| Publication | Date of Publication | Type |
|---|
A conversation with 2024 Bertrand Russell Prize winner Susan Landau Notices of the American Mathematical Society | 2025-12-05 | Paper |
| Owl: an augmented password-authenticated key exchange scheme | 2025-05-23 | Paper |
SoK: securing email -- a stakeholder-based analysis (available as arXiv preprint) | 2022-06-17 | Paper |
Improving implementable meet-in-the-middle attacks by orders of magnitude Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Quantifying the security advantage of password expiration policies Designs, Codes and Cryptography | 2015-10-26 | Paper |
On Diffie-Hellman Key Agreement with Short Exponents Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
On the security of two MAC algorithms Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Graphical passwords: learning from the first twelve years ACM Computing Surveys | 2014-08-13 | Paper |
A white-box DES implementation for DRM applications Lecture Notes in Computer Science | 2011-03-18 | Paper |
Revisiting Software Protection Lecture Notes in Computer Science | 2010-02-09 | Paper |
A Protocol for Secure Public Instant Messaging Financial Cryptography and Data Security | 2008-09-09 | Paper |
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management Applied Cryptography and Network Security | 2007-09-24 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 1951616 (Why is no real title available?) | 2003-07-21 | Paper |
Parallel collision search with cryptanalytic applications Journal of Cryptology | 2002-09-22 | Paper |
| scientific article; zbMATH DE number 1394297 (Why is no real title available?) | 2000-01-31 | Paper |
On the security of iterated message authentication codes IEEE Transactions on Information Theory | 1999-11-21 | Paper |
| scientific article; zbMATH DE number 1030977 (Why is no real title available?) | 1997-08-14 | Paper |
| scientific article; zbMATH DE number 954401 (Why is no real title available?) | 1996-12-08 | Paper |
| scientific article; zbMATH DE number 503276 (Why is no real title available?) | 1994-03-07 | Paper |
| scientific article; zbMATH DE number 177044 (Why is no real title available?) | 1993-05-18 | Paper |
Pair-Splitting Sets in $AG ( m,q )$ SIAM Journal on Discrete Mathematics | 1993-04-01 | Paper |
| scientific article; zbMATH DE number 44362 (Why is no real title available?) | 1992-09-17 | Paper |
Subgroup Refinement Algorithms for Root Finding in $GF(q)$ SIAM Journal on Computing | 1992-06-28 | Paper |
| scientific article; zbMATH DE number 4160747 (Why is no real title available?) | 1990-01-01 | Paper |
On splitting sets in block designs and finding roots of polynomials Discrete Mathematics | 1990-01-01 | Paper |
A geometric approach to root finding in GT(q/sup m/) IEEE Transactions on Information Theory | 1989-01-01 | Paper |