Cryptographers' World
 

Don Coppersmith



25 papers in database with 1760 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 17

Conference Proceedings

 
1. Don Coppersmith, editor, Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings. Springer, 1995. ISBN 3-540-60221-6.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Don Coppersmith,  Jean-Sébastien Coron,  François Grieu,  Shai Halevi,  Charanjit S. Jutla,  David Naccache,  Julien P. Stern,  Cryptanalysis of ISO/IEC 9796-1, Journal of Cryptology, Volume 21(1), pp. 27 - 51, Springer, 2008.

[Cited 3 times ]

2. Don Coppersmith,  Weakness in Quaternion Signatures, Journal of Cryptology, Volume 14(2), pp. 77 - 85, Springer, 2001.

[Cited 5 times ]

3. Don Coppersmith,  Igor Shparlinski,  On Polynomial Approximation of the Discrete Logarithm and the Diffie - Hellman Mapping, Journal of Cryptology, Volume 13(3), pp. 339 - 360, Springer, 2000.

[Cited 58 times Red Star]

4. Phillip Rogaway,  Don Coppersmith,  A Software-Optimized Encryption Algorithm, Journal of Cryptology, Volume 11(4), pp. 273 - 287, Springer, 1998.

[Cited 151 times Red StarRed Star]

5. Don Coppersmith,  Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities, Journal of Cryptology, Volume 10(4), pp. 233 - 260, Springer, 1997.

[Cited 234 times Red StarRed Star]

6. Don Coppersmith,  Jacques Stern,  Serge Vaudenay,  The Security of the Birational Permutation Signature Schemes, Journal of Cryptology, Volume 10(3), pp. 207 - 221, Springer, 1997.

[Cited 36 times ]

7. Don Coppersmith,  Modifications to the Number Field Sieve, Journal of Cryptology, Volume 6(3), pp. 169 - 180, Springer, 1993.

[Cited 65 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Don Coppersmith,  Shai Halevi,  Charanjit S. Jutla,  Cryptanalysis of Stream Ciphers with Linear Masking, pp. 515 - 532, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 91 times Red Star]

2. Don Coppersmith,  Markus Jakobsson,  Almost Optimal Hash Sequence Traversal, pp. 102 - 119, FC 2002.

[Electronic Edition][Cited 132 times Red StarRed Star]

3. Shai Halevi,  Don Coppersmith,  Charanjit S. Jutla,  Scream: A Software-Efficient Stream Cipher, pp. 195 - 209, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

4. Don Coppersmith,  Lars R. Knudsen,  Chris J. Mitchell,  Key Recovery and Forgery Attacks on the MacDES MAC Algorithm, pp. 184 - 196, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

5. Don Coppersmith,  Weakness in Quaternion Signatures, pp. 305 - 314, CRYPTO 1999.

[Electronic Edition][Cited 7 times ]

6. Don Coppersmith,  Specialized Integer Factorization, pp. 542 - 545, EUROCRYPT 1998.

[Electronic Edition][Cited 3 times ]

7. Don Coppersmith,  David Wagner,  Bruce Schneier,  John Kelsey,  Cryptanalysis of TWOPRIME, pp. 32 - 48, FSE 1998.

[Electronic Edition][Cited 7 times ]

8. Don Coppersmith,  Adi Shamir,  Lattice Attacks on NTRU, pp. 52 - 61, EUROCRYPT 1997.

[Electronic Edition][Cited 118 times Red StarRed Star]

9. Don Coppersmith,  Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known, pp. 178 - 189, EUROCRYPT 1996.

[Electronic Edition][Cited 137 times Red StarRed Star]

10. Don Coppersmith,  Finding a Small Root of a Univariate Modular Equation, pp. 155 - 165, EUROCRYPT 1996.

[Electronic Edition][Cited 158 times Red StarRed Star]

11. Don Coppersmith,  Matthew K. Franklin,  Jacques Patarin,  Michael K. Reiter,  Low-Exponent RSA with Related Messages, pp. 1 - 9, EUROCRYPT 1996.

[Electronic Edition][Cited 151 times Red StarRed Star]

12. Don Coppersmith,  Attack on the Cryptographic Scheme NIKS-TAS, pp. 294 - 307, CRYPTO 1994.

[Electronic Edition][Cited 10 times ]

13. Phillip Rogaway,  Don Coppersmith,  A Software-Optimized Encryption Algorithm, pp. 56 - 63, FSE 1993.

[Electronic Edition][Cited 103 times Red StarRed Star]

14. Don Coppersmith,  Jacques Stern,  Serge Vaudenay,  Attacks on the Birational Permutation Signature Schemes, pp. 435 - 443, CRYPTO 1993.

[Electronic Edition][Cited 45 times ]

15. Don Coppersmith,  Hugo Krawczyk,  Yishay Mansour,  The Shrinking Generator, pp. 22 - 39, CRYPTO 1993.

[Electronic Edition][Cited 245 times Red StarRed Star]

16. Don Coppersmith,  Cheating at Mental Poker, pp. 104 - 107, CRYPTO 1985.

[Electronic Edition][Cited 23 times ]

17. Don Coppersmith,  The Real Reason for Rivest's Phenomenon, pp. 535 - 536, CRYPTO 1985.

[Electronic Edition][Cited 28 times ]

18. Don Coppersmith,  Another Birthday Attack, pp. 14 - 17, CRYPTO 1985.

[Electronic Edition][Cited 51 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...