Chanathip Namprempre

According to our database1, Chanathip Namprempre authored at least 25 papers between 1996 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Reconsidering Generic Composition.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
AE5 Security Notions: Definitions Implicit in the CAESAR Call.
IACR Cryptology ePrint Archive, 2013

2012
On-line Ciphers and the Hash-CBC Constructions.
J. Cryptology, 2012

2008
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security.
IEEE Trans. Information Theory, 2008

2007
A Study of Blind Message Authentication Codes.
IEICE Transactions, 2007

Mitigating Dictionary Attacks with Text-Graphics Character Captchas.
IEICE Transactions, 2007

On-Line Ciphers and the Hash-CBC Constructions.
IACR Cryptology ePrint Archive, 2007

Unrestricted Aggregate Signatures.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

2006
The Secure Shell (SSH) Transport Layer Encryption Modes.
RFC, January, 2006

On the (Im)possibility of Blind Message Authentication Codes.
Proceedings of the Topics in Cryptology, 2006

2004
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
ACM Trans. Inf. Syst. Secur., 2004

Security Proofs for Identity-Based Identification and Signature Schemes.
Proceedings of the Advances in Cryptology, 2004

2003
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme.
J. Cryptology, 2003

2002
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm.
IACR Cryptology ePrint Archive, 2002

From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization.
Proceedings of the Advances in Cryptology, 2002

2001
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme.
IACR Cryptology ePrint Archive, 2001

The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme.
Proceedings of the Financial Cryptography, 2001

Forward-Secure Threshold Signature Schemes.
Proceedings of the Topics in Cryptology, 2001

Online Ciphers and the Hash-CBC Construction.
Proceedings of the Advances in Cryptology, 2001

2000
Forward Security in Threshold Signature Schemes.
IACR Cryptology ePrint Archive, 2000

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
Proceedings of the Advances in Cryptology, 2000

1999
Implementing Causal Logging Using OrbixWeb Interception.
Proceedings of the 5th USENIX Conference on Object-Oriented Technologies & Systems, 1999

1996
HyPursuit: A Hierarchical Network Search Engine that Exploits Content-Link Hypertext Clustering.
Proceedings of the Hypertext '96, 1996


  Loading...