John Black

According to our database1, John Black authored at least 31 papers between 1993 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 




A treatment recommender clinical decision support system for personalized medicine: method development and proof-of-concept for drug resistant tuberculosis.
BMC Medical Informatics Decis. Mak., 2022

The Cancer Genomics Hub (CGHub): overcoming cancer through the power of torrential data.
Database J. Biol. Databases Curation, 2014

Supporting CS education via virtualization and packages: tools for successfully accommodating "bring-your-own-device" at scale.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

MyZone: A Next-Generation Online Social Network
CoRR, 2011

An Analysis of the Blockcipher-Based Hash Functions from PGV.
J. Cryptol., 2010

A multi-user location-awareness system.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
J. Cryptol., 2009

Security and Privacy in a Sensor-Based Search and Rescue System.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

Support for Security and Privacy in SenSearch.
Proceedings of the 2008 IEEE International Performance, 2008

An integration model for organizing IT service management.
IBM Syst. J., 2007

A Security Analysis of the Internet Chess Club.
IEEE Secur. Priv., 2006

MAC Reforgeability.
IACR Cryptol. ePrint Arch., 2006

Compare-by-Hash: A Reasoned Analysis.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

A Study of the MD5 Attacks: Insights and Improvements.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Authenticated encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

The Impossibility of Technology-Based DRM and a Modest Suggestion.
J. Telecommun. High Technol. Law, 2005

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions.
J. Cryptol., 2005

The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.
IACR Cryptol. ePrint Arch., 2005

Lessons Learned: A Security Analysis of the Internet Chess Club.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

How to Cheat at Chess: A Security Analysis of the Internet Chess Club.
IACR Cryptol. ePrint Arch., 2004

OCB: A block-cipher mode of operation for efficient authenticated encryption.
ACM Trans. Inf. Syst. Secur., 2003

Building Secure Cryptographic Transforms, or How to Encrypt and MAC.
IACR Cryptol. ePrint Arch., 2003

Encryption-Scheme Security in the Presence of Key-Dependent Messages.
IACR Cryptol. ePrint Arch., 2002

Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV.
IACR Cryptol. ePrint Arch., 2002

Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption.
Proceedings of the 11th USENIX Security Symposium, 2002

OCB Mode.
IACR Cryptol. ePrint Arch., 2001

A Block-Cipher Mode of Operation for Parallelizable Message Authentication.
IACR Cryptol. ePrint Arch., 2001

Ciphers with Arbitrary Finite Domains.
IACR Cryptol. ePrint Arch., 2001

OCB: a block-cipher mode of operation for efficient authenticated encryption.
Proceedings of the CCS 2001, 2001

UMAC: Fast and Secure Message Authentication.
Proceedings of the Advances in Cryptology, 1999

Keynote Address: A Management View of Systems Administration.
Proceedings of the 7th Conference on Systems Administration (LISA 1993), 1993