 0.5× 110 0.7× 66 0.5× 52 789
Susan Williamson United States 9 129 0.4× 101 0.4× 76 0.4× 112 0.7× 33 0.2× 24 566
Robert R. Singleton United States 5 220 0.7× 313 1.3× 202 1.0× 252 1.6× 35 0.3× 12 790
Gyula O. H. Katona Hungary 19 201 0.7× 217 0.9× 537 2.8× 132 0.8× 51 0.4× 83 990
L. H. Harper United States 12 146 0.5× 265 1.1× 280 1.5× 309 2.0× 59 0.4× 36 1.0k

Countries citing papers authored by Fred Piper

Since Specialization
Citations

This map shows the geographic impact of Fred Piper's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Fred Piper with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Fred Piper more than expected).

Fields of papers citing papers by Fred Piper

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Fred Piper. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Fred Piper. The network helps show where Fred Piper may publish in the future.

Co-authorship network of co-authors of Fred Piper

This figure shows the co-authorship network connecting the top 25 collaborators of Fred Piper. A scholar is included among the top collaborators of Fred Piper based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Fred Piper. Fred Piper is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Desmedt, Yvo & Fred Piper. (2019). Perfect Anonymity. IEEE Transactions on Information Theory. 65(6). 3990–3997.
3.
Piper, Fred. (2003). Introduction to cryptography. 1 indexed citations
4.
Piper, Fred, et al.. (2003). Introduction. Information Security Technical Report. 8(3). 5–5. 7 indexed citations
5.
Piper, Fred & Seán Murphy. (2002). Cryptography: A Very Short Introduction. CERN Document Server (European Organization for Nuclear Research). 265(30). 18166–71. 34 indexed citations
6.
Piper, Fred, Simon Blake-Wilson⋆⋆, & John C. Mitchell. (2001). Digital Signatures Security & Controls. EDPACS. 29(6). 1–1. 2 indexed citations
7.
Piper, Fred. (1997). Introduction to cryptology. Information Security Technical Report. 2(2). 10–13. 4 indexed citations
8.
Piper, Fred & Peter Wild. (1992). Incidence structures applied to cryptography. Discrete Mathematics. 106-107. 383–389. 2 indexed citations
9.
Piper, Fred, et al.. (1990). Linear recursion properties of uncorrelated binary sequences. Discrete Applied Mathematics. 27(3). 187–193. 3 indexed citations
10.
Ganley, Michael J. & Fred Piper. (1989). Cryptography and coding : based on the proceedings of a conference organized by The Institute of Mathematics and its Applications on Cryptography and Coding, held at the Royal Agricultural College, Cirencester on 15th-17th December 1986. Oxford University Press eBooks.
11.
Piper, Fred, et al.. (1989). Optimal interleaving scheme for convolutional coding. Electronics Letters. 25(22). 1517–1518. 13 indexed citations
12.
Mitchell, Chris J. & Fred Piper. (1988). Key storage in secure networks. Discrete Applied Mathematics. 21(3). 215–228. 101 indexed citations
13.
Piper, Fred. (1986). Primality and cryptography. Computer Communications. 9(6). 318–318. 1 indexed citations
14.
Mitchell, Chris J. & Fred Piper. (1985). A classification of time element speech scramblers. Royal Holloway Digital Repository (University of London). 55(11-12). 391–391. 4 indexed citations
15.
Beker, Henry J. & Fred Piper. (1985). Secure speech communications. Medical Entomology and Zoology. 52 indexed citations
16.
Beker, Henry J. & Fred Piper. (1982). Communications security: a survey of cryptography. IEE Proceedings A Physical Science, Measurement and Instrumentation, Management and Education, Reviews. 129(6). 357–376.
17.
Beker, Henry J. & Fred Piper. (1982). Communications security. A survey of cryptography. IEE Proceedings F Communications, Radar and Signal Processing. 129(5). 381–381. 1 indexed citations
18.
Hughes, Daniel & Fred Piper. (1976). On resolutions and bose's theorem. Geometriae Dedicata. 5(1). 13 indexed citations
19.
Piper, Fred. (1974). On relative difference sets and projective planes. Glasgow Mathematical Journal. 15(2). 150–154. 2 indexed citations
20.
Piper, Fred. (1967). Collineation groups containing homologies. Journal of Algebra. 6(2). 256–269. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026