The following pages link to Paul C. van Oorschot (Q1284009):
Displaying 28 items.
- (Q887423) (redirect page) (← links)
- Quantifying the security advantage of password expiration policies (Q887424) (← links)
- On splitting sets in block designs and finding roots of polynomials (Q915734) (← links)
- Parallel collision search with cryptanalytic applications (Q1284011) (← links)
- SoK: securing email -- a stakeholder-based analysis (Q2145401) (← links)
- Graphical passwords (Q2875084) (← links)
- On the Security of Two MAC Algorithms (Q2876884) (← links)
- On Diffie-Hellman Key Agreement with Short Exponents (Q2876913) (← links)
- A White-Box DES Implementation for DRM Applications (Q3082978) (← links)
- Revisiting Software Protection (Q3404387) (← links)
- Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude (Q3452354) (← links)
- (Q3487355) (← links)
- A Protocol for Secure Public Instant Messaging (Q3524120) (← links)
- Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management (Q3593136) (← links)
- Subgroup Refinement Algorithms for Root Finding in $GF(q)$ (Q3990651) (← links)
- (Q3993492) (← links)
- Pair-Splitting Sets in $AG ( m,q )$ (Q4030182) (← links)
- (Q4036885) (← links)
- (Q4279604) (← links)
- (Q4343417) (← links)
- (Q4413867) (← links)
- Applied Cryptography and Network Security (Q4680976) (← links)
- On the security of iterated message authentication codes (Q4701253) (← links)
- (Q4718481) (← links)
- A geometric approach to root finding in GT(q/sup m/) (Q4729880) (← links)
- (Q4934710) (← links)
- Information and Communications Security (Q5464804) (← links)
- Financial Cryptography and Data Security (Q5712261) (← links)