# Agnes Hui Chan

According to our database

Collaborative distances:

^{1}, Agnes Hui Chan authored at least 35 papers between 1979 and 2015.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Dataset Other## Links

#### On csauthors.net:

## Bibliography

2015

Proceedings of the Financial Cryptography and Data Security, 2015

2014

Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013

IACR Cryptol. ePrint Arch., 2013

2012

IACR Cryptol. ePrint Arch., 2012

2011

Proceedings of the MILCOM 2011, 2011

2009

Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2005

Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract).

Proceedings of the Networking, 2005

2003

Proceedings of the Progress in Cryptology, 2003

2002

Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.

Proceedings of the Information Security, 5th International Conference, 2002

2001

Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.

Proceedings of the Advances in Cryptology, 2001

Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000

Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Proceedings of the Advances in Cryptology, 2000

1998

Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997

Electronic Commerce.

Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

1996

Proceedings of the Advances in Cryptology, 1996

1993

IEEE Trans. Inf. Theory, 1993

Cross-Correlations of Linearly and Quadratically Related Geometric Sequences and GMW Sequences.

Discret. Appl. Math., 1993

Proceedings of the Fast Software Encryption, 1993

1992

Proceedings of the Advances in Cryptology, 1992

1990

IEEE Trans. Inf. Theory, 1990

IEEE Trans. Inf. Theory, 1990

IEEE Trans. Inf. Theory, 1990

Proceedings of the Advances in Cryptology, 1990

1989

Proceedings of the Advances in Cryptology, 1989

Proceedings of the Advances in Cryptology, 1989

1987

Using Decision Trees to Derive the Complement of a Binary Function with Multiple-Valued Inputs.

IEEE Trans. Computers, 1987

1986

Proceedings of the Advances in Cryptology, 1986

1983

A fast algorithm for determining the complexity of a binary sequence with period 2<sup>n</sup>.

IEEE Trans. Inf. Theory, 1983

1982

J. Comb. Theory A, 1982

J. Comb. Theory A, 1982

1981

IEEE Trans. Inf. Theory, 1981

Discret. Math., 1981

1979

J. Comb. Theory A, 1979