Search the dblp DataBase
Michael Szydlo :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Nick Howgrave-Graham , Michael Szydlo A Method to Solve Cyclotomic Norm Equations. [Citation Graph (0, 0)][DBLP ] ANTS, 2004, pp:272-279 [Conf ] Craig Gentry , Jakob Jonsson , Jacques Stern , Michael Szydlo Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:1-20 [Conf ] Ari Juels , Ronald L. Rivest , Michael Szydlo The blocker tag: selective blocking of RFID tags for consumer privacy. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:103-111 [Conf ] John G. Brainard , Ari Juels , Ronald L. Rivest , Michael Szydlo , Moti Yung Fourth-factor authentication: somebody you know. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:168-178 [Conf ] Emmanuel Bresson , Jacques Stern , Michael Szydlo Threshold Ring Signatures and Applications to Ad-hoc Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:465-480 [Conf ] Michael Szydlo , Burton S. Kaliski Jr. Proofs for Two-Server Password Authentication. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:227-244 [Conf ] Michael Szydlo , Yiqun Lisa Yin Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:99-114 [Conf ] Markus Jakobsson , Frank Thomson Leighton , Silvio Micali , Michael Szydlo Fractal Merkle Tree Representation and Traversal. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:314-326 [Conf ] Craig Gentry , Michael Szydlo Cryptanalysis of the Revised NTRU Signature Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:299-320 [Conf ] Michael Szydlo Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:433-448 [Conf ] Michael Szydlo Merkle Tree Traversal in Log Space and Time. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:541-554 [Conf ] Richard Clayton , Drew Dean , Markus Jakobsson , Steven Myers , Stuart G. Stubblebine , Michael Szydlo A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:88- [Conf ] Ari Juels , Michael Szydlo A Two-Server, Sealed-Bid Auction Protocol. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:72-86 [Conf ] Michael Szydlo A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:166-170 [Conf ] Michael Szydlo Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:156-171 [Conf ] Search in 0.021secs, Finished in 0.022secs