Daniel R. L. Brown

According to our database1, Daniel R. L. Brown authored at least 54 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Plactic key agreement (insecure?).
J. Math. Cryptol., 2023

More forging (and patching) of tropical signatures.
IACR Cryptol. ePrint Arch., 2023

Failed crypto: Matrices over non-standard arithmetic.
IACR Cryptol. ePrint Arch., 2023

Cryptanalysis of a key agreement scheme using determinants and rectangular matrices.
IACR Cryptol. ePrint Arch., 2023

2022
Rolling up lattice cryptography primes.
IACR Cryptol. ePrint Arch., 2022

2021
Cryptanalysis of 'MAKE'.
IACR Cryptol. ePrint Arch., 2021

Key agreement: security / division.
IACR Cryptol. ePrint Arch., 2021

Plactic signatures.
IACR Cryptol. ePrint Arch., 2021

Plactic key agreement.
IACR Cryptol. ePrint Arch., 2021

Layering diverse cryptography to lower future secret attack risks: post-quantum estimates.
IACR Cryptol. ePrint Arch., 2021

GLV+HWCD for 2y^2=x^3+x/GF(8^91+5).
IACR Cryptol. ePrint Arch., 2021

2020
Rolling up sleeves when subversion's in a field?
IACR Cryptol. ePrint Arch., 2020

2019
An optimist's Poisson model of cryptanalysis.
IACR Cryptol. ePrint Arch., 2019

2018
RKHD ElGamal signing and 1-way sums.
IACR Cryptol. ePrint Arch., 2018

ECC mod 8^91+5.
IACR Cryptol. ePrint Arch., 2018

2016
Breaking RSA May Be As Difficult As Factoring.
J. Cryptol., 2016

2015
Alternative cubics' rules with an algebraic appeal.
IACR Cryptol. ePrint Arch., 2015

A flaw in a theorem about Schnorr signatures.
IACR Cryptol. ePrint Arch., 2015

Bounds on surmising remixed keys.
IACR Cryptol. ePrint Arch., 2015

Short Schnorr signatures require a hash function with more than just random-prefix resistance.
IACR Cryptol. ePrint Arch., 2015

2014
CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs.
IACR Cryptol. ePrint Arch., 2014

Some Theoretical Conditions for Menezes-Qu-Vanstone Key Agreement to Provide Implicit Key Authentication.
IACR Cryptol. ePrint Arch., 2014

2012
Uniform Compression Functions Can Fail to Preserve "Full" Entropy.
IACR Cryptol. ePrint Arch., 2012

2011
Formally Assessing Cryptographic Entropy.
IACR Cryptol. ePrint Arch., 2011

Identity-Based Decryption.
IACR Cryptol. ePrint Arch., 2011

2010
Elliptic Curve Private Key Structure.
RFC, June, 2010

Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA.
RFC, January, 2010

Updates for RSAES-OAEP and RSASSA-PSS Algorithm Parameters.
RFC, January, 2010

Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS).
RFC, January, 2010

Stange's Elliptic Nets and Coxeter Group F4.
IACR Cryptol. ePrint Arch., 2010

Lower Bounds for Straight Line Factoring.
IACR Cryptol. ePrint Arch., 2010

2009
Elliptic Curve Cryptography Subject Public Key Information.
RFC, March, 2009

Security of ECQV-Certified ECDSA Against Passive Adversaries.
IACR Cryptol. ePrint Arch., 2009

2008
One-Up Problem for (EC)DSA.
IACR Cryptol. ePrint Arch., 2008

User-Sure-and-Safe Key Retrieval.
IACR Cryptol. ePrint Arch., 2008

Toy Factoring by Newton's Method.
IACR Cryptol. ePrint Arch., 2008

The Encrypted Elliptic Curve Hash.
IACR Cryptol. ePrint Arch., 2008

2007
A rooted map invariant, non-orientability and Jack symmetric functions.
J. Comb. Theory, Ser. B, 2007

A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.
IACR Cryptol. ePrint Arch., 2007

Irreducibility to the One-More Evaluation Problems: More May Be Less.
IACR Cryptol. ePrint Arch., 2007

2006
What Hashes Make RSA-OAEP Secure?
IACR Cryptol. ePrint Arch., 2006

Multi-Dimensional Montgomery Ladders for Elliptic Curves.
IACR Cryptol. ePrint Arch., 2006

Conjectured Security of the ANSI-NIST Elliptic Curve RNG.
IACR Cryptol. ePrint Arch., 2006

2005
Prompted User Retrieval of Secret Entropy: The Passmaze Protocol.
IACR Cryptol. ePrint Arch., 2005

A Weak-Randomizer Attack on RSA-OAEP with e = 3.
IACR Cryptol. ePrint Arch., 2005

Deniable Authentication with RSA and Multicasting.
IACR Cryptol. ePrint Arch., 2005

Generic Groups, Collision Resistance, and ECDSA.
Des. Codes Cryptogr., 2005

Accelerated Verification of ECDSA Signatures.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

2004
The Static Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 2004

2003
Validation of Elliptic Curve Public Keys.
Proceedings of the Public Key Cryptography, 2003

2002
Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS).
RFC, April, 2002

The Quadrangulation Conjecture for Orientable Surfaces.
J. Comb. Theory, Ser. B, 2002

2001
Provably Secure Implicit Certificate Schemes.
Proceedings of the Financial Cryptography, 2001

Formal Security Proofs for a Signature Scheme with Partial Message Recovery.
Proceedings of the Topics in Cryptology, 2001


  Loading...