Cryptographers' World
 

Douglas R. Stinson


Author's Web Page Link

52 papers and 1 book in database with 4354 citations StarStarStarStar

Editor of 2 conference proceedings books

H-number: 28

Books

 
1. Douglas R. StinsonCryptography: Theory and Practice. Chapman & Hall / CRC, 2005. ISBN 978-1-584-88508-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 2078 times Red StarRed StarRed StarRed StarRed Star]


Conference Proceedings

 
1. Douglas R. StinsonStafford E. Tavares, editors, Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings. Springer, 2001. ISBN 3-540-42069-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings. Springer, 1994. ISBN 3-540-57766-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Carlo Blundo,  Paolo D'Arco,  Alfredo De Santis,  Douglas R. Stinson,  On Unconditionally Secure Distributed Oblivious Transfer, Journal of Cryptology, Volume 20(3), pp. 323 - 373, Springer, 2007.

[Cited 8 times ]

2. Khoongming Khoo,  Guang Gong,  Douglas R. Stinson,  A New Characterization of Semi-bent and Bent Functions on Finite Fields*, Designs, Codes and Cryptography, Volume 38(2), pp. 279 - 295, Springer, 2006.

[Electronic Edition][Cited 14 times ]

3. Douglas R. Stinson,  Some Observations on the Theory of Cryptographic Hash Functions, Designs, Codes and Cryptography, Volume 38(2), pp. 259 - 277, Springer, 2006.

[Electronic Edition][Cited 30 times ]

4. Carlo Blundo,  Barbara Masucci,  Douglas R. Stinson,  Ruizhong Wei,  Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, Designs, Codes and Cryptography, Volume 26(1), pp. 97 - 110, Springer, 2002.

[Electronic Edition][Cited 15 times ]

5. Philip A. Eisen,  Douglas R. Stinson,  Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels, Designs, Codes and Cryptography, Volume 25(1), pp. 15 - 61, Springer, 2002.

[Electronic Edition][Cited 58 times Red Star]

6. Spyros S. Magliveras,  Douglas R. Stinson,  Tran van Trung,  New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups, Journal of Cryptology, Volume 15(4), pp. 285 - 297, Springer, 2002.

[Cited 37 times ]

7. Douglas R. Stinson,  Something About All or Nothing (Transforms), Designs, Codes and Cryptography, Volume 22(2), pp. 133 - 138, Springer, 2001.

[Electronic Edition][Cited 19 times ]

8. Kaoru Kurosawa,  Thomas Johansson,  Douglas R. Stinson,  Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications, Journal of Cryptology, Volume 14(4), pp. 231 - 253, Springer, 2001.

[Cited 27 times ]

9. Carlo Blundo,  Alfredo De Santis,  Douglas R. Stinson,  On the Contrast in Visual Cryptography Schemes, Journal of Cryptology, Volume 12(4), pp. 261 - 289, Springer, 1999.

[Cited 90 times Red Star]

10. Douglas R. Stinson,  Tran van Trung,  Some New Results on Key Distribution Patterns and Broadcast Encryption, Designs, Codes and Cryptography, Volume 14(3), pp. 261 - 279, Springer, 1998.

[Electronic Edition][Cited 77 times Red Star]

11. Douglas R. Stinson,  On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption, Designs, Codes and Cryptography, Volume 12(3), pp. 215 - 243, Springer, 1997.

[Electronic Edition][Cited 118 times Red StarRed Star]

12. Carlo Blundo,  Antonio Giorgio Gaggia,  Douglas R. Stinson,  On the Dealer's Randomness Required in Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 11(3), pp. 235 - 259, Springer, 1997.

[Electronic Edition][Cited 35 times ]

13. Rolf S. Rees,  Douglas R. Stinson,  Combinatorial Characterizations of Authentication Codes II, Designs, Codes and Cryptography, Volume 7(3), pp. 239 - 259, Springer, 1996.

[Electronic Edition][Cited 22 times ]

14. Douglas R. Stinson,  James L. Massey,  An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions, Journal of Cryptology, Volume 8(3), pp. 167 - 173, Springer, 1995.

