Joe-Kai Tsay

According to our database1, Joe-Kai Tsay authored at least 8 papers between 2006 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Efficient Padding Oracle Attacks on Cryptographic Hardware.
IACR Cryptol. ePrint Arch., 2012

Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols
CoRR, 2012

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols.
Proceedings of the Computer Network Security, 2012

PEVS: A Secure Electronic Voting Scheme Using Polling Booths.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

2011
Cryptographically sound security proofs for basic and public-key Kerberos.
Int. J. Inf. Sec., 2011

2009
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
IACR Cryptol. ePrint Arch., 2009

2008
Computationally sound mechanized proofs for basic and public-key Kerberos.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2006
Breaking and Fixing Public-Key Kerberos.
IACR Cryptol. ePrint Arch., 2006


  Loading...