Chris Hall

According to our database1, Chris Hall authored at least 26 papers between 1996 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Ramanujan coverings of graphs.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Playing Games with Observation, Dependency, and Agency in a New Environment for Making Construals.
Proceedings of the 2016 International Conference on Interactive Technologies and Games, 2016

2015
Making Construals as a New Digital Skill: Dissolving the Program - and the Programmer - Interface.
Proceedings of the 2015 International Conference on Interactive Technologies and Games, 2015

2014
Collaborating with the Enemy on Network Management.
Proceedings of the Security Protocols XXII, 2014

Collaborating with the Enemy on Network Management (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

2013
Authentication for Resilience: The Case of SDN.
Proceedings of the Security Protocols XXI, 2013

2012
Experimental Data for Goldfeld's Conjecture over Function Fields.
Experimental Mathematics, 2012

Security of the internet and the known unknowns.
Commun. ACM, 2012

2011
Resilience of the Internet Interconnection Ecosystem.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

2009
The chiasmus of design: Paradoxical outcomes in the e-government reform of UK children's services.
Proceedings of the 17th European Conference on Information Systems, 2009

2006
OpenKODE: an open mobile media development environment.
Proceedings of the 33. International Conference on Computer Graphics and Interactive Techniques, 2006

OpenGL ES Safety Critical.
Proceedings of the 33. International Conference on Computer Graphics and Interactive Techniques, 2006

2002
Client/ Server Application for the Analysis of Gene Expressions.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002

2000
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security, 2000

Protecting secret keys with personal entropy.
Future Generation Comp. Syst., 2000

1999
Reaction Attacks against several Public-Key Cryptosystems.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998

Side Channel Cryptanalysis of Product Ciphers.
Proceedings of the Computer Security, 1998

Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998

1997
Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997

An Improved E-Mail Security Protocol.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Remote Electronic Gambling.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
An Authenticated Camera.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996


  Loading...