Cryptographers' World
 

Peter R. Wild



7 papers in database with 105 citations 

H-number: 5

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Chris J. Mitchell,  Fred Piper,  Peter R. Wild,  ID-based cryptography using symmetric primitives, Designs, Codes and Cryptography, Volume 44(1), pp. 249 - 262, Springer, 2007.

[Electronic Edition][No citation]

2. Keith M. Martin,  Reihaneh Safavi-Naini,  Huaxiong Wang,  Peter R. Wild,  Distributing the Encryption and Decryption of a Block Cipher, Designs, Codes and Cryptography, Volume 36(3), pp. 263 - 287, Springer, 2005.

[Electronic Edition][Cited 12 times ]

3. L. R. A. Casse,  Keith M. Martin,  Peter R. Wild,  Bounds and Characterizations of Authentication/Secrecy Schemes, Designs, Codes and Cryptography, Volume 13(2), pp. 107 - 129, Springer, 1998.

[Electronic Edition][Cited 10 times ]

4. Chris J. Mitchell,  Fred Piper,  Michael Walker,  Peter R. Wild,  Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 7(1), pp. 101 - 110, Springer, 1996.

[Electronic Edition][Cited 34 times ]

5. Sean Murphy,  Kenneth G. Paterson,  Peter R. Wild,  A Weak Cipher that Generates the Symmetric Group, Journal of Cryptology, Volume 7(1), pp. 61 - 65, Springer, 1994.

[Cited 8 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Simon R. Blackburn,  Mike Burmester,  Yvo Desmedt,  Peter R. Wild,  Efficient Multiplicative Sharing Schemes, pp. 107 - 118, EUROCRYPT 1996.

[Electronic Edition][Cited 37 times ]

2. Martin Anthony,  Keith M. Martin,  Jennifer Seberry,  Peter R. Wild,  Some Remarks on Authentication Systems, pp. 122 - 139, ASIACRYPT 1990.

[Electronic Edition][Cited 4 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...