Cryptographers' World
 

Chris J. Mitchell


Author's Web Page Link

11 papers in database with 182 citations 

H-number: 8

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Chris J. Mitchell,  Fred Piper,  Peter R. Wild,  ID-based cryptography using symmetric primitives, Designs, Codes and Cryptography, Volume 44(1), pp. 249 - 262, Springer, 2007.

[Electronic Edition][No citation]

2. Lars R. Knudsen,  Chris J. Mitchell,  Partial Key Recovery Attack Against RMAC, Journal of Cryptology, Volume 18(4), pp. 375 - 389, Springer, 2005.

[Cited 6 times ]

3. Dieter Gollmann,  Yongfei Han,  Chris J. Mitchell,  Redundant Integer Representations and Fast Exponentiation, Designs, Codes and Cryptography, Volume 7(1), pp. 135 - 151, Springer, 1996.

[Electronic Edition][Cited 22 times ]

4. Chris J. Mitchell,  Fred Piper,  Michael Walker,  Peter R. Wild,  Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 7(1), pp. 101 - 110, Springer, 1996.

[Electronic Edition][Cited 34 times ]

5. Philippe Godlewski,  Chris J. Mitchell,  Key-Minimal Cryptosystems for Unconditional Secrecy, Journal of Cryptology, Volume 3(1), pp. 1 - 25, Springer, 1990.

[Cited 9 times ]

6. Chris J. Mitchell,  Enumerating Boolean Functions of Cryptographic Significance, Journal of Cryptology, Volume 2(3), pp. 155 - 170, Springer, 1990.

[Cited 52 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Aline Gouget,  HervĂ© Sibert,  CĂ´me Berbain,  Nicolas Courtois,  Blandine Debraize,  Chris J. Mitchell,  Analysis of the Bit-Search Generator and Sequence Compression Techniques, pp. 196 - 214, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 12 times ]

2. Arnold K. L. Yau,  Kenneth G. Paterson,  Chris J. Mitchell,  Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs, pp. 299 - 319, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

3. Luciano Rila,  Chris J. Mitchell,  Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards, pp. 254 - 264, ACNS 2003.

[Electronic Edition][Cited 8 times ]

4. Don Coppersmith,  Lars R. Knudsen,  Chris J. Mitchell,  Key Recovery and Forgery Attacks on the MacDES MAC Algorithm, pp. 184 - 196, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

5. Philippe Godlewski,  Chris J. Mitchell,  Key Minimal Authentication Systems for Unconditional Secrecy, pp. 497 - 501, EUROCRYPT 1989.

[Electronic Edition][Cited 13 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...