Gustavus J. Simmons
Affiliations:- Sandia Laboratories, Albuquerque, NM, USA
  According to our database1,
  Gustavus J. Simmons
  authored at least 59 papers
  between 1964 and 2020.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on zbmath.org
- 
    on id.loc.gov
- 
    on d-nb.info
On csauthors.net:
Bibliography
  2020
  2017
  2015
Cubic, edge critical, Hamilton laceable bigraphs.
  
    Ars Comb., 2015
    
  
  2014
A surprising regularity in the number of Hamilton paths in polygonal bigraphs.
  
    Ars Comb., 2014
    
  
  2002
Parity Encoding of Binary Sequences.
  
    Des. Codes Cryptogr., 2002
    
  
  2001
  1998
    IEEE J. Sel. Areas Commun., 1998
    
  
  1996
    Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
    
  
  1995
  1994
  1993
    Proceedings of the Advances in Cryptology, 1993
    
  
    Proceedings of the Advances in Cryptology, 1993
    
  
    Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
    
  
  1992
Public-Key Cryptography: State of the Art and Future Directions, E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991, Final Report
    
  
    Lecture Notes in Computer Science 578, Springer, ISBN: 3-540-55215-4, 1992
    
  
  1990
A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration.
    
  
    J. Cryptol., 1990
    
  
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party.
    
  
    Proceedings of the Advances in Cryptology, 1990
    
  
    Proceedings of the Advances in Cryptology, 1990
    
  
  1989
A protocol to provide verifiable proof of identity and unforgeable transaction receipts.
    
  
    IEEE J. Sel. Areas Commun., 1989
    
  
    Proceedings of the Advances in Cryptology, 1989
    
  
  1988
    Proc. IEEE, 1988
    
  
    Proceedings of the Advances in Cryptology, 1988
    
  
  1987
Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys.
    
  
    IEEE Trans. Software Eng., 1987
    
  
    Proceedings of the Advances in Cryptology, 1987
    
  
    Proceedings of the Advances in Cryptology, 1987
    
  
    Proceedings of the Advances in Cryptology, 1987
    
  
  1986
Cycle Structure of the Weak and Semi-Weak DES Keys.
  
    EUROCRYPT, 1986
    
  
    Proceedings of the Advances in Cryptology, 1986
    
  
  1985
    Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985
    
  
  1984
A System for Verifying User Identity and Authorization at the Point-of Sale or Access.
    
  
    Cryptologia, 1984
    
  
    Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
    
  
    Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
    
  
  1983
    Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983
    
  
The Prisoners' Problem and the Subliminal Channel.
  
    Proceedings of the Advances in Cryptology, 1983
    
  
  1982
    Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
    
  
    Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
    
  
    Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982
    
  
  1981
    Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981
    
  
A System for Point-of-Sale or Access User Authentication and Identification.
  
    Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
    
  
Software Protection Using "Communal Key Cryptosystems".
  
    Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
    
  
  1980
    Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
    
  
  1979
  1977
  1974
    Discret. Math., 1974
    
  
  1973
  1972
  1969
    IEEE Trans. Inf. Theory, 1969
    
  
  1964
    Proceedings of the 1964 spring joint computer conference, 1964