What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ernest F. Brickell
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2004
conf/ccs
Direct anonymous attestation.
Ernest F. Brickell
Jan Camenisch
Liqun Chen
2000
conf/acisp
Sharing Block Ciphers.
Ernest F. Brickell
Giovanni Di Crescenzo
Yair Frankel
2000
conf/pkc
Design Validations for Discrete Logarithm Based Signature Schemes.
Ernest F. Brickell
David Pointcheval
Serge Vaudenay
Moti Yung
1992
journals/joc
An Interactive Identification Scheme Based on Discrete Logarithms and Factoring.
Ernest F. Brickell
Kevin S. McCurley
1992
journals/joc
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes.
Ernest F. Brickell
Douglas R. Stinson
1992
conf/eurocrypt
Fast Exponentiation with Precomputation (Extended Abstract).
Ernest F. Brickell
Daniel M. Gordon
Kevin S. McCurley
David Bruce Wilson
1991
journals/joc
On the Classification of Ideal Secret Sharing Schemes.
Ernest F. Brickell
Daniel M. Davenport
1990
conf/crypto
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes.
Ernest F. Brickell
Douglas R. Stinson
1990
conf/eurocrypt
An Interactive Identification Scheme Based on Discrete Logarithms and Factoring.
Ernest F. Brickell
Kevin S. McCurley
1989
conf/crypto
On the Classification of Idea Secret Sharing Schemes.
Ernest F. Brickell
Daniel M. Davenport
1989
conf/crypto
A Survey of Hardware Implementation of RSA (Abstract).
Ernest F. Brickell
1989
conf/eurocrypt
Some Ideal Secret Sharing Schemes.
Ernest F. Brickell
1989
conf/eurocrypt
Cryptanalysis of Video Encryption Based on Space-Filling Curves.
Michael Bertilsson
Ernest F. Brickell
Ingemar Ingemarsson
1988
conf/crypto
The Detection of Cheaters in Threshold Schemes.
Ernest F. Brickell
Douglas R. Stinson
1988
conf/eurocrypt
Authentication Codes with Multiple Arbiters (Extended Abstract).
Ernest F. Brickell
Douglas R. Stinson
1988
conf/eurocrypt
An Observation on the Security of McEliece's Public-Key Cryptosystem.
Pil Joong Lee
Ernest F. Brickell
1987
conf/crypto
Secure Audio Teleconference.
Ernest F. Brickell
Pil Joong Lee
Yacov Yacobi
1987
conf/crypto
Gradual and Verifiable Release of a Secret.
Ernest F. Brickell
David Chaum
Ivan Damgård
Jeroen van de Graaf
1987
conf/eurocrypt
On Privacy Homomorphisms (Extended Abstract).
Ernest F. Brickell
Yacov Yacobi
1986
conf/crypto
Structure in the S-boxes of the DES.
Ernest F. Brickell
Judy H. Moore
M. R. Purtill
1986
conf/eurocrypt
Cryptanalysis of the Yagisawa Public Key Cryptosystem.
Ernest F. Brickell
1985
conf/crypto
An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi.
Ernest F. Brickell
John M. DeLaurentis
1984
conf/crypto
Breaking Iterated Knapsacks.
Ernest F. Brickell
1983
conf/crypto
Solving Low Density Knapsacks.
Ernest F. Brickell
1983
conf/crypto
Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems.
Ernest F. Brickell
J. C. Lagarias
Andrew M. Odlyzko
1982
conf/crypto
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.
Ernest F. Brickell
James A. Davis
Gustavus J. Simmons
1982
conf/crypto
Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2<sup>p</sup>).
Ernest F. Brickell
Judy H. Moore
1982
conf/crypto
A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography.
Ernest F. Brickell
Coauthors
Andrew M. Odlyzko
(1)
Daniel M. Davenport
(2)
Daniel M. Gordon
(1)
David Bruce Wilson
(1)
David Chaum
(1)
David Pointcheval
(1)
Douglas R. Stinson
(4)
Ernest F. Brickell
(28)
Giovanni Di Crescenzo
(1)
Gustavus J. Simmons
(1)
Ingemar Ingemarsson
(1)
Ivan Damgård
(1)
J. C. Lagarias
(1)
James A. Davis
(1)
Jan Camenisch
(1)
Jeroen van de Graaf
(1)
John M. DeLaurentis
(1)
Judy H. Moore
(2)
Kevin S. McCurley
(3)
Liqun Chen
(1)
M. R. Purtill
(1)
Michael Bertilsson
(1)
Moti Yung
(1)
Pil Joong Lee
(2)
Serge Vaudenay
(1)
Yacov Yacobi
(2)
Yair Frankel
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to