Peter Gemmell

According to our database1, Peter Gemmell authored at least 21 papers between 1991 and 2002.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2002
Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack.
J. Cryptol., 2002

2001
Analysis of a Subset Sum Randomizer.
IACR Cryptol. ePrint Arch., 2001

2000
Efficient and Fresh Cerification.
Proceedings of the Public Key Cryptography, 2000

1999
On the Cryptographic Value of The q<sup>th</sup> Root Problem.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1997
On the Amount of Randomness Needed in Distributed Computations.
Proceedings of the On Principles Of Distributed Systems, 1997

Checking Properties of Polynomials (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997

Optimal Resilience Proactive Public-Key Cryptosystems.
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997

1996
Proactive RSA.
IACR Cryptol. ePrint Arch., 1996

Witness-Based Cryptographic Program Checking and Robust Function Sharing.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

Witness-Based Cryptographic Program Checking and Applications (an Announcement).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Symmetry Breaking in Anonymous Networks: Characterizations.
Proceedings of the Fourth Israel Symposium on Theory of Computing and Systems, 1996

1995
Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change.
Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 1995

Self-Correcting for Function Fields Transcendental Degree.
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995

Average Circuit Depth and Average Communication Complexity.
Proceedings of the Algorithms, 1995

1994
Tight Bounds on Expected Time to Add Correctly and Add Mostly Correctly.
Inf. Process. Lett., 1994

Checking the Correctness of Memories.
Algorithmica, 1994

Selection in the Presence of Noise: The Design of Playoff Systems.
Proceedings of the Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 23-25 January 1994, 1994

1993
Checking approximate computations over the reals.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993

Codes for Interactive Authentication.
Proceedings of the Advances in Cryptology, 1993

1992
Highly Resilient Correctors for Polynomials.
Inf. Process. Lett., 1992

1991
Self-Testing/Correcting for Polynomials and for Approximate Functions
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991


  Loading...