Gregory V. Bard

Affiliations:
  • University of Maryland, College Park, USA


According to our database1, Gregory V. Bard authored at least 27 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Determining whether a given cryptographic function is a permutation of another given cryptographic function - A problem in intellectual property.
Theor. Comput. Sci., 2019

The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
IEEE Secur. Priv., 2019

2015
Plaintext recovery for one-time pads used twice.
ACM Commun. Comput. Algebra, 2015

2012
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers.
Cryptologia, 2012

Error Bounds on Derivatives during Simulations
CoRR, 2012

Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements
CoRR, 2011

A New General-Purpose Method to Multiply 3x3 Matrices Using Only 23 Multiplications
CoRR, 2011

SAT Over BOINC: An Application-Independent Volunteer Grid Project.
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011

2010
Algorithm 898: Efficient multiplication of dense matrices over GF(2).
ACM Trans. Math. Softw., 2010

Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems.
IACR Cryptol. ePrint Arch., 2010

Abstract only: DEMOCRACY: a heuristic for polynomial systems of equations over finite fields.
ACM Commun. Comput. Algebra, 2010

Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications.
IACR Cryptol. ePrint Arch., 2009

The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property.
IACR Cryptol. ePrint Arch., 2009

2008
Efficient Multiplication of Dense Matrices over GF(2)
CoRR, 2008

2007
Algorithms for Solving Linear and Polynomial Systems of Equations over Finite Fields with Applications to Cryptanalysis.
PhD thesis, 2007

Algebraic and Slide Attacks on KeeLoq.
IACR Cryptol. ePrint Arch., 2007

Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers.
IACR Cryptol. ePrint Arch., 2007

Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption.
Proceedings of the Cryptography and Coding, 2007

2006
Algebraic Cryptanalysis of the Data Encryption Standard.
IACR Cryptol. ePrint Arch., 2006

Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric.
IACR Cryptol. ePrint Arch., 2006

Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack.
IACR Cryptol. ePrint Arch., 2006

Accelerating Cryptanalysis with the Method of Four Russians.
IACR Cryptol. ePrint Arch., 2006

Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods.
IACR Cryptol. ePrint Arch., 2006

A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL.
IACR Cryptol. ePrint Arch., 2006

2004
The Vulnerability of SSL to Chosen Plaintext Attack.
IACR Cryptol. ePrint Arch., 2004


  Loading...