Cryptographers' World
 

Thomas A. Berson


Author's Web Page Link

10 papers in database with 301 citations Star

H-number: 6

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Thomas A. Berson,  Cryptography after the Bubble: How to Make an Impact on the World, pp. 226 - 226, CT-RSA 2003.

[Electronic Edition][No citation]

2. Thomas A. Berson,  Cryptography Everywhere, pp. 72 - 72, ASIACRYPT 2000.

[Electronic Edition][No citation]

3. Guang Gong,  Thomas A. Berson,  Douglas R. Stinson,  Elliptic Curve Pseudorandom Sequence Generators, pp. 34 - 48, SAC 1999.

[Electronic Edition][Cited 35 times ]

4. Thomas A. Berson,  Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack, pp. 213 - 220, CRYPTO 1997.

[Electronic Edition][Cited 51 times Red Star]

5. Lars R. Knudsen,  Thomas A. Berson,  Truncated Differentials of SAFER, pp. 15 - 26, FSE 1996.

[Electronic Edition][Cited 65 times Red Star]

6. Thomas A. Berson,  Differential Cryptanalysis Mod 2^32 with Applications to MD5, pp. 71 - 80, EUROCRYPT 1992.

[Electronic Edition][Cited 49 times ]

7. Jean-Jacques Quisquater,  Myriam Quisquater,  Muriel Quisquater,  Michaël Quisquater,  Louis C. Guillou,  Marie Annick Guillou,  Gaïd Guillou,  Anna Guillou,  Gwenolé Guillou,  Soazig Guillou,  Thomas A. Berson,  How to Explain Zero-Knowledge Protocols to Your Children, pp. 628 - 631, CRYPTO 1989.

[Electronic Edition][Cited 83 times Red Star]

8. Thomas A. Berson,  Long Key Variants of DES, pp. 311 - 313, CRYPTO 1982.

[Electronic Edition][Cited 15 times ]

9. Thomas A. Berson,  Local Network Cryptosystem Architecture: Access Control, pp. 251 - 258, CRYPTO 1982.

[Electronic Edition][Cited 1 times ]

10. Thomas A. Berson,  Local Network Cryptosystem Architecture, pp. 73 - 78, CRYPTO 1981.

[Electronic Edition][Cited 2 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...