Cryptographers' World
 

Tadayoshi Kohno


Author's Web Page Link

11 papers in database with 639 citations StarStar

H-number: 9

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Journal of Cryptology, Volume 21(3), pp. 350 - 391, Springer, 2008.

[Cited 83 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, pp. 205 - 222, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 154 times Red StarRed Star]

2. John Kelsey,  Tadayoshi Kohno,  Bruce Schneier,  Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, pp. 75 - 93, FSE 2000.

[Electronic Edition][Cited 99 times Red Star]

3. John Kelsey,  Tadayoshi Kohno,  Herding Hash Functions and the Nostradamus Attack, pp. 183 - 200, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 98 times Red Star]

4. Niels Ferguson,  Doug Whiting,  Bruce Schneier,  John Kelsey,  Stefan Lucks,  Tadayoshi Kohno,  Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive, pp. 330 - 346, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 92 times Red Star]

5. Mihir Bellare,  Tadayoshi Kohno,  A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications, pp. 491 - 506, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 57 times Red Star]

6. Mihir Bellare,  Tadayoshi Kohno,  Hash Function Balance and Its Impact on Birthday Attacks, pp. 401 - 418, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 53 times Red Star]

7. Tadayoshi Kohno,  John Viega,  Doug Whiting,  CWC: A High-Performance Conventional Authenticated Encryption Mode, pp. 408 - 426, FSE 2004.

[Electronic Edition][Cited 53 times Red Star]

8. Tetsu Iwata,  Tadayoshi Kohno,  New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms, pp. 427 - 445, FSE 2004.

[Electronic Edition][Cited 15 times ]

9. Lars R. Knudsen,  Tadayoshi Kohno,  Analysis of RMAC, pp. 182 - 191, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

10. Tadayoshi Kohno,  Mark McGovern,  On the Global Content PMI: Improved Copy-Protected Internet Content Distribution, pp. 70 - 81, FC 2001.

[Electronic Edition][Cited 3 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...