The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Szydlo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nick Howgrave-Graham, Michael Szydlo
    A Method to Solve Cyclotomic Norm Equations. [Citation Graph (0, 0)][DBLP]
    ANTS, 2004, pp:272-279 [Conf]
  2. Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo
    Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:1-20 [Conf]
  3. Ari Juels, Ronald L. Rivest, Michael Szydlo
    The blocker tag: selective blocking of RFID tags for consumer privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:103-111 [Conf]
  4. John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
    Fourth-factor authentication: somebody you know. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:168-178 [Conf]
  5. Emmanuel Bresson, Jacques Stern, Michael Szydlo
    Threshold Ring Signatures and Applications to Ad-hoc Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:465-480 [Conf]
  6. Michael Szydlo, Burton S. Kaliski Jr.
    Proofs for Two-Server Password Authentication. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:227-244 [Conf]
  7. Michael Szydlo, Yiqun Lisa Yin
    Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:99-114 [Conf]
  8. Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo
    Fractal Merkle Tree Representation and Traversal. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:314-326 [Conf]
  9. Craig Gentry, Michael Szydlo
    Cryptanalysis of the Revised NTRU Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:299-320 [Conf]
  10. Michael Szydlo
    Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:433-448 [Conf]
  11. Michael Szydlo
    Merkle Tree Traversal in Log Space and Time. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:541-554 [Conf]
  12. Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo
    A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:88- [Conf]
  13. Ari Juels, Michael Szydlo
    A Two-Server, Sealed-Bid Auction Protocol. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:72-86 [Conf]
  14. Michael Szydlo
    A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:166-170 [Conf]
  15. Michael Szydlo
    Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:156-171 [Conf]

Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002