Search the dblp DataBase
Peter Landrock :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Peter Landrock TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View. [Citation Graph (0, 0)][DBLP ] State of the Art in Applied Cryptography, 1997, pp:241-263 [Conf ] Peter Landrock Primality Tests and Use of Primes in Public-Key Systems. [Citation Graph (0, 0)][DBLP ] Lectures on Data Security, 1998, pp:127-133 [Conf ] Jørgen Brandt , Ivan Damgård , Peter Landrock Speeding up Prime Number Generation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:440-449 [Conf ] Jørgen Brandt , Ivan Damgård , Peter Landrock , Torben P. Pedersen Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:583-588 [Conf ] Jørgen Brandt , Ivan Damgård , Peter Landrock Anonymous and Verifiable Registration in Databases. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:167-176 [Conf ] Yvo Desmedt , Peter Landrock , Arjen K. Lenstra , Kevin S. McCurley , Andrew M. Odlyzko , Rainer A. Rueppel , Miles E. Smid The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:194-199 [Conf ] Louis C. Guillou , Jean-Jacques Quisquater , Michael Walker , Peter Landrock , Caroline Shafer Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:465-473 [Conf ] Bart Preneel , David Chaum , Walter Fumy , Cees J. A. Jansen , Peter Landrock , Gert Roelofsen Race Integrity Primitives Evaluation (RIPE): A Status Report. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:547-551 [Conf ] Joos Vandewalle , David Chaum , Walter Fumy , Cees J. A. Jansen , Peter Landrock , Gert Roelofsen A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:267-271 [Conf ] Virgil D. Gligor , Peter Landrock , T. Mark A. Lomas , Raphael Yahalom , John P. Warne Discussion Session: Differences Between Academic and Commercial Security. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:177-192 [Conf ] Peter Landrock Interactive Identification Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:43-48 [Conf ] Peter Landrock A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:137-145 [Conf ] Peter Landrock A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:146-153 [Conf ] Peter Landrock , Olaf Manz Classical Codes as Ideals in Group Algebras. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1992, v:2, n:3, pp:273-285 [Journal ] Frank Bernhardt , Peter Landrock , Olaf Manz The extended golay codes considered as ideals. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1990, v:55, n:2, pp:235-246 [Journal ] Jørgen Brandt , Ivan Damgård , Peter Landrock , Torben P. Pedersen Zero-Knowledge Authentication Scheme with Secret Key Exchange. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1998, v:11, n:3, pp:147-159 [Journal ] Walter Fumy , Peter Landrock Principles of Key Management. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:785-793 [Journal ] Bruno Crispo , Peter Landrock , Václav Matyás Jr. WWW security and trusted third party services. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2000, v:16, n:4, pp:331-341 [Journal ] New PKI Protocols Using Tamper Resistant Hardware. [Citation Graph (, )][DBLP ] Search in 0.050secs, Finished in 0.050secs