Peter Gutmann

According to our database1, Peter Gutmann authored at least 29 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Standard Public Key Cryptography (PKC) Test Keys.
RFC, December, 2023

2020
Simple Certificate Enrolment Protocol.
RFC, September, 2020

2016
Book Reviews.
login Usenix Mag., 2016

Fuzzing Code with AFL.
login Usenix Mag., 2016

An IBE-based Signcryption Scheme for Group Key Management.
CoRR, 2016

2014
Encrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).
RFC, September, 2014

Code Testing through Fault Injection.
login Usenix Mag., 2014

2012
Using Message Authentication Code (MAC) Encryption in the Cryptographic Message Syntax (CMS).
RFC, January, 2012

Book Reviews.
login Usenix Mag., 2012

2011
Do Users Verify SSH Keys?
login Usenix Mag., 2011

The Curse of Cryptographic Numerology.
IEEE Secur. Priv., 2011

Applying problem-structuring methods to problems in computer security.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

PKI as Part of an Integrated Risk Management Strategy for Web Security.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2006
Internet X.509 Public Key Infrastructure Operational Protocols: Certificate Store Access via HTTP.
RFC, February, 2006

PKI design for the real world.
Proceedings of the New Security Paradigms Workshop 2006, 2006

2005
When Hashes Collide.
IEEE Secur. Priv., 2005

Security Usability.
IEEE Secur. Priv., 2005

2004
Simplifying Public Key Management.
Computer, 2004

2003
Plug-and-Play PKI: A PKI Your Mother Can Use.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

2002
Compressed Data Content Type for Cryptographic Message Syntax (CMS).
RFC, June, 2002

PKI: It's Not Dead, Just Resting.
Computer, 2002

Lessons Learned in Implementing and Deploying Crypto Software.
Proceedings of the 11th USENIX Security Symposium, 2002

2001
Password-based Encryption for CMS.
RFC, December, 2001

Data Remanence in Semiconductor Devices.
Proceedings of the 10th USENIX Security Symposium, 2001

2000
An Open-Source Cryptographic Coprocessor.
Proceedings of the 9th USENIX Security Symposium, 2000

A Reliable, Scalable General-Purpose Certificate Store.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
The Design of a Cryptographic Security Architecture.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

1998
Software Generation of Practically Strong Random Numbers.
Proceedings of the 7th USENIX Security Symposium, 1998

1996
Government, Cryptography, and the Right to Privacy.
J. Univers. Comput. Sci., 1996


  Loading...