Robert J. Zuccherato

According to our database1, Robert J. Zuccherato authored at least 20 papers between 1995 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Key Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Identity Verification Protocol.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Entity Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Authentication Token.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2005
Key Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Identity Verification Protocol.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Entity Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Authentication token.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

An Attack on CFB Mode Encryption As Used By OpenPGP.
IACR Cryptol. ePrint Arch., 2005

2004
On The Security of Key Derivation Functions.
Proceedings of the Information Security, 7th International Conference, 2004

2001
ISO/IEC 9798-3 Authentication SASL Mechanism.
RFC, August, 2001

Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP).
RFC, August, 2001

Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols.
RFC, February, 2001

2000
Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME.
RFC, March, 2000

A Global PMI for Electronic Content Distribution.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

1998
Discrete Logarithm Based Cryptosystems in Quadratic Function Fields of Characteristic 2.
Des. Codes Cryptogr., 1998

Faster Attacks on Elliptic Curve Cryptosystems.
Proceedings of the Selected Areas in Cryptography '98, 1998

The Equivalence Between Elliptic Curve and Quadratic Function Field Discrete Logarithms in Characteristic 2.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

1997
Elliptic curve cryptosystems using curves of smooth order over the ring Z<sub>n</sub>.
IEEE Trans. Inf. Theory, 1997

1995
Short RSA Keys and Their Generation.
J. Cryptol., 1995


  Loading...