What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gustavus J. Simmons
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
1996
conf/ih
The History of Subliminal Channels.
Gustavus J. Simmons
1994
journals/joc
Proof of Soundness (Integrity) of Cryptographic Protocols.
Gustavus J. Simmons
1994
conf/ccs
Towards Acceptable Key Escrow Systems.
Thomas Beth
Hans-Joachim Knobloch
Marcus Otten
Gustavus J. Simmons
Peer Wichmann
1993
conf/ccs
Cryptanalysis and Protocol Failures (abstract).
Gustavus J. Simmons
1993
conf/eurocrypt
The Consequences of Trust in Shared Secret Schemes.
Gustavus J. Simmons
1993
conf/eurocrypt
Subliminal Communication is Easy Using the DSA.
Gustavus J. Simmons
1990
journals/joc
A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration.
Gustavus J. Simmons
1990
conf/crypto
Geometric Shared Secret and/or Shared Control Schemes.
Gustavus J. Simmons
1990
conf/eurocrypt
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party.
Ingemar Ingemarsson
Gustavus J. Simmons
1989
conf/eurocrypt
Prepositioned Shared Secret and/or Shared Control Schemes.
Gustavus J. Simmons
1988
conf/crypto
How to (Really) Share a Secret.
Gustavus J. Simmons
1988
conf/eurocrypt
Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts.
Gustavus J. Simmons
George B. Purdy
1987
conf/crypto
A Natural Taxonomy for Digital Information Authentication Schemes.
Gustavus J. Simmons
1987
conf/crypto
An Impersonation-Proof Identity Verfication Scheme.
Gustavus J. Simmons
1987
conf/eurocrypt
Message Authentication with Arbitration of Transmitter/Receiver Disputes.
Gustavus J. Simmons
1986
conf/crypto
Cycle Structures of the DES with Weak and Semi-Weak Keys.
Judy H. Moore
Gustavus J. Simmons
1986
conf/eurocrypt
Cycle Structure of the Weak and Semi-Weak DES Keys.
Judy H. Moore
Gustavus J. Simmons
1985
conf/crypto
A Secure Subliminal Channel (?).
Gustavus J. Simmons
1985
conf/sp
How to (Selectively) Broadcast A Secret.
Gustavus J. Simmons
1985
conf/eurocrypt
The Practice of Authentication.
Gustavus J. Simmons
1984
conf/crypto
Authentication Theory/Coding Theory.
Gustavus J. Simmons
1984
conf/eurocrypt
Status Report on Factoring (At the Sandia National Laboratories).
James A. Davis
Diane B. Holdridge
Gustavus J. Simmons
1984
conf/eurocrypt
The Subliminal Channel and Digital Signature.
Gustavus J. Simmons
1983
conf/crypto
The Prisoners' Problem and the Subliminal Channel.
Gustavus J. Simmons
1983
conf/sp
Verification of Treaty Compliance Revisited.
Gustavus J. Simmons
1982
conf/crypto
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.
Ernest F. Brickell
James A. Davis
Gustavus J. Simmons
1982
conf/sp
Forward Search as a Cryptanalytic Tool Against a Public Key.
Gustavus J. Simmons
Diane B. Holdridge
1982
conf/sp
A Software Protection Scheme.
George B. Purdy
Gustavus J. Simmons
James Studier
1981
conf/crypto
A System for Point-of-Sale or Access User Authentication and Identification.
Gustavus J. Simmons
1981
conf/crypto
Software Protection Using "Communal Key Cryptosystems".
George B. Purdy
Gustavus J. Simmons
James Studier
1981
conf/sp
Half a Loaf is Better than None: Some Novel Message Integrity Problems.
Gustavus J. Simmons
1980
conf/sp
Secure Communications in the Presence of Pervasive Deceit.
Gustavus J. Simmons
Coauthors
Diane B. Holdridge
(2)
Ernest F. Brickell
(1)
George B. Purdy
(3)
Gustavus J. Simmons
(32)
Hans-Joachim Knobloch
(1)
Ingemar Ingemarsson
(1)
James A. Davis
(2)
James Studier
(2)
Judy H. Moore
(2)
Marcus Otten
(1)
Peer Wichmann
(1)
Thomas Beth
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to