[Cited 54 times Red Star]

15. Carlo Blundo,  Alfredo De Santis,  Douglas R. Stinson,  Ugo Vaccaro,  Graph Decompositions and Secret Sharing Schemes, Journal of Cryptology, Volume 8(1), pp. 39 - 64, Springer, 1995.

[Cited 96 times Red Star]

16. K. Gopalakrishnan,  Douglas R. Stinson,  Three Characterizations of Non-binary Correlation-Immune and Resilient Functions, Designs, Codes and Cryptography, Volume 5(3), pp. 241 - 251, Springer, 1995.

[Electronic Edition][Cited 41 times ]

17. Douglas R. Stinson,  Universal Hashing and Authentication Codes, Designs, Codes and Cryptography, Volume 4(4), pp. 369 - 380, Springer, 1994.

[Electronic Edition][Cited 160 times Red StarRed Star]

18. Ernest F. Brickell,  Douglas R. Stinson,  Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes, Journal of Cryptology, Volume 5(3), pp. 153 - 166, Springer, 1992.

[Cited 114 times Red StarRed Star]

19. Douglas R. Stinson,  An Explication of Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 2(4), pp. 357 - 390, Springer, 1992.

[Electronic Edition][Cited 196 times Red StarRed Star]

20. Douglas R. Stinson,  Combinatorial Characterizations of Authentication Codes, Designs, Codes and Cryptography, Volume 2(2), pp. 175 - 187, Springer, 1992.

[Electronic Edition][Cited 54 times Red Star]

21. Douglas R. Stinson,  The Combinatorics of Authentication and Secrecy Codes, Journal of Cryptology, Volume 2(1), pp. 23 - 49, Springer, 1990.

[Cited 101 times Red StarRed Star]

22. Douglas R. Stinson,  A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs, Journal of Cryptology, Volume 1(2), pp. 119 - 127, Springer, 1988.

[Cited 38 times ]

23. Douglas R. Stinson,  Some Constructions and Bounds for Authentication Codes, Journal of Cryptology, Volume 1(1), pp. 37 - 52, Springer, 1988.

[Cited 59 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Ian Goldberg,  Atefeh Mashatan,  Douglas R. Stinson,  A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks, pp. 219 - 237, ACNS 2009.

[Electronic Edition][Cited 2 times ]

2. Jooyoung Lee,  Douglas R. Stinson,  Tree-Based Key Distribution Patterns, pp. 189 - 204, SAC 2005.

[Electronic Edition][Cited 4 times ]

3. James A. Muir,  Douglas R. Stinson,  New Minimal Weight Representations for Left-to-Right Window Methods, pp. 366 - 383, CT-RSA 2005.

[Electronic Edition][Cited 29 times ]

4. Jooyoung Lee,  Douglas R. Stinson,  Deterministic Key Predistribution Schemes for Distributed Sensor Networks, pp. 294 - 307, SAC 2004.

[Electronic Edition][Cited 96 times Red Star]

5. James A. Muir,  Douglas R. Stinson,  Alternative Digit Sets for Nonadjacent Representations, pp. 306 - 319, SAC 2003.

[Electronic Edition][Cited 12 times ]

6. Paolo D'Arco,  Douglas R. Stinson,  Fault Tolerant and Distributed Broadcast Encryption, pp. 263 - 280, CT-RSA 2003.

[Electronic Edition][Cited 19 times ]

7. Paolo D'Arco,  Douglas R. Stinson,  On Unconditionally Secure Robust Distributed Key Distribution Centers, pp. 346 - 363, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

8. Carlo Blundo,  Paolo D'Arco,  Alfredo De Santis,  Douglas R. Stinson,  New Results on Unconditionally Secure Distributed Oblivious Transfer, pp. 291 - 309, SAC 2002.

[Electronic Edition][Cited 9 times ]

9. Palash Sarkar,  Douglas R. Stinson,  Frameproof and IPP Codes, pp. 117 - 126, INDOCRYPT 2001.

[Electronic Edition][Cited 18 times ]

10. Paolo D'Arco,  Douglas R. Stinson,  Generalized Zig-zag Functions and Oblivious Transfer Reductions, pp. 87 - 102, SAC 2001.

