Joe-Kai Tsay

According to our database1, Joe-Kai Tsay authored at least 8 papers between 2006 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Efficient Padding Oracle Attacks on Cryptographic Hardware.
IACR Cryptol. ePrint Arch., 2012

Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols
CoRR, 2012

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols.
Proceedings of the Computer Network Security, 2012

PEVS: A Secure Electronic Voting Scheme Using Polling Booths.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

2009
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
IACR Cryptol. ePrint Arch., 2009

2008
Computationally sound mechanized proofs for basic and public-key Kerberos.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2006
Breaking and Fixing Public-Key Kerberos.
IACR Cryptol. ePrint Arch., 2006

Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.
IACR Cryptol. ePrint Arch., 2006


  Loading...