# Robert J. Zuccherato

According to our database

Collaborative distances:

^{1}, Robert J. Zuccherato authored at least 17 papers between 1995 and 2011.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2011

Key Authentication.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Identity Verification Protocol.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2005

Entity Authentication.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Authentication token.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

An Attack on CFB Mode Encryption As Used By OpenPGP.

IACR Cryptology ePrint Archive, 2005

An Attack on CFB Mode Encryption as Used by OpenPGP.

Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

2004

On The Security of Key Derivation Functions.

Proceedings of the Information Security, 7th International Conference, 2004

2001

ISO/IEC 9798-3 Authentication SASL Mechanism.

RFC, August, 2001

Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP).

RFC, August, 2001

Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols.

RFC, February, 2001

2000

Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME.

RFC, March, 2000

A Global PMI for Electronic Content Distribution.

Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

1998

Discrete Logarithm Based Cryptosystems in Quadratic Function Fields of Characteristic 2.

Des. Codes Cryptogr., 1998

Faster Attacks on Elliptic Curve Cryptosystems.

Proceedings of the Selected Areas in Cryptography '98, 1998

The Equivalence Between Elliptic Curve and Quadratic Function Field Discrete Logarithms in Characteristic 2.

Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

1997

Elliptic curve cryptosystems using curves of smooth order over the ring Z

_{n}.
IEEE Trans. Information Theory, 1997

1995

Short RSA Keys and Their Generation.

J. Cryptology, 1995