Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Ernest F. Brickell
Search web for home page
Program Committees
1
2009
CHES
pc
2
1999
CHES
pc
3
1995
Crypto
pc
4
1994
Eurocrypt
pc
5
1993
Crypto
pc
6
1992
Crypto
pc chair
7
1987
Crypto
pc
8
1986
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Recent Advances and Existing Research Questions in Platform Security
crypto
570
2
2010
A Pairing-Based DAA Scheme Further Reducing TPM Resources
eprint
online
3
2009
Enhanced Privacy ID from Bilinear Pairing
eprint
online
4
2008
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
eprint
online
5
2008
A Vision for Platform Security
ches
444
6
2007
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
eprint
online
7
2006
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
eprint
online
8
2004
Direct Anonymous Attestation
eprint
online
9
2000
Design Validations for Discrete Logarithm Based Signature Schemes
pkc
276-292
10
1992
An Interactive Identification Scheme Based on Discrete Logarithms and Factoring
jofc
29-39
11
1992
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
jofc
153-166
12
1992
Fast Exponentiation with Precomputation (Extended Abstract)
eurocrypt
200-207
13
1991
On the Classification of Ideal Secret Sharing Schemes
jofc
123-134
14
1990
An Interactive Identification Scheme Based on Discrete Logarithms and Factoring
eurocrypt
63-71
15
1990
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
crypto
242-252
16
1989
Some Ideal Secret Sharing Schemes
eurocrypt
468-475
17
1989
A Survey of Hardware Implementation of RSA (Abstract)
crypto
368-370
18
1989
On the Classification of Idea Secret Sharing Schemes
crypto
278-285
19
1989
Cryptanalysis of Video Encryption Based on Space-Filling Curves
eurocrypt
403-411
20
1988
Authentication Codes with Multiple Arbiters (Extended Abstract)
eurocrypt
51-55
21
1988
The Detection of Cheaters in Threshold Schemes
crypto
564-577
22
1988
An Observation on the Security of McEliece's Public-Key Cryptosystem
eurocrypt
275-280
23
1987
On Privacy Homomorphisms (Extended Abstract)
eurocrypt
117-125
24
1987
Gradual and Verifiable Release of a Secret
crypto
156-166
25
1987
Secure Audio Teleconference
crypto
418-426
26
1986
Cryptanalysis of the Yagisawa Public Key Cryptosystem
eurocrypt
21-22
27
1986
Structure in the S-boxes of the DES
crypto
3-8
28
1985
An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi
crypto
28-32
29
1984
Breaking Iterated Knapsacks
crypto
342-358
30
1983
Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems
crypto
39-42
31
1983
Solving Low Density Knapsacks
crypto
25-37
32
1982
Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2
p
)
crypto
15-19
33
1982
A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography
crypto
51-60
34
1982
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems
crypto
289-301
Coauthors of Ernest F. Brickell
Michael Bertilsson
Jan Camenisch
David Chaum
Liqun Chen
Ivan Damgård
Daniel M. Davenport
James A. Davis
John M. DeLaurentis
Daniel M. Gordon
Jeroen van de Graaf
Gary Graunke
Ingemar Ingemarsson
J. C. Lagarias
Pil Joong Lee
Jiangtao Li
Kevin S. McCurley
Judy H. Moore
Michael Neve
Andrew M. Odlyzko
David Pointcheval
M. R. Purtill
Jean-Pierre Seifert
Gustavus J. Simmons
Douglas R. Stinson
Serge Vaudenay
David Bruce Wilson
Yacov Yacobi
Moti Yung