Tadayoshi Kohno

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Polymorphism as a defense for automated attack of websites
Applied Cryptography and Network Security
2014-07-07Paper
Helix: fast encryption and authentication in a single cryptographic primitive.
Lecture Notes in Computer Science
2010-01-05Paper
Analysis of RMAC.
Lecture Notes in Computer Science
2010-01-05Paper
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
Journal of Cryptology
2009-06-08Paper
Breaking and provably repairing the SSH authenticated encryption scheme
ACM Transactions on Information and System Security
2008-12-21Paper
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Herding Hash Functions and the Nostradamus Attack
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis
ACM Journal of Experimental Algorithmics
2005-08-04Paper
scientific article; zbMATH DE number 2088315 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2009976 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1759263 (Why is no real title available?)2002-10-13Paper


Research outcomes over time


This page was built for person: Tadayoshi Kohno