Chanathip Namprempre

According to our database1, Chanathip Namprempre authored at least 22 papers between 1996 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Reconsidering Generic Composition.
IACR Cryptol. ePrint Arch., 2014

2013
AE5 Security Notions: Definitions Implicit in the CAESAR Call.
IACR Cryptol. ePrint Arch., 2013

2012
On-line Ciphers and the Hash-CBC Constructions.
J. Cryptol., 2012

2009
Security Proofs for Identity-Based Identification and Signature Schemes.
J. Cryptol., 2009

2008
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security.
IEEE Trans. Inf. Theory, 2008

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
J. Cryptol., 2008

2007
A Study of Blind Message Authentication Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Mitigating Dictionary Attacks with Text-Graphics Character Captchas.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
The Secure Shell (SSH) Transport Layer Encryption Modes.
RFC, January, 2006

Unrestricted Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2006

On the (Im)possibility of Blind Message Authentication Codes.
Proceedings of the Topics in Cryptology, 2006

2004
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
ACM Trans. Inf. Syst. Secur., 2004

2003
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme.
J. Cryptol., 2003

2002
Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization.
IACR Cryptol. ePrint Arch., 2002

From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
IACR Cryptol. ePrint Arch., 2002

Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme.
Proceedings of the Financial Cryptography, 2001

Forward-Secure Threshold Signature Schemes.
Proceedings of the Topics in Cryptology, 2001

Online Ciphers and the Hash-CBC Construction.
Proceedings of the Advances in Cryptology, 2001

2000
Forward Security in Threshold Signature Schemes.
IACR Cryptol. ePrint Arch., 2000

1999
Implementing Causal Logging Using OrbixWeb Interception.
Proceedings of the 5th USENIX Conference on Object-Oriented Technologies & Systems, 1999

1996
HyPursuit: A Hierarchical Network Search Engine that Exploits Content-Link Hypertext Clustering.
Proceedings of the Hypertext '96, 1996


  Loading...