Peter Landrock

According to our database1, Peter Landrock
  • authored at least 49 papers between 1988 and 2015.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
Power map permutations and the discrete log problem.
Des. Codes Cryptography, 2015

2011
PKCS.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2008
New PKI Protocols Using Tamper Resistant Hardware.
Proceedings of the Public Key Infrastructure, 2008

2005
X.509.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Two-Factor Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Token.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

SSH.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

SET.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Security Architecture.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

S/MIME.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Registration Authority.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Public Key Infrastructure.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proton.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

PKCS.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Payment card.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Mondex.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Key Encryption Key.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Issuer.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic Negotiable Instruments.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic Cheque.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Derived key.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Control Vectors.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Clip Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

CEPS Standard.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Bolero.net.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Attribute certificate.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Acquirer.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

ABA digital signature guidelines.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2000
WWW security and trusted third party services.
Future Generation Comp. Syst., 2000

Interactive Identification Protocols (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

1999
Challenging the conventional view of PKI - will it really work?
Inf. Sec. Techn. Report, 1999

1998
Zero-Knowledge Authentication Scheme with Secret Key Exchange.
J. Cryptology, 1998

WYSIWYS? - What you see is what you sign?
Inf. Sec. Techn. Report, 1998

A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

A New Concept in Protocols: Verifiable Computational Delegation (Position Paper).
Proceedings of the Security Protocols, 1998

Discussion Session: Differences Between Academic and Commercial Security.
Proceedings of the Security Protocols, 1998

Primality Tests and Use of Primes in Public-Key Systems.
Proceedings of the Lectures on Data Security, 1998

1997
TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View.
Proceedings of the State of the Art in Applied Cryptography, 1997

1996
Practical experiences with TTP schemes.
Inf. Sec. Techn. Report, 1996

1993
Principles of Key Management.
IEEE Journal on Selected Areas in Communications, 1993

1992
Classical Codes as Ideals in Group Algebras.
Des. Codes Cryptography, 1992

The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel).
Proceedings of the Advances in Cryptology, 1992

1991
Race Integrity Primitives Evaluation (RIPE): A Status Report.
Proceedings of the Advances in Cryptology, 1991

Speeding up Prime Number Generation.
Proceedings of the Advances in Cryptology, 1991

1990
The extended golay codes considered as ideals.
J. Comb. Theory, Ser. A, 1990

Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
Proceedings of the Advances in Cryptology, 1990

1989
A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation.
Proceedings of the Advances in Cryptology, 1989

1988
Anonymous and Verifiable Registration in Databases.
Proceedings of the Advances in Cryptology, 1988

Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract).
Proceedings of the Advances in Cryptology, 1988


  Loading...