Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Douglas R. Stinson
Search web for home page
Program Committees
1
2011
Eurocrypt
pc
2
2005
Eurocrypt
pc
3
2005
Asiacrypt
pc
4
2003
Eurocrypt
pc
5
2001
Crypto
pc
6
2000
Crypto
pc
7
1997
Crypto
pc
8
1995
Eurocrypt
pc
9
1993
Crypto
pc chair
10
1990
Crypto
pc
Publications
year
title
booktitle
pages
1
2010
Short One-Time Signatures
eprint
online
2
2010
On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions
eprint
online
3
2009
Anonymity in Shared Symmetric Key Primitives
eprint
online
4
2008
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
eprint
online
5
2008
Combinatorial batch codes
eprint
online
6
2008
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
eprint
online
7
2008
On The Security of The ElGamal Encryption Scheme and Damgards Variant
eprint
online
8
2008
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
eprint
online
9
2008
Recognition in Ad Hoc Pervasive Networks
eprint
online
10
2007
Authorship Proof for Textual Document
eprint
online
11
2007
A Bound on the Size of Separating Hash Families
eprint
online
12
2007
A Zero-Knowledge Identification and Key Agreement Protocol
eprint
online
13
2007
A Critical Analysis and Improvement of AACS Drive-Host Authentication
eprint
online
14
2007
Generalized mix functions and orthogonal equitable rectangles
eprint
online
15
2007
Interactive two-channel message authentication based on interactive-collision Resistant hash functions
eprint
online
16
2007
On Unconditionally Secure Distributed Oblivious Transfer
jofc
323-373
17
2007
The Effectiveness of Receipt-Based Attacks on ThreeBallot
eprint
online
18
2006
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions
eprint
online
19
2006
Multicollision Attacks on some Generalized Sequential Hash Functions
eprint
online
20
2006
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
eprint
online
21
2006
Unconditionally secure chaffing and winnowing with short authentication tags
eprint
online
22
2004
Multicollision Attacks on Generalized Hash Functions
eprint
online
23
2002
On Unconditionally Secure Robust Distributed Key Distribution Centers
asiacrypt
online
24
2002
New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups
jofc
285-297
25
2001
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications
jofc
231-253
26
2001
Some observations on the theory of cryptographic hash functions
eprint
online
27
2001
Slope packings and coverings, and generic algorithms for the discrete logarithm problem
eprint
online
28
2000
Combinatorial Properties of Frameproof and Traceability Codes
eprint
online
29
2000
Constructions and Bounds for Unconditionally Secure Commitment Schemes
eprint
online
30
1999
On the Contrast in Visual Cryptography Schemes
jofc
261-289
31
1997
Almost k-wise Independent Sample Spaces and Their Cryptologic Applications
eurocrypt
409-421
32
1996
On the Contrast in Visual Cryptography Schemes
eprint
online
33
1996
Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
crypto
387-400
34
1996
Universal Hashing and Multiple Authentication
crypto
16-30
35
1995
Graph Decompositions and Secret Sharing Schemes
jofc
39-64
36
1995
An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions
jofc
167-173
37
1994
On the Dealer's Randomness Required in Secret Sharing Schemes
eurocrypt
35-46
38
1994
Bounds for Resilient Functions and Orthogonal Arrays
crypto
247-256
39
1992
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
jofc
153-166
40
1992
Graph Decompositions and Secret Sharing Schemes
eurocrypt
1-24
41
1992
New General Lower Bounds on the Information Rate of Secret Sharing Schemes
crypto
168-182
42
1991
Combinatorial Characterizations of Authentication Codes
crypto
62-73
43
1991
Universal Hashing and Authentication Codes
crypto
74-85
44
1990
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
crypto
242-252
45
1990
The Combinatorics of Authentication and Secrecy Codes
jofc
23-49
46
1988
Authentication Codes with Multiple Arbiters (Extended Abstract)
eurocrypt
51-55
47
1988
The Detection of Cheaters in Threshold Schemes
crypto
564-577
48
1988
Some Constructions and Bounds for Authentication Codes
jofc
37-52
49
1988
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
jofc
119-127
50
1987
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
crypto
355-366
51
1987
A Combinatorial Approach to Threshold Schemes
crypto
330-339
52
1986
Some Constructions and Bounds for authentication Codes
crypto
418-425
Coauthors of Douglas R. Stinson
Mustafa Atici
Jürgen Bierbrauer
Simon R. Blackburn
Carlo Blundo
Ernest F. Brickell
M. Chateauneuf
Paolo D'Arco
Tuvi Etzion
Antonio Giorgio Gaggia
K. Gopalakrishnan
Kevin Henry
Thomas Johansson
Kaoru Kurosawa
A.C.H. Ling
Spyros S. Magliveras
Atefeh Mashatan
James L. Massey
Barbara Masucci
Luiz A. Frota Mattos
Mridul Nandi
M. B. Paterson
Alfredo De Santis
Jessica Staddon
Jiayuan Sui
Tran van Trung
J. Upadhyay
Ugo Vaccaro
Scott A. Vanstone
Ruizhong Wei
J. Wu
Gregory M. Zaverucha