Michael Szydlo

According to our database1, Michael Szydlo authored at least 18 papers between 2001 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Portfolio Trading.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

2006
A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions.
Proceedings of the Financial Cryptography and Data Security, 2006

Fourth-factor authentication: somebody you know.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing.
IACR Cryptol. ePrint Arch., 2005

Security Analysis of a Cryptographically-Enabled RFID Device.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Risk Assurance for Hedge Funds Using Zero Knowledge Proofs.
Proceedings of the Financial Cryptography and Data Security, 2005

A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005

Proofs for Two-Server Password Authentication.
Proceedings of the Topics in Cryptology, 2005

2004
Merkle Tree Traversal in Log Space and Time.
Proceedings of the Advances in Cryptology, 2004

A Method to Solve Cyclotomic Norm Equations.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
A New Two-Server Approach for Authentication with Short Secrets.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures.
Proceedings of the Advances in Cryptology, 2003

Fractal Merkle Tree Representation and Traversal.
Proceedings of the Topics in Cryptology, 2003

The blocker tag: selective blocking of RFID tags for consumer privacy.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A Two-Server, Sealed-Bid Auction Protocol.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Cryptanalysis of the Revised NTRU Signature Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Threshold Ring Signatures and Applications to Ad-hoc Groups.
Proceedings of the Advances in Cryptology, 2002

2001
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.
Proceedings of the Advances in Cryptology, 2001


  Loading...