The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John Black: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Black, Martin Cochran, Martin Ryan Gardner
    Lessons Learned: A Security Analysis of the Internet Chess Club. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:245-253 [Conf]
  2. Sreekar Krishna, Greg Little, John Black, Sethuraman Panchanathan
    A wearable face recognition system for individuals with visual impairments. [Citation Graph (0, 0)][DBLP]
    ASSETS, 2005, pp:106-113 [Conf]
  3. Sreekar Krishna, Greg Little, John Black, Sethuraman Panchanathan
    iCARE interaction assistant: a wearable face recognition system for individuals with visual impairments. [Citation Graph (0, 0)][DBLP]
    ASSETS, 2005, pp:216-217 [Conf]
  4. John Voiklis, John Black, Daniel Kaplan
    SKRAPPLE: Enabling Media-Based Study Schools, Apprentice Schools, and Samba Schools. [Citation Graph (0, 0)][DBLP]
    C5, 2004, pp:34-41 [Conf]
  5. Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
    OCB: a block-cipher mode of operation for efficient authenticated encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:196-205 [Conf]
  6. John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway
    UMAC: Fast and Secure Message Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:216-233 [Conf]
  7. John Black, Phillip Rogaway
    CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:197-215 [Conf]
  8. John Black, Phillip Rogaway, Thomas Shrimpton
    Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:320-335 [Conf]
  9. John Black, Phillip Rogaway
    Ciphers with Arbitrary Finite Domains. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:114-130 [Conf]
  10. John Black, Martin Cochran, Thomas Shrimpton
    On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:526-541 [Conf]
  11. John Black, Phillip Rogaway
    A Block-Cipher Mode of Operation for Parallelizable Message Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:384-397 [Conf]
  12. John Black
    The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:328-340 [Conf]
  13. John Black, Martin Cochran, Trevor Highland
    A Study of the MD5 Attacks: Insights and Improvements. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:262-277 [Conf]
  14. Sreekar Krishna, John Black, Sethuraman Panchanathan
    Using Genetic Algorithms to Find Person-Specific Gabor Feature Detectors for Face Indexing and Recognition. [Citation Graph (0, 0)][DBLP]
    ICB, 2006, pp:182-191 [Conf]
  15. P. Kakumanu, Nikolaos G. Bourbakis, John Black, Sethuraman Panchanathan
    Document Image Dewarping Based on Line Estimation for Visually Impaired. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2006, pp:625-631 [Conf]
  16. John Black
    Keynote Address: A Management View of Systems Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 1993, pp:- [Conf]
  17. John Black, Phillip Rogaway, Thomas Shrimpton
    Encryption-Scheme Security in the Presence of Key-Dependent Messages. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:62-75 [Conf]
  18. John Black
    Compare-by-Hash: A Reasoned Analysis. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:85-90 [Conf]
  19. John Black, Hector Urtubia
    Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:327-338 [Conf]
  20. John Black, Martin Cochran, Martin Ryan Gardner
    A Security Analysis of the Internet Chess Club. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:46-52 [Journal]
  21. John Black, Phillip Rogaway
    CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:2, pp:111-131 [Journal]
  22. Phillip Rogaway, Mihir Bellare, John Black
    OCB: A block-cipher mode of operation for efficient authenticated encryption. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:3, pp:365-403 [Journal]

  23. MAC Reforgeability. [Citation Graph (, )][DBLP]


  24. Security and Privacy in a Sensor-Based Search and Rescue System. [Citation Graph (, )][DBLP]


Search in 0.027secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002