Cryptographers' World
 

Paul C. van Oorschot


Author's Web Page Link

17 papers and 1 book in database with 8125 citations StarStarStarStar

H-number: 14

Books

 
1. Alfred MenezesPaul C. van OorschotScott A. VanstoneHandbook of Applied Cryptography. Chapman & Hall / CRC, 1996. ISBN 978-0-849-38523-0.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 6496 times Red StarRed StarRed StarRed StarRed StarRed Star]


Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Paul C. van Oorschot,  Michael J. Wiener,  Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, Volume 12(1), pp. 1 - 28, Springer, 1999.

[Cited 279 times Red StarRed StarRed Star]

2. Evangelos Kranakis,  Paul C. van Oorschot,  Special Issue: Selected Areas in Cryptography - Introduction, Designs, Codes and Cryptography, Volume 12(3), pp. 213 - 0, Springer, 1997.

[Electronic Edition][No citation]

3. Whitfield Diffie,  Paul C. van Oorschot,  Michael J. Wiener,  Authentication and Authenticated Key Exchanges, Designs, Codes and Cryptography, Volume 2(2), pp. 107 - 125, Springer, 1992.

[Electronic Edition][Cited 693 times Red StarRed StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Mohammad Mannan,  Paul C. van Oorschot,  Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, pp. 88 - 103, FC 2007.

[Electronic Edition][Cited 28 times ]

2. Mohammad Mannan,  Paul C. van Oorschot,  A Protocol for Secure Public Instant Messaging, pp. 20 - 35, FC 2006.

[Electronic Edition][Cited 13 times ]

3. Ashraf Matrawy,  Paul C. van Oorschot,  Anil Somayaji,  Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management, pp. 104 - 121, ACNS 2005.

[Electronic Edition][Cited 27 times ]

4. Paul C. van Oorschot,  Stuart G. Stubblebine,  Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling, pp. 31 - 43, FC 2005.

[Electronic Edition][Cited 12 times ]

5. Tao Wan,  Evangelos Kranakis,  Paul C. van Oorschot,  S-RIP: A Secure Distance Vector Routing Protocol, pp. 103 - 119, ACNS 2004.

[Electronic Edition][Cited 15 times ]

6. Stuart G. Stubblebine,  Paul C. van Oorschot,  Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract), pp. 39 - 53, FC 2004.

[Electronic Edition][Cited 13 times ]

7. Stanley Chow,  Philip A. Eisen,  Harold Johnson,  Paul C. van Oorschot,  White-Box Cryptography and an AES Implementation, pp. 250 - 270, SAC 2002.

[Electronic Edition][Cited 82 times Red Star]

8. Paul C. van Oorschot,  Michael J. Wiener,  Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude, pp. 229 - 236, CRYPTO 1996.

[Electronic Edition][Cited 23 times ]

9. Bart Preneel,  Paul C. van Oorschot,  On the Security of Two MAC Algorithms, pp. 19 - 32, EUROCRYPT 1996.

[Electronic Edition][Cited 74 times Red Star]

10. Paul C. van Oorschot,  Michael J. Wiener,  On Diffie-Hellman Key Agreement with Short Exponents, pp. 332 - 343, EUROCRYPT 1996.

[Electronic Edition][Cited 110 times Red StarRed Star]

11. Bart Preneel,  Paul C. van Oorschot,  MDx-MAC and Building Fast MACs from Hash Functions, pp. 1 - 14, CRYPTO 1995.

[Electronic Edition][Cited 160 times Red StarRed Star]

12. Paul C. van Oorschot,  An Alternate Explanation of two BAN-logic "failures", pp. 443 - 447, EUROCRYPT 1993.

[Electronic Edition][Cited 17 times ]

13. Paul C. van Oorschot,  Michael J. Wiener,  A Known Plaintext Attack on Two-Key Triple Encryption, pp. 318 - 325, EUROCRYPT 1990.

[Electronic Edition][Cited 57 times Red Star]

14. Paul C. van Oorschot,  A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms, pp. 576 - 581, CRYPTO 1990.

[Electronic Edition][Cited 26 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...