[Electronic Edition][Cited 6 times ]

11. Carlo Blundo,  Annalisa De Bonis,  Barbara Masucci,  Douglas R. Stinson,  Dynamic Multi-threshold Metering Schemes, pp. 130 - 143, SAC 2000.

[Electronic Edition][Cited 22 times ]

12. Guang Gong,  Thomas A. Berson,  Douglas R. Stinson,  Elliptic Curve Pseudorandom Sequence Generators, pp. 34 - 48, SAC 1999.

[Electronic Edition][Cited 35 times ]

13. Douglas R. Stinson,  Ruizhong Wei,  Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures, pp. 200 - 214, SAC 1999.

[Electronic Edition][Cited 27 times ]

14. Douglas R. Stinson,  Ruizhong Wei,  Key Preassigned Traceability Schemes for Broadcast Encryption, pp. 144 - 156, SAC 1998.

[Electronic Edition][Cited 77 times Red Star]

15. Kaoru Kurosawa,  Thomas Johansson,  Douglas R. Stinson,  Almost k-wise Independent Sample Spaces and Their Cryptologic Applications, pp. 409 - 421, EUROCRYPT 1997.

[Electronic Edition][Cited 32 times ]

16. Mustafa Atici,  Douglas R. Stinson,  Universal Hashing and Multiple Authentication, pp. 16 - 30, CRYPTO 1996.

[Electronic Edition][Cited 26 times ]

17. Carlo Blundo,  Luiz A. Frota Mattos,  Douglas R. Stinson,  Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution, pp. 387 - 400, CRYPTO 1996.

[Electronic Edition][Cited 81 times Red Star]

18. Jürgen Bierbrauer,  K. Gopalakrishnan,  Douglas R. Stinson,  Bounds for Resilient Functions and Orthogonal Arrays, pp. 247 - 256, CRYPTO 1994.

[Electronic Edition][Cited 44 times ]

19. Carlo Blundo,  Antonio Giorgio Gaggia,  Douglas R. Stinson,  On the Dealer's Randomness Required in Secret Sharing Schemes, pp. 35 - 46, EUROCRYPT 1994.

[Electronic Edition][Cited 38 times ]

20. Carlo Blundo,  Alfredo De Santis,  Douglas R. Stinson,  Ugo Vaccaro,  Graph Decompositions and Secret Sharing Schemes, pp. 1 - 24, EUROCRYPT 1992.

[Electronic Edition][Cited 116 times Red StarRed Star]

21. Douglas R. Stinson,  New General Lower Bounds on the Information Rate of Secret Sharing Schemes, pp. 168 - 182, CRYPTO 1992.

[Electronic Edition][Cited 41 times ]

22. Douglas R. Stinson,  Combinatorial Characterizations of Authentication Codes, pp. 62 - 73, CRYPTO 1991.

[Electronic Edition][Cited 66 times Red Star]

23. Douglas R. Stinson,  Universal Hashing and Authentication Codes, pp. 74 - 85, CRYPTO 1991.

[Electronic Edition][Cited 205 times Red StarRed Star]

24. Ernest F. Brickell,  Douglas R. Stinson,  Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes, pp. 242 - 252, CRYPTO 1990.

[Electronic Edition][Cited 131 times Red StarRed Star]

25. Ernest F. Brickell,  Douglas R. Stinson,  The Detection of Cheaters in Threshold Schemes, pp. 564 - 577, CRYPTO 1988.

[Electronic Edition][Cited 42 times ]

26. Ernest F. Brickell,  Douglas R. Stinson,  Authentication Codes with Multiple Arbiters (Extended Abstract), pp. 51 - 55, EUROCRYPT 1988.

[Electronic Edition][Cited 27 times ]

27. Douglas R. Stinson,  A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs, pp. 355 - 366, CRYPTO 1987.

[Electronic Edition][Cited 43 times ]

28. Douglas R. Stinson,  Scott A. Vanstone,  A Combinatorial Approach to Threshold Schemes, pp. 330 - 339, CRYPTO 1987.

[Electronic Edition][Cited 67 times Red Star]

29. Douglas R. Stinson,  Some Constructions and Bounds for authentication Codes, pp. 418 - 425, CRYPTO 1986.

[Electronic Edition][Cited 69 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...