Gideon Samid

Affiliations:
  • Case Western Reserve University, USA


According to our database1, Gideon Samid authored at least 33 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers.
IACR Cryptol. ePrint Arch., 2024

2023
Cryptographic Key Exchange: An Innovation Outlook.
IACR Cryptol. ePrint Arch., 2023

"Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity.
IACR Cryptol. ePrint Arch., 2023

AI Resistant (AIR) Cryptography.
IACR Cryptol. ePrint Arch., 2023

The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity.
IACR Cryptol. ePrint Arch., 2023

2022
A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion.
IACR Cryptol. ePrint Arch., 2022

2021
Pattern Devoid Cryptography.
IACR Cryptol. ePrint Arch., 2021

FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm.
IACR Cryptol. ePrint Arch., 2021

2020
Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness.
IACR Cryptol. ePrint Arch., 2020

A One-Time-Pad Alternative: Mathematical Secrecy with one round of Transposition.
IACR Cryptol. ePrint Arch., 2020

2019
When Encryption is Not Enough - Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop).
IACR Cryptol. ePrint Arch., 2019

SpaceFlip : Unbound Geometry Cryptography.
IACR Cryptol. ePrint Arch., 2019

2018
Finger Printing Data.
IACR Cryptol. ePrint Arch., 2018

"Larger Keys, Less Complexity" A Strategic Proposition.
IACR Cryptol. ePrint Arch., 2018

Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher.
IACR Cryptol. ePrint Arch., 2018

2017
BitFlip: A Randomness-Rich Cipher.
IACR Cryptol. ePrint Arch., 2017

2016
Cyber Passport: Preventing Massive Identity Theft.
IACR Cryptol. ePrint Arch., 2016

Drone Targeted Cryptography.
IACR Cryptol. ePrint Arch., 2016

T-Proof: Secure Communication via Non-Algorithmic Randomization.
IACR Cryptol. ePrint Arch., 2016

2015
The Ultimate Transposition Cipher (UTC).
IACR Cryptol. ePrint Arch., 2015

Equivoe-T: Transposition Equivocation Cryptography.
IACR Cryptol. ePrint Arch., 2015

2014
bitcoin.BitMint: Reconciling Bitcoin with Central Banks.
IACR Cryptol. ePrint Arch., 2014

2012
Hush Functions Extended to Any Size Input versus Any Size Output.
IACR Cryptol. ePrint Arch., 2012

2011
Integer Arithmetic without Arithmetic Addition.
IACR Cryptol. ePrint Arch., 2011

2010
Binomial Sieve Series - a Prospective Cryptographic Tool.
IACR Cryptol. ePrint Arch., 2010

Shannon Revisited: Considering a More Tractable Expression to Measure and Manage Intractability, Uncertainty, Risk, Ignorance, and Entropy
CoRR, 2010

2008
Encryption-On-Demand: Practical and Theoretical Considerations.
IACR Cryptol. ePrint Arch., 2008

2007
Proposing a Master One-Way Function.
IACR Cryptol. ePrint Arch., 2007

2004
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic.
IACR Cryptol. ePrint Arch., 2004

2001
Re-dividing Complexity between Algorithms and Keys.
Proceedings of the Progress in Cryptology, 2001

Encryption Sticks (Randomats).
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Essential Shannon Security with Keys Smaller Than the Encrypted Message.
IACR Cryptol. ePrint Arch., 2000

Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext.
IACR Cryptol. ePrint Arch., 2000


  Loading...