|
Search the dblp DataBase
Chanathip Namprempre:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ron Weiss, Bienvenido Vélez, Mark A. Sheldon, Chanathip Namprempre, Peter Szilagyi, Andrzej Duda, David K. Gifford
HyPursuit: A Hierarchical Network Search Engine that Exploits Content-Link Hypertext Clustering. [Citation Graph (2, 0)][DBLP] Hypertext, 1996, pp:180-193 [Conf]
- Mihir Bellare, Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:531-545 [Conf]
- Chanathip Namprempre
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:515-532 [Conf]
- Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:1-11 [Conf]
- Chanathip Namprempre, Jeremy B. Sussman, Keith Marzullo
Implementing Causal Logging Using OrbixWeb Interception. [Citation Graph (0, 0)][DBLP] COOTS, 1999, pp:57-68 [Conf]
- Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre
Online Ciphers and the Hash-CBC Construction. [Citation Graph (0, 0)][DBLP] CRYPTO, 2001, pp:292-309 [Conf]
- Michel Abdalla, Sara K. Miner, Chanathip Namprempre
Forward-Secure Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:441-456 [Conf]
- Michel Abdalla, Chanathip Namprempre, Gregory Neven
On the (Im)possibility of Blind Message Authentication Codes. [Citation Graph (0, 0)][DBLP] CT-RSA, 2006, pp:262-279 [Conf]
- Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2002, pp:418-433 [Conf]
- Mihir Bellare, Chanathip Namprempre, Gregory Neven
Security Proofs for Identity-Based Identification and Signature Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:268-286 [Conf]
- Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2001, pp:309-328 [Conf]
- Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2003, v:16, n:3, pp:185-215 [Journal]
- Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:206-241 [Journal]
- Mihir Bellare, Chanathip Namprempre, Gregory Neven
Unrestricted Aggregate Signatures. [Citation Graph (0, 0)][DBLP] ICALP, 2007, pp:411-422 [Conf]
Search in 0.005secs, Finished in 0.006secs
|