Gregory V. Bard
Affiliations:- University of Maryland, College Park, USA
According to our database1,
Gregory V. Bard
authored at least 27 papers
between 2004 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2019
Determining whether a given cryptographic function is a permutation of another given cryptographic function - A problem in intellectual property.
Theor. Comput. Sci., 2019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
IEEE Secur. Priv., 2019
2015
2012
Cryptologia, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
CoRR, 2011
CoRR, 2011
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011
2010
ACM Trans. Math. Softw., 2010
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems.
IACR Cryptol. ePrint Arch., 2010
Abstract only: DEMOCRACY: a heuristic for polynomial systems of equations over finite fields.
ACM Commun. Comput. Algebra, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications.
IACR Cryptol. ePrint Arch., 2009
The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property.
IACR Cryptol. ePrint Arch., 2009
2008
2007
Algorithms for Solving Linear and Polynomial Systems of Equations over Finite Fields with Applications to Cryptanalysis.
PhD thesis, 2007
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Cryptography and Coding, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
2004
IACR Cryptol. ePrint Arch., 2004