DBLP Bibliography Server


Conference and Journal Papers

 

Looking Back at a New Hash Function
In ACISP’08. Wollongong, Australia, July 2008.   
(With O. Billet, M. Robshaw, and Y. Seurin).

 

Accelerating the Whirlpool Hash Function using Parallel Table Lookup and Fast Cyclical Permutation.
In FSE’08. Lausanne, Switzerland, February 2008.  
(With Y. Hilewitz and R.B. Lee).

 

Searching Monotone Multi-dimensional Arrays.
In Discrete Mathematics 308 (11): 2213-2221. 2008.  
(With Y. Cheng and X.M. Sun).

 

On Searching a Table Consistent with Division Poset.
In Theoretical Computer Science 370 (1-3): 240-253. 2007.  
(With Y. Cheng and X. Chen).

 

Forgery and partial key recovery attacks on HMAC and NMAC using hash collisions.
In Asiacrypt’06. Shanghai, PR China, December 2006. Extended version
Also appeared in the 2nd NIST Hash Function Workshop. August 2006. 
(With S. Contini).

 

Collision-resistant usage of MD5 and SHA-1 via message pre-processing.
In the 15th Annual RSA Conference – Cryptographer’s Track (CT-RSA’06). San Jose, CA, 2006. Extended version
Also appeared in the 1st NIST Hash Function Workshop. October 2005. 
(With M. Szydlo).

 

Finding collisions in the full SHA-1.
In Crypto’05. Santa Barbara, CA, 2005. Proceeding version  Presentation at Crypto'05
(With X. Wang and H. Yu).

 

Efficient collision search attacks on SHA-0. Proceeding version
In Crypto’05.
Santa Barbara, CA, 2005.
(With X. Wang and H. Yu).

 

A traitor tracing scheme based on RSA for fast decryption.
In the 3rd Conference on Applied Cryptography and Network Security (ACNS’05). New York City, NY, 2005.
(With R. Lee and P. McGregor).

 

Design and analysis of password-based key derivation functions.
In the 14th Annual RSA Conference – Cryptographer’s Track (CT-RSA’05). San Francisco, CA, 2005.
(With F. Yao).

 

On permutation operations in cipher design.
In ITCC 2004. Las Vegas, NV, 2004.
(With R. Lee, Z. Shi, R.
Rivest, and M. Robshaw).

 

Fast software-based attacks on SecurID.
In the 11th International Workshop on Fast Software Encryption. Delhi, India, 2004.

(With S. Contini).

 

A practical-oriented treatment of pseudo-random number generators.
In Advances in Cryptology - Eurocrypt'02. Amsterdam, Holland, 2002.
(With A. Desai and A. Hevia).

 

Efficient software implementation for finite field multiplication in normal basis.
In the 3rd International Conference on Information and Computer Security. Xi An, China, 2001.
(With P. Ning).

 

Security and cryptography in mobile communication.
In the 4th International Symposium on Wireless Personal Multimedia Communications. Aalborg, Denmark, 2001.
(With T. Okamoto).

 

Efficient methods for integrating traceability and broadcast encryption.
In Advances in Cryptology - Crypto'99. Santa Barbara, CA, 1999.
(With E. Gafni and J. Staddon).

 

On differential properties of data-dependent rotations and their use in MARS and RC6.
In the 2nd Conference on Advanced Encryption Standard (AES). February 1999.
(With S. Contini).

 

Improved analysis of some simplified variants of RC6.
In the 6th International Workshop on Fast Software Encryption. Rome, Italy, 1999.
(With S. Contini, R.
Rivest, and M. Robshaw).

 

The RC6 block cipher.
In the First Conference on Advanced Encryption Standard (AES). Ventura, CA, 1998.
(With R.
Rivest, M. Robshaw, and R. Sidney). pdf

 

Storage-efficient finite field basis conversion.
In the 5th Annual Workshop on Selected Areas in Cryptography. Kingston, Canada, 1998.
(With B. Kaliski).

 

General methods of enhancing security by multiple intractabilitiy assumptions
- Duality between encryption and signature.

In IEEE International Symposium on Information Theory and Its Applications. Victoria, Canada, 1995.
(With B. Blakley and L. Chen).

 

On differential and linear cryptanalysis of the RC5 encryption algorithm.
In Advances in Cryptology -Crypto'95. Santa Barbara, CA, 1995.
(With B. Kaliski).

 

Being taught can be faster than asking questions.
In the 8th Annual ACM Conference on Computational Learning Theory. Santa Cruz, CA, 1995.
(With R.
Rivest).

 

Reducing the number of examples in self-directed learning.
In the 8th Annual ACM Conference on Computational Learning Theory. Santa Cruz, CA, 1995.

 

Optimal constructions of hybrid algorithms.
In Journal of Algorithms, vol. 29, 1998.
Conference version appeared in the 5th Annual ACM-SIAM Symposium on Discrete Algorithms, 1994.
(With M. Kao, Y. Ma, and M. Sipser).

 

Simulation results for a new two-armed bandit heuristic.
In the 1st Conference on Computational Learning and Natural Learning. Princeton, NJ, 1990.
(With R.
Rivest).
   



Granted patents

 

Method and system for generation of cryptographic keys and the like.
Patent No. 7,359,509. Issue date: April 15, 2008.
(With M. Campagna).

 

Enhanced ANSI X9.17 pseudorandom number generators with forward security.
Patent No. 7,227,951. Issue date: June 5, 2007.
(With A. Desai and A. Hevia).

 

Efficient finite field multiplication in normal basis.
Patent No. 6,389,442. Issue date: May 14, 2002.
(With B. Kaliski).

 

Enhanced block cipher with data-dependent rotations.
Patent No: 6,269,163. Issue Data: July 31, 2001.
(With R.
Rivest, M. Robshaw, and R. Sidney).

 

Secure user identification based on constrained polynomials.
Patent No. 6,076,163. Issue date: June 13, 2000.
(With J. Hoffstein, B. Kaliski, D. Lieman, and M. Robshaw).

 

Methods and apparatus for efficient finite field basis conversion.
Patent No. 5,854,759. Issue date: December 29, 1998.
(With P. Ning).
 



Technical Notes

 

Securing MIPv6 binding updates using address based keys (ABKs).
IETF Internet Draft, 2002.
(With J. Kempf, C. Gentry, A. Silverberg, A. Desai, and S. Okazaki).

 

Secure network access using router discovery and AAA.
IETF Internet Draft, 2001.
(With A.
Yegin, X. He, C. Williams, S. Okazaki).

 

The camellia cipher algorithm and its use with IPSEC.
IETF Internet Draft, 2001.
(With S. Moriai and S. Okazaki).

 

Potential Flaws in the Conjectured Resistance of MARS to Linear Cryptanalysis.
Submitted to NIST as AES public comments. 2000.
(With M.
Robshaw).

 

Cryptanalysis of Twofish (II).
Technical Report, IEICE, ISEC2000-38, 2000.
(With S. Moriai).

 

The security of the RC6 block cipher.
RSA Laboratories Technical Report, 1998.
(With S. Contini, R.
Rivest, and M. Robshaw).

 

On the security of the RC5 encryption algorithm.
RSA Laboratories Technical Report, 1998.
(With B. Kaliski).

 

Elliptic curve cryptosystems.
RSA Laboratories Technical Report, 1997.
(With M. Robshaw).

 

Survey of technologies in electronic commerce.
RSA Laboratories Technical Report, 1997.
(With A. Juels).