Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Cryptanalysis Mod 2^32 with Applications to MD5.. EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 71-80. Springer, (1992)How to Explain Zero-Knowledge Protocols to Your Children., , , , , , , , , and 1 other author(s). CRYPTO, volume 435 of Lecture Notes in Computer Science, page 628-631. Springer, (1989)Polonium: An Identity Authentication System., , and . S&P, page 101-107. IEEE Computer Society, (1985)Local Network Cryptosystem Architecture.. CRYPTO, page 73-78. U. C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, (1981)Local Network Cryptosystem Architecture., and . COMPCON, page 138-144. IEEE Computer Society, (1982)Multilevel Security for Knowledge-Based Systems., and . S&P, page 235-242. IEEE Computer Society, (1987)Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack.. CRYPTO, volume 1294 of Lecture Notes in Computer Science, page 213-220. Springer, (1997)Long Key Variants of DES.. CRYPTO, page 311-313. Plenum Press, New York, (1982)Processor-per-Domain Guard Architecture., , and . S&P, page 120. IEEE Computer Society, (1983)Guest Editors' Introduction Security and Privacy., and . IEEE Trans. Software Eng., 16 (6): 561-562 (1990)