Robert J. Zuccherato
According to our database1,
Robert J. Zuccherato
authored at least 20 papers
between 1995 and 2011.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IACR Cryptol. ePrint Arch., 2005
2004
Proceedings of the Information Security, 7th International Conference, 2004
2001
RFC, August, 2001
Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols.
RFC, February, 2001
2000
Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME.
RFC, March, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
1998
Discrete Logarithm Based Cryptosystems in Quadratic Function Fields of Characteristic 2.
Des. Codes Cryptogr., 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
The Equivalence Between Elliptic Curve and Quadratic Function Field Discrete Logarithms in Characteristic 2.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
1997
Elliptic curve cryptosystems using curves of smooth order over the ring Z<sub>n</sub>.
IEEE Trans. Inf. Theory, 1997
1995