Chris Hall
According to our database1,
Chris Hall
authored at least 25 papers
between 1996 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2016
Ramanujan coverings of graphs.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016
Playing Games with Observation, Dependency, and Agency in a New Environment for Making Construals.
Proceedings of the 2016 International Conference on Interactive Technologies and Games, 2016
2015
Making Construals as a New Digital Skill: Dissolving the Program - and the Programmer - Interface.
Proceedings of the 2015 International Conference on Interactive Technologies and Games, 2015
2014
Collaborating with the Enemy on Network Management.
Proceedings of the Security Protocols XXII, 2014
Collaborating with the Enemy on Network Management (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014
2013
Authentication for Resilience: The Case of SDN.
Proceedings of the Security Protocols XXI, 2013
2012
Experimental Data for Goldfeld's Conjecture over Function Fields.
Experimental Mathematics, 2012
Security of the internet and the known unknowns.
Commun. ACM, 2012
2011
Resilience of the Internet Interconnection Ecosystem.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
2009
The chiasmus of design: Paradoxical outcomes in the e-government reform of UK children's services.
Proceedings of the 17th European Conference on Information Systems, 2009
2006
OpenKODE: an open mobile media development environment.
Proceedings of the 33. International Conference on Computer Graphics and Interactive Techniques, 2006
OpenGL ES Safety Critical.
Proceedings of the 33. International Conference on Computer Graphics and Interactive Techniques, 2006
2002
Client/ Server Application for the Analysis of Gene Expressions.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002
2000
Protecting secret keys with personal entropy.
Future Generation Comp. Syst., 2000
1999
Reaction Attacks against several Public-Key Cryptosystems.
Proceedings of the Information and Communication Security, Second International Conference, 1999
1998
On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998
Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998
Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998
Side Channel Cryptanalysis of Product Ciphers.
Proceedings of the Computer Security, 1998
Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998
1997
Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997
An Improved E-Mail Security Protocol.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Remote Electronic Gambling.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
An Authenticated Camera.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996