Bert den Boer

According to our database1, Bert den Boer authored at least 11 papers between 1988 and 2002.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2002
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
New (Two-Track-)MAC Based on the Two Trails of RIPEMD.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

1993
A Simple and Key-Economical Unconditional Authentication Scheme.
J. Comput. Secur., 1993

Collisions for the Compressin Function of MD5.
Proceedings of the Advances in Cryptology, 1993

1991
An Attack on the Last Two Rounds of MD4.
Proceedings of the Advances in Cryptology, 1991

1990
Oblivous Transfer Protecting Secrecy.
Proceedings of the Advances in Cryptology, 1990

1989
Efficient Offline Electronic Checks (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

Detection of Disrupters in the DC Protocol.
Proceedings of the Advances in Cryptology, 1989

More Efficient Match-Making and Satisfiability: <i>The Five Card Trick</i>.
Proceedings of the Advances in Cryptology, 1989

1988
Cryptanalysis of F.E.A.L.
Proceedings of the Advances in Cryptology, 1988

Diffie-Hellman is as Strong as Discrete Log for Certain Primes.
Proceedings of the Advances in Cryptology, 1988


  Loading...