John Black

According to our database1, John Black authored at least 39 papers between 1993 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
The Cancer Genomics Hub (CGHub): overcoming cancer through the power of torrential data.
Database, 2014

Supporting CS education via virtualization and packages: tools for successfully accommodating "bring-your-own-device" at scale.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2011
MyZone: A Next-Generation Online Social Network
CoRR, 2011

2010
An Analysis of the Blockcipher-Based Hash Functions from PGV.
J. Cryptology, 2010

A multi-user location-awareness system.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
J. Cryptology, 2009

MAC Reforgeability.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Security and Privacy in a Sensor-Based Search and Rescue System.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Support for Security and Privacy in SenSearch.
Proceedings of the 2008 IEEE International Performance, 2008

2007
An integration model for organizing IT service management.
IBM Systems Journal, 2007

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
IACR Cryptology ePrint Archive, 2007

2006
A Security Analysis of the Internet Chess Club.
IEEE Security & Privacy, 2006

MAC Reforgeability.
IACR Cryptology ePrint Archive, 2006

Compare-by-Hash: A Reasoned Analysis.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

A Study of the MD5 Attacks: Insights and Improvements.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Authenticated encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

The Impossibility of Technology-Based DRM and a Modest Suggestion.
JTHTL, 2005

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions.
J. Cryptology, 2005

The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.
IACR Cryptology ePrint Archive, 2005

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2005

Lessons Learned: A Security Analysis of the Internet Chess Club.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
How to Cheat at Chess: A Security Analysis of the Internet Chess Club.
IACR Cryptology ePrint Archive, 2004

2003
OCB: A block-cipher mode of operation for efficient authenticated encryption.
ACM Trans. Inf. Syst. Secur., 2003

Building Secure Cryptographic Transforms, or How to Encrypt and MAC.
IACR Cryptology ePrint Archive, 2003

2002
Encryption-Scheme Security in the Presence of Key-Dependent Messages.
IACR Cryptology ePrint Archive, 2002

Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV.
IACR Cryptology ePrint Archive, 2002

Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption.
Proceedings of the 11th USENIX Security Symposium, 2002

Encryption-Scheme Security in the Presence of Key-Dependent Messages.
Proceedings of the Selected Areas in Cryptography, 2002

A Block-Cipher Mode of Operation for Parallelizable Message Authentication.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Ciphers with Arbitrary Finite Domains.
Proceedings of the Topics in Cryptology, 2002

Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV.
Proceedings of the Advances in Cryptology, 2002

2001
OCB Mode.
IACR Cryptology ePrint Archive, 2001

A Block-Cipher Mode of Operation for Parallelizable Message Authentication.
IACR Cryptology ePrint Archive, 2001

Ciphers with Arbitrary Finite Domains.
IACR Cryptology ePrint Archive, 2001

OCB: a block-cipher mode of operation for efficient authenticated encryption.
Proceedings of the CCS 2001, 2001

2000
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions.
Proceedings of the Advances in Cryptology, 2000

1999
UMAC: Fast and Secure Message Authentication.
Proceedings of the Advances in Cryptology, 1999

1993
Keynote Address: A Management View of Systems Administration.
Proceedings of the 7th Conference on Systems Administration (LISA 1993), 1993


  Loading...