The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eric R. Verheul: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheul
    Doing More with Fewer Bits. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:321-332 [Conf]
  2. Wieb Bosma, James Hutton, Eric R. Verheul
    Looking beyond XTR. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:46-63 [Conf]
  3. Arjen K. Lenstra, Eric R. Verheul
    Key Improvements to XTR. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:220-233 [Conf]
  4. Eric R. Verheul
    Self-Blindable Credential Certificates from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:533-551 [Conf]
  5. Arjen K. Lenstra, Eric R. Verheul
    The XTR Public Key System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:1-19 [Conf]
  6. Eric R. Verheul
    Selecting Secure Passwords. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:49-66 [Conf]
  7. Eric R. Verheul
    Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:195-210 [Conf]
  8. Eric R. Verheul, Henk C. A. van Tilborg
    Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:119-133 [Conf]
  9. Arjen K. Lenstra, Eric R. Verheul
    Selecting Cryptographic Key Sizes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:446-465 [Conf]
  10. Arjen K. Lenstra, Eric R. Verheul
    Fast Irreducibility and Subgroup Membership Testing in XTR. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:73-86 [Conf]
  11. Eric R. Verheul
    Certificates of Recoverability with Scale Recovery Agent Security. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:258-275 [Conf]
  12. Eric R. Verheul, Henk C. A. van Tilborg
    Cryptanalysis of `Less Short' RSA Secret Exponents. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 1997, v:8, n:5, pp:425-435 [Journal]
  13. Eric R. Verheul, Henk C. A. van Tilborg
    Constructions and Properties of k out of n Visual Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:11, n:2, pp:179-196 [Journal]
  14. Arjen K. Lenstra, Eric R. Verheul
    Selecting Cryptographic Key Sizes. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:3, pp:- [Journal]
  15. Arjen K. Lenstra, Eric R. Verheul
    Selecting Cryptographic Key Sizes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2001, v:14, n:4, pp:255-293 [Journal]
  16. Eric R. Verheul
    Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2004, v:17, n:4, pp:277-296 [Journal]

  17. An Analysis of the Vector Decomposition Problem. [Citation Graph (, )][DBLP]


  18. The security of mass transport ticketing systems. [Citation Graph (, )][DBLP]


Search in 0.109secs, Finished in 0.109secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002