What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Don Coppersmith
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2008
journals/joc
Cryptanalysis of ISO/IEC 9796-1.
Don Coppersmith
Jean-Sébastien Coron
François Grieu
Shai Halevi
Charanjit S. Jutla
David Naccache
Julien P. Stern
2002
conf/fse
Scream: A Software-Efficient Stream Cipher.
Shai Halevi
Don Coppersmith
Charanjit S. Jutla
2002
conf/crypto
Cryptanalysis of Stream Ciphers with Linear Masking.
Don Coppersmith
Shai Halevi
Charanjit S. Jutla
2002
conf/fc
Almost Optimal Hash Sequence Traversal.
Don Coppersmith
Markus Jakobsson
2001
journals/joc
Weakness in Quaternion Signatures.
Don Coppersmith
2000
journals/joc
On Polynomial Approximation of the Discrete Logarithm and the Diffie - Hellman Mapping.
Don Coppersmith
Igor E. Shparlinski
2000
conf/crypto
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm.
Don Coppersmith
Lars R. Knudsen
Chris J. Mitchell
1999
journals/compsec
A structured symmetric-key block cipher.
Mohammad Peyravian
Don Coppersmith
1999
conf/crypto
Weakness in Quaternion Signatures.
Don Coppersmith
1998
journals/joc
A Software-Optimized Encryption Algorithm.
Phillip Rogaway
Don Coppersmith
1998
conf/fse
Cryptanalysis of TWOPRIME.
Don Coppersmith
David A. Wagner
Bruce Schneier
John Kelsey
1998
conf/eurocrypt
Specialized Integer Factorization.
Don Coppersmith
1997
journals/istr
The data encryption standard.
Don Coppersmith
Chris L. Holloway
Stephen M. Matyas
Nevenko Zunic
1997
journals/joc
The Security of the Birational Permutation Signature Schemes.
Don Coppersmith
Jacques Stern
Serge Vaudenay
1997
journals/joc
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities.
Don Coppersmith
1997
conf/eurocrypt
Lattice Attacks on NTRU.
Don Coppersmith
Adi Shamir
1996
conf/eurocrypt
Low-Exponent RSA with Related Messages.
Don Coppersmith
Matthew K. Franklin
Jacques Patarin
Michael K. Reiter
1996
conf/eurocrypt
Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known.
Don Coppersmith
1996
conf/eurocrypt
Finding a Small Root of a Univariate Modular Equation.
Don Coppersmith
1994
conf/crypto
Attack on the Cryptographic Scheme NIKS-TAS.
Don Coppersmith
1993
journals/joc
Modifications to the Number Field Sieve.
Don Coppersmith
1993
conf/fse
A Software-Optimised Encryption Algorithm.
Phillip Rogaway
Don Coppersmith
1993
conf/crypto
The Shrinking Generator.
Don Coppersmith
Hugo Krawczyk
Yishay Mansour
1993
conf/crypto
Attacks on the Birational Permutation Signature Schemes.
Don Coppersmith
Jacques Stern
Serge Vaudenay
1985
conf/crypto
Cheating at Mental Poker.
Don Coppersmith
1985
conf/crypto
Another Birthday Attack.
Don Coppersmith
1985
conf/crypto
The Real Reason for Rivest's Phenomenon.
Don Coppersmith
Coauthors
Adi Shamir
(1)
Bruce Schneier
(1)
Charanjit S. Jutla
(3)
Chris J. Mitchell
(1)
Chris L. Holloway
(1)
David A. Wagner
(1)
David Naccache
(1)
Don Coppersmith
(27)
François Grieu
(1)
Hugo Krawczyk
(1)
Igor E. Shparlinski
(1)
Jacques Patarin
(1)
Jacques Stern
(2)
Jean-Sébastien Coron
(1)
John Kelsey
(1)
Julien P. Stern
(1)
Lars R. Knudsen
(1)
Markus Jakobsson
(1)
Matthew K. Franklin
(1)
Michael K. Reiter
(1)
Mohammad Peyravian
(1)
Nevenko Zunic
(1)
Phillip Rogaway
(2)
Serge Vaudenay
(2)
Shai Halevi
(3)
Stephen M. Matyas
(1)
Yishay Mansour
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to