Cryptographers' World
 

Gustavus J. Simmons



23 papers in database with 1404 citations StarStar

H-number: 15

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Gustavus J. Simmons,  Proof of Soundness (Integrity) of Cryptographic Protocols, Journal of Cryptology, Volume 7(2), pp. 69 - 77, Springer, 1994.

[Cited 11 times ]

2. Gustavus J. Simmons,  A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration, Journal of Cryptology, Volume 2(2), pp. 77 - 104, Springer, 1990.

[Cited 67 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Gustavus J. Simmons,  Subliminal Communication is Easy Using the DSA, pp. 218 - 232, EUROCRYPT 1993.

[Electronic Edition][Cited 90 times Red Star]

2. Gustavus J. Simmons,  The Consequences of Trust in Shared Secret Schemes, pp. 448 - 452, EUROCRYPT 1993.

[Electronic Edition][Cited 3 times ]

3. Ingemar Ingemarsson,  Gustavus J. Simmons,  A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutually Trusted Party, pp. 266 - 282, EUROCRYPT 1990.

[Electronic Edition][Cited 75 times Red Star]

4. Gustavus J. Simmons,  Geometric Shared Secret and/or Shared Control Schemes, pp. 216 - 241, CRYPTO 1990.

[Electronic Edition][Cited 17 times ]

5. Gustavus J. Simmons,  Prepositioned Shared Secret and/or Shared Control Schemes, pp. 436 - 467, EUROCRYPT 1989.

[Electronic Edition][Cited 41 times ]

6. Gustavus J. Simmons,  How to (Really) Share a Secret, pp. 390 - 448, CRYPTO 1988.

[Electronic Edition][Cited 126 times Red StarRed Star]

7. Gustavus J. Simmons,  George B. Purdy,  Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts, pp. 35 - 49, EUROCRYPT 1988.

[Electronic Edition][Cited 17 times ]

8. Gustavus J. Simmons,  An Impersonation-Proof Identity Verification Scheme, pp. 211 - 215, CRYPTO 1987.

[Electronic Edition][Cited 17 times ]

9. Gustavus J. Simmons,  A Natural Taxonomy for Digital Information Authentication Schemes, pp. 269 - 288, CRYPTO 1987.

[Electronic Edition][Cited 13 times ]

10. Gustavus J. Simmons,  Message Authentication with Arbitration of Transmitter/Receiver Disputes, pp. 151 - 165, EUROCRYPT 1987.

[Electronic Edition][Cited 56 times Red Star]

11. Judy H. Moore,  Gustavus J. Simmons,  Cycle Structures of the DES with Weak and Semi-Weak Keys, pp. 9 - 32, CRYPTO 1986.

[Electronic Edition][Cited 30 times ]

12. Judy H. Moore,  Gustavus J. Simmons,  Cycle Structure of the Weak and Semi-Weak DES Keys, pp. 16 - 16, EUROCRYPT 1986.

[Electronic Edition][Cited 23 times ]

13. Gustavus J. Simmons,  A Secure Subliminal Channel (?), pp. 33 - 41, CRYPTO 1985.

[Electronic Edition][Cited 39 times ]

14. Gustavus J. Simmons,  The Practice of Authentication, pp. 261 - 272, EUROCRYPT 1985.

[Electronic Edition][Cited 8 times ]

15. Gustavus J. Simmons,  Authentication Theory/Coding Theory, pp. 411 - 431, CRYPTO 1984.

[Electronic Edition][Cited 226 times Red StarRed Star]

16. James A. Davis,  Diane B. Holdridge,  Gustavus J. Simmons,  Status Report on Factoring (At the Sandia National Laboratories), pp. 183 - 215, EUROCRYPT 1984.

[Electronic Edition][Cited 15 times ]

17. Gustavus J. Simmons,  The Subliminal Channel and Digital Signature, pp. 364 - 378, EUROCRYPT 1984.

[Electronic Edition][No citation]

18. Gustavus J. Simmons,  The Prisoners' Problem and the Subliminal Channel, pp. 51 - 67, CRYPTO 1983.

[Electronic Edition][Cited 525 times Red StarRed StarRed StarRed Star]

19. Ernest F. Brickell,  James A. Davis,  Gustavus J. Simmons,  A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems, pp. 289 - 301, CRYPTO 1982.

[Electronic Edition][Cited 3 times ]

20. Gustavus J. Simmons,  A System for Point-of-Sale or Access User Authentication and Identification, pp. 31 - 37, CRYPTO 1981.

[Electronic Edition][Cited 2 times ]

21. George B. Purdy,  Gustavus J. Simmons,  James Studier,  Software Protection Using ``Communal Key Cryptosystems'', pp. 79 - 79, CRYPTO 1981.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...