Cryptographers' World
 

Ben J. M. Smeets



10 papers in database with 372 citations Star

H-number: 7

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Marten van Dijk,  Christian Gehrmann,  Ben J. M. Smeets,  Unconditionally Secure Group Authentication, Designs, Codes and Cryptography, Volume 14(3), pp. 281 - 296, Springer, 1998.

[Electronic Edition][Cited 6 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Vladimor V. Chepyzhov,  Thomas Johansson,  Ben J. M. Smeets,  A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers, pp. 181 - 195, FSE 2000.

[Electronic Edition][Cited 115 times Red StarRed Star]

2. Valentine Afanassiev,  Christian Gehrmann,  Ben J. M. Smeets,  Fast Message Authentication Using Efficient Polynomial Evaluation, pp. 190 - 204, FSE 1997.

[Electronic Edition][Cited 16 times ]

3. Thomas Johansson,  Ben J. M. Smeets,  On A-Codes Including Arbiter's Attacks, pp. 456 - 460, EUROCRYPT 1994.

[Electronic Edition][Cited 2 times ]

4. Jürgen Bierbrauer,  Thomas Johansson,  Gregory Kabatianskii,  Ben J. M. Smeets,  On Families of Hash Functions via Geometric Codes and Concatenation, pp. 331 - 342, CRYPTO 1993.

[Electronic Edition][Cited 69 times Red Star]

5. Thomas Johansson,  Gregory Kabatianskii,  Ben J. M. Smeets,  On the Relation between A-Codes and Codes Correcting Independent Errors, pp. 1 - 11, EUROCRYPT 1993.

[Electronic Edition][Cited 49 times ]

6. Vladimor V. Chepyzhov,  Ben J. M. Smeets,  On A Fast Correlation Attack on Certain Stream Ciphers, pp. 176 - 185, EUROCRYPT 1991.

[Electronic Edition][Cited 97 times Red Star]

7. Ben J. M. Smeets,  Peter Vanroose,  Zhe-xian Wan,  On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2, pp. 306 - 312, EUROCRYPT 1990.

[Electronic Edition][Cited 11 times ]

8. Ben J. M. Smeets,  William G. Chambers,  Windmill Generators: A Generalization and an Observation of How Many There Are, pp. 325 - 330, EUROCRYPT 1988.

[Electronic Edition][Cited 7 times ]

9. Ben J. M. Smeets,  On the Use of the Binary Multiplying Channel in a Private Communication System, pp. 339 - 348, EUROCRYPT 1984.